• Grab A Quote

    Grab A Quote


    Services Required
     Security Posture Assessment
     Penetration Testing
     Vulnerability Assessment
     Architecture Review
     Source Code Review
     Other Services Required

    Disclaimer: We require this information to understand your needs and provide you with a better service. Your privacy is important to us. We will not disclose your personal information to any third party.
  • Got Hacked? Get Instant Help 24/7

    Got hacked ? Let Us Help You




    Disclaimer: We require this information to understand your needs and provide you with a better service. Your privacy is important to us. We will not disclose your personal information to any third party.

InfoSec Programmes

AKATI Academy is committed to deliver excellence through our professional cybersecurity training programmes covering both management and technical tracks focusing on specialisations. All training programmes can be customised to suit the needs and requirements of cyber security practitioners.

INFORMATION TECHNOLOGY GOVERNANCE & BUSINESS RESILIENCE
Enterprise Architecture
LEVEL COURSE DURATION  
FOUNDATION Enterprise Architecture Foundation & Landscape 2 Days COURSE DESCRIPTION
COURSE
Enterprise Architecture Foundation & Landscape

LEVEL
FOUNDATION

DURATION
2 Days
WHO SHOULD ATTEND

This training was designed for a broad audience, but focuses mainly on starting architects, managers and consultants who want to get a sense of the Enterprise Architecture field.

DESCRIPTION

Enterprise Architecture (EA) is a structured approach to innovate your organization, to connect business and IT and to become more flexible. Enterprise Architecture increases the transparency in your organization and its complex changes and relations. EA also helps to analyze impact of change and reducing IT risks and cost. This foundation training will give you a good overview of the field of Enterprise Architecture. We discuss the value and background of the discipline. We’ll give an overview of the most important Enterprise Architecture frameworks and tools.

EXPERT Zachman Certified Enterprise Architect 4 Days COURSE DESCRIPTION
COURSE
Zachman Certified Enterprise Architect

LEVEL
EXPERT

DURATION
4 Days
WHO SHOULD ATTEND

Enterprise Architects

DESCRIPTION

This 4-day, hand's-on modeling workshop, we develop the science behind EA, as derived from the Zachman Framework Ontology. We'll be looking at real-life examples and case studies from real consulting projects and finally give you the ability to answer the question "how do I use The Zachman Framework?" We "workshop" how to build and implement PRIMITIVE models and then actually see how that once you get some primitives built, then creating and changing the composite models and implementations in order to get at General Management problems is quite simple. We explore this by using several methodologies and tools that will help you "implement" the Zachman concepts in your enterprise. Understanding this "science" offers great capability to EAs for analysis and simulation solutions in their enterprise. It is a different EA paradigm

INFORMATION SECURITY AWARENESS – SAFE: Security Awareness For Everyone
LEVEL COURSE DURATION  
FOUNDATION SAFE #1 – General Employees 1 Day COURSE DESCRIPTION
COURSE
SAFE #1 – General Employees

LEVEL
FOUNDATION

DURATION
1 Day
WHO SHOULD ATTEND

all our employees plus contractors, consultants etc. working on our premises

DESCRIPTION

Prime targets for the awareness program are the people who use IT systems, handle corporate/personal information or control IT assets.  In practice, this means practically everyone within the organization (including those in the next two  groups), and perhaps some others (such as contractors and consultants working for us).  Managing information may or may not be a central part of their daily working lives but we believe everybody has a part to play in the information security culture. We will update the information security content for the new employee induction  process, for example, and introduce a refresher program. All employees will be encouraged to keep track of information security policies and issues through general awareness materials, and will in future be required to acknowledge their acceptance of information security responsibilities formally once a year. Wide coverage will reduce the chance that anyone can reasonably claim to be ignorant of their information security responsibilities and/or the rules: demonstrable awareness of the organization’s information security rules is vital if we are to take disciplinary or legal action following a breach.

FOUNDATION SAFE #2 – Executive Managers 1 Day COURSE DESCRIPTION
COURSE
SAFE #2 – Executive Managers

LEVEL
FOUNDATION

DURATION
1 Day
WHO SHOULD ATTEND

Management from the CEO to team-leader level Some items may be circulated more narrowly e.g. to specific directors or managers

DESCRIPTION

Staffs look  up to their team leaders, supervisors,  junior/middle/senior managers and executive directors for direction and guidance in all sorts of areas. In the case of information security, managers should openly demonstrate their commitment and support for the system of controls, implying the need to inform them about the controls and their obligations (naturally, it is important that managers comply with information security rules). Furthermore, managerial oversight is itself an important class of information security controls, so managers need to be aware of their governance responsibilities including monitoring and supporting their subordinates

INTERMEDIATE SAFE #4 – E-Learning 1 Day COURSE DESCRIPTION
COURSE
SAFE #4 – E-Learning

