Security Training & Certifications

Trusted by governments, financial institutions and telecoms around the world



Our training courses cover a wide range of concepts from how to own an entire networks with real hands on hacking labs, network defense, Digital forensics investigations as well as Risk Management

Security Training

Our security training and certifications are trusted by governments, financial institutions, and telecoms around the world. Our training courses cover a wide range of concepts from how to own entire networks with real hands-on hacking labs, network defense, Digital Forensics investigations as well as Risk Management.

Fundamentals of Ethical Hacking

The course is hands-on with enough practical scenarios of real hacking environments that puts your organization’s team capable to think ahead of the adversaries and thwart any possible attack.

Digital Forensics & Incident Response

Cyber-attack is a common challenge to modern organizations. This course will help you acquire the right skill sets to conduct digital forensics both on computer and mobile as well as understand the core concepts and processes involved in Incident response in case of an Attack.

Open Source Intelligence Gathering (OSINT)

Our OSINT training course is designed to help the students to understand tools and techniques to acquire publicly available information, correlate and use the information gathered to track and individual, identify the existing relationship between individuals as well as key target organizations. The course is designed for intelligence units and law enforcement agencies.

Malware Analysis & Reverse Engineering

In this course you will learn how to analyze malware, recognize common malware tactics, debug and disassemble malicious binaries. The course is hands -on, with over 70% practical with virtual labs and less than 30% theory.

Application Security & Source Code Review

Secure software is critical element in organizational security. This course not only offers the students the key skills on how to audit applications, it also trains on how to develop secure applications.

Governance Risk & Compliance

GRC training courses and certifications are designed to help your team understand the fundamental concepts on Risk Management, IT security Governance and Compliance to international standards such as ISO 27001:2013, EU-GDPR etc.

Become a Certified Expert

We have partnered with several certification bodies to ensure our clients have receive internationally recognized certifications in  Digital Forensics, Penetration Testing, Risk Management and Governance Risk and Complaince

Lead Implementer

ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information  Security  Management  System  (ISMS)  based  on  ISO/IEC  27001.  During this training course, you will also gain a thorough understanding of the best practices of Information Security Management Systems to secure the organization`s sensitive information and improve the overall performance and effectiveness.

Certified Lead Auditor

ISO/IEC  27001  Lead  Auditor  training  enables  you  to  develop  the  necessary  expertise  to  perform  an  Information  Security Management  System  (ISMS)  audit  by  applying  widely  recognized  audit  principles,  procedures  and  techniques.  During  this  training  course,  you  will  acquire  the  necessary  knowledge  and  skills  to  plan  and  carry  out  internal  and  external  audits  in  compliance with ISO 19011 and ISO/IEC 17021-1 certification process.

Certified Ethical Hacker

Our Certified Ethical Hacker in this course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.

This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. You will learn about the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

Certified Risk Manager

ISO/IEC 27005 Risk Manager training enables you to develop the competence to master the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework. During this training course, you will also gain a thorough understanding of best practices of risk assessment methods such as OCTAVE, EBIOS, MEHARI and harmonized TRA. This training course corresponds with the implementation process of the ISMS framework presented in the ISO/IEC 27001 standard.

Certified Lead Risk Manager

ISO 31000 Lead Risk Manager training enables you to acquire the expertise to support and lead an organization and its team to successfully identify, understand and manage a risk process based on ISO 31000. During this training course, you will also gain comprehensive knowledge of the best practices used to implement a Risk Management framework that provides the foundation for designing, implementing, monitoring, reviewing and continually improving a Risk Management process in an organization.

Ready to get started?

Get in touch with us

Call: +254 (02) 515 4097 (KE) • +250 787 856 970 (RW) • +44 7810 402477 (UK) • +267 76 407 313 (BW)