Security Training & CertificationsTrusted by governments, financial institutions and telecoms around the world
Our training courses cover a wide range of concepts from how to own an entire networks with real hands on hacking labs, network defense, Digital forensics investigations as well as Risk Management
Our security training and certifications are trusted by governments, financial institutions, and telecoms around the world. Our training courses cover a wide range of concepts from how to own entire networks with real hands-on hacking labs, network defense, Digital Forensics investigations as well as Risk Management.
Fundamentals of Ethical Hacking
The course is hands-on with enough practical scenarios of real hacking environments that puts your organization’s team capable to think ahead of the adversaries and thwart any possible attack.
Digital Forensics & Incident Response
Cyber-attack is a common challenge to modern organizations. This course will help you acquire the right skill sets to conduct digital forensics both on computer and mobile as well as understand the core concepts and processes involved in Incident response in case of an Attack.
Open Source Intelligence Gathering (OSINT)
Our OSINT training course is designed to help the students to understand tools and techniques to acquire publicly available information, correlate and use the information gathered to track and individual, identify the existing relationship between individuals as well as key target organizations. The course is designed for intelligence units and law enforcement agencies.
Malware Analysis & Reverse Engineering
In this course you will learn how to analyze malware, recognize common malware tactics, debug and disassemble malicious binaries. The course is hands -on, with over 70% practical with virtual labs and less than 30% theory.
Application Security & Source Code Review
Secure software is critical element in organizational security. This course not only offers the students the key skills on how to audit applications, it also trains on how to develop secure applications.
Governance Risk & Compliance
GRC training courses and certifications are designed to help your team understand the fundamental concepts on Risk Management, IT security Governance and Compliance to international standards such as ISO 27001:2013, EU-GDPR etc.
We have partnered with several certification bodies to ensure our clients have receive internationally recognized certifications in Digital Forensics, Penetration Testing, Risk Management and Governance Risk and Complaince
ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001. During this training course, you will also gain a thorough understanding of the best practices of Information Security Management Systems to secure the organization`s sensitive information and improve the overall performance and effectiveness.
Certified Lead Auditor
ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques. During this training course, you will acquire the necessary knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process.
Certified Ethical Hacker
Our Certified Ethical Hacker in this course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.
This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. You will learn about the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
Certified Risk Manager
ISO/IEC 27005 Risk Manager training enables you to develop the competence to master the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework. During this training course, you will also gain a thorough understanding of best practices of risk assessment methods such as OCTAVE, EBIOS, MEHARI and harmonized TRA. This training course corresponds with the implementation process of the ISMS framework presented in the ISO/IEC 27001 standard.
Certified Lead Risk Manager
ISO 31000 Lead Risk Manager training enables you to acquire the expertise to support and lead an organization and its team to successfully identify, understand and manage a risk process based on ISO 31000. During this training course, you will also gain comprehensive knowledge of the best practices used to implement a Risk Management framework that provides the foundation for designing, implementing, monitoring, reviewing and continually improving a Risk Management process in an organization.
Ready to get started?
Get in touch with us
Call: +254 (02) 515 4097 (KE) • +250 787 856 970 (RW) • +44 7810 402477 (UK) • +267 76 407 313 (BW)