Courses

  • 0 Lessons

    Certified Business Intelligence Data Analyst (CBIDA)

    Data and big data analytics are the lifeblood of any successful business. Getting the technology right can be challenging but building the right team with the right skills to undertake big data initiatives can be even harder.
  • 0 Lessons

    Certified Cyber Security Manager (CCSM)

    This CCSM (Certified Cyber Security Manager) certification training will give you the requisite skillsets to design, deploy and manage security architecture for your organization.
  • 0 Lessons

    Certified Fraud Forensic Professional (CFFP)

    CFFP is the world’s most comprehensive fraud investigation using forensic science. A CFFP can handle any kind of investigation covering on digital and financial forensics as well as criminal investigations involving fraud. Fraud Examination is just but a fraction of the CFFP’s skills set.
  • 0 Lessons

    Certified Risk Strategy Professional (CRISP)

    Today’s global and volatile economy challenges organizations with increasing level of complexity and uncertainty, increasing pace of technological and business changes, escalating compliance requirements, reliance on IT, the complexity of the supply chain, corporate social capital investment, the fragility of reputation and so on have highlighted the vulnerability of organizations to these risk issues.
  • 8 Lessons

    Cybersecurity for Executives

    This course provides practical, to-the-point training for the busy executive, in everyday language, complete with examples that are easy to understand the big picture events driving cybercrimes today and the top cyber risks affecting executives and their organizations.

  • 0 Lessons

    Diploma in Information Security and Computer Forensics

    This is a two-year programme that equips students with the knowledge and technical (practical) skills in computer forensics and information security (cyber security). The duration is broken down into four semesters.

  • 0 Lessons

    Diploma in Risk Management

    This is a two-year programme that equips graduates with the knowledge and technical (practical) skills in Risk Management. The duration is broken down into four semesters.

  • 0 Lessons

    I.T Security Essential Training

    About this Course This course is the first step to learn the most effective steps to prevent cybercrime occurrences and identify threats with hands-on techniques…
  • 15 Lessons

    Introduction to Cybersecurity

    This five-day course covers a wide range of baseline topics, including terminology, the basics of computer networks, security policies, incident response, passwords, and even an introduction to cryptographic principles.

  • 7 Lessons

    Introduction to Digital Forensics

    This is an introductory course that will explain the concepts of computer forensics as well as demonstrations of proper collections of digital

  • 2 Lessons

    Mac and iOS Forensic Analysis and Incident Response

    This course aims to enable investigators to investigate the Apple devices they encounter.

  • 5 Lessons

    Mobile Device Security

    In a world where smartphones store gigabytes of personally identifiable information, human negligence remains the single biggest threat to the security of your personal and corporate information.

  • 4 Lessons

    Next Generation End-Point Security Protection Practical Class

    Learn about integrated endpoint protection, network security risk management and enhanced user behaviour analysis for predictive security protection.

  • 4 Lessons

    Protection Mechanisms for Data at Rest

    Course: IFIS/CS/1004 Mode: IND| ORG | GEN. Availability: PUB Data at rest has proved to a more lucrative venture for cybercriminals owing to the fact…
  • 0 Lessons

    Smartphone Forensics

    Mobile devices are often a key factor in criminal cases, intrusions, IP theft, security threats, accident reconstruction, and more.

  • 5 Lessons

    Windows Systems Forensic Analysis

    You cannot protect what you do not know, and understanding forensic capabilities and artefacts is a fundamental cog of information security.

Subscribe to Newletter

Subscribe to our newsletter and stay updated with the latest in cybersecurity and digital forensics.