LEVEL
INTERMEDIATE

DURATION
1 Day
ADVANCED SAFE #3 – Technologists 1 Day COURSE DESCRIPTION
COURSE
SAFE #3 – Technologists

LEVEL
ADVANCED

DURATION
1 Day
EXPERT SAFE with HUMINT [Human Intelligence] : Training + Consulting 1 Day COURSE DESCRIPTION
COURSE
SAFE with HUMINT [Human Intelligence] : Training + Consulting

LEVEL
EXPERT

DURATION
1 Day
INFORMATION SYSTEMS AUDITING
LEVEL COURSE DURATION  
FOUNDATION IT Auditing Essentials 3 Days COURSE DESCRIPTION
COURSE
IT Auditing Essentials

LEVEL
FOUNDATION

DURATION
3 Days
WHO SHOULD ATTEND

This course is intended for those needing a better understanding of IT controls and audit, whether they are:

• business auditors seeking a better grasp of IT and its related control concepts;

• experienced IT practitioners preparing for an audit, or taking part in an audit as a team member.

• Audit or IT managers wanting to ensure they are adequately dealing with IT control issues.

DESCRIPTION

This three-day workshop is designed to provide new IT assurance and control professionals with the core skills needed by all Information Technology Auditors. You will review and understand key audit and control principles, as well as many practical techniques, which are all necessary to complete a wide range of IT audit assignments within today’s complex computing environments.    

Topics covered include overall IT audit planning and objectives, as well as audit risk assessment. We’ll also examine the wide range of controls needed for managing the IT function, system development / acquisition and implementation, IT operations, logical and physical security, and business resumption / disaster recovery. Included are the vital business process controls found within specific financial tracking and reporting systems. In addition, we will consider important technology components that IT auditors must be able to understand, use, and evaluate.

ADVANCED Certified Information Systems Auditor (CISA) 5 Days COURSE DESCRIPTION
COURSE
Certified Information Systems Auditor (CISA)

LEVEL
ADVANCED

DURATION
5 Days
EXPERT Real World IT Audit Techniques 3 Days COURSE DESCRIPTION
COURSE
Real World IT Audit Techniques

LEVEL
EXPERT

DURATION
3 Days
BUSINESS CONTINUITY AND DISASTER RECOVERY
LEVEL COURSE DURATION  
FOUNDATION Business Continuity Management & Resilience 5 Days COURSE DESCRIPTION
COURSE
Business Continuity Management & Resilience

LEVEL
FOUNDATION

DURATION
5 Days
ADVANCED EC-Council Disaster Recovery Professional (EDRP) 5 Days COURSE DESCRIPTION
COURSE
EC-Council Disaster Recovery Professional (EDRP)

LEVEL
ADVANCED

DURATION
5 Days
ADVANCED ISO 22301 Lead Implementer 5 Days COURSE DESCRIPTION
COURSE
ISO 22301 Lead Implementer

LEVEL
ADVANCED

DURATION
5 Days
EXPERT ISO 22301 Lead Auditor 5 Days COURSE DESCRIPTION
COURSE
ISO 22301 Lead Auditor

LEVEL
EXPERT

DURATION
5 Days
BUSINESS CONTINUITY AND DISASTER RECOVERY
LEVEL COURSE DURATION  
FOUNDATION Business Continuity Management & Resilience 5 Days COURSE DESCRIPTION
COURSE
Business Continuity Management & Resilience

LEVEL
FOUNDATION

DURATION
5 Days
ADVANCED EC-Council Disaster Recovery Professional (EDRP) 5 Days COURSE DESCRIPTION
COURSE
EC-Council Disaster Recovery Professional (EDRP)

LEVEL
ADVANCED

DURATION
5 Days
ADVANCED ISO 22301 Lead Implementer 5 Days COURSE DESCRIPTION
COURSE
ISO 22301 Lead Implementer

LEVEL
ADVANCED

DURATION
5 Days
EXPERT Certified in Risk and Information Systems Control (CRISC) 5 Days COURSE DESCRIPTION
COURSE
Certified in Risk and Information Systems Control (CRISC)

LEVEL
EXPERT

DURATION
5 Days
EXPERT Enterprise Risk Management 5 Days COURSE DESCRIPTION
COURSE
Enterprise Risk Management

LEVEL
EXPERT

DURATION
5 Days
EXPERT ISO 31000 Certified Risk Manager 5 Days COURSE DESCRIPTION
COURSE
ISO 31000 Certified Risk Manager

LEVEL
EXPERT

DURATION
5 Days
RISK MANAGEMENT
LEVEL COURSE DURATION  
FOUNDATION IT Risk Management 3 Days COURSE DESCRIPTION
COURSE
IT Risk Management

LEVEL
FOUNDATION

DURATION
3 Days
WHO SHOULD ATTEND

IT Risk and Security Managers, IT Technology and Systems Managers, IT