Skip to content
MENU
MENU
Home
Courses
Menu Toggle
Short courses
Certifications
Menu Toggle
CERTIFIED CYBER SECURITY MANAGER (CCSM)
CERTIFIED RISK STRATEGY PROFESSIONAL (CRISP)
CERTIFIED BUSINESS INTELLIGENCE DATA ANALYST (CBIDA)
CERTIFIED FRAUD FORENSIC PROFESSIONAL (CFFP)
Diplomas
Menu Toggle
Diploma in Information Security and Computer Forensics
Diploma in Risk Management
Training Calendar
Resourses
Menu Toggle
Downloads
Newsletters
Quizzes
Blog
Gallery
Testimonial
Forum
Account
Search
Search for:
MENU
MENU
Home
Courses
Menu Toggle
Short courses
Certifications
Menu Toggle
CERTIFIED CYBER SECURITY MANAGER (CCSM)
CERTIFIED RISK STRATEGY PROFESSIONAL (CRISP)
CERTIFIED BUSINESS INTELLIGENCE DATA ANALYST (CBIDA)
CERTIFIED FRAUD FORENSIC PROFESSIONAL (CFFP)
Diplomas
Menu Toggle
Diploma in Information Security and Computer Forensics
Diploma in Risk Management
Training Calendar
Resourses
Menu Toggle
Downloads
Newsletters
Quizzes
Blog
Gallery
Testimonial
Forum
Account
Search
Search for:
Fraud
Advanced Excel Training
Business Continuity Plan/Disaster Recovery Training
Business Continuity Plan/Disaster Recovery Training for Not for Profit Organizations (NFPO’s)
Certified Business Intelligence Data Analyst (CBIDA)
Certified Cyber Security Manager
Certified Fraud Forensics Professional
Certified Risk Strategy Professional (CRISP)
Cloud Computing Training
Cyber Security Awareness Training
Cyber Security Awareness Training
Cyber Security Awareness Training
Cyber Security for Cloud Computing Training
Cyber Security Risk Management Training
Cyber Threat Intelligence
Cybersecurity Awareness Training for Financial Institutions
Cybersecurity for Executives
Cybersecurity Incident Response Training
Digital Forensics
Diploma in Information Security and Computer Forensics
Diploma in Risk Management
Enterprise Risk Management Training
Fraud Risk Assessment
I.T Security Essential Training
Introduction to Cyber Security
Introduction to Digital forensics
Introduction to Ethical hacking: Footprinting & Reconnaissance
Intrusion Detection Training
Investigative Report Writing
Mac and iOS Forensic Analysis and Incident Response
Mobile Device Security
Penetration Testing Training
Ransomware Training
Risk-based Auditing
Securing Operating Systems
Smartphone Forensics
Tracing and Recovering Fraud losses
Windows Systems Forensic Analysis
Certified Fraud Forensics Professional
Fraud Risk Assessment
Tracing and Recovering Fraud losses
Subscribe to Our Newsletters
Email
Subscribe
Scroll to Top
No Thanks
LET'S GO
IFIS UPDATES
SUBSCRIBE TO OUR NEWSLETTER
You will be able to get all our weekly updates through the email you submit.