Cyber Security & Risk management

Imperial Royale, P.O.Box 4326, Plot 7 Kintu Rd, Kampala Kampala

#BeyondCyberSecurity Are you ready for the new era? Do you use a mobile device or computer? Do you access the internet for information, services or…

Investigative Report Writing Training

Institute of Forensics and ICT Security Ntinda Complex, Kampala, Uganda

Communicating your findings is an important part of the fraud examination process. Whether working with a client or as part of an internal investigation A written report provides a record of the investigation’s results and builds credibility for your work.

500,000

Introduction to Cyber Security

About this training This course is for students with a basic knowledge of computers and technology but no prior cyber security experience so that they…

250

Diploma in Risk Management

Institute of Forensics and ICT Security Ntinda Complex, Kampala, Uganda

This is a two-year programme which equips graduates with knowledge and technical (practical) skills in Risk Management. The duration is broken down into four semesters.…

Ugx1200000

Certified Cyber Security Manager (CCSM)

About this training This CCSM (Certified Cyber Security Manager) certification training will give you the requisite skillsets to design, deploy and manage security architecture for…

Next Generation End-Point Security Protection Practical Class

Learn about integrated endpoint protection, network security risk management and enhanced user behaviour analysis for predictive security protection. You will gain practical insights about (1) the Impact of lack of end-point security; (2) Common endpoint attacks and how to identify them, and (3) Endpoint risks

Protection Mechanisms for Data at Rest

Data at rest has proved to a more lucrative venture for cybercriminals owing to the fact that more volumes of valuable information are easily accessible at rest than when in transit.

Mobile Device Security

The massive shift to remote work caused by the COVID-19 pandemic left many businesses knowingly vulnerable to attacks from employees' mobile devices. Mobile Devices are…

Exploring Tor and the Dark Web

Do you ever realize that the deep web caters for close to 99% of the Internet? The dark web, a part of the deep web,…

Subscribe to Newletter

Subscribe to our newsletter and stay updated with the latest in cybersecurity and digital forensics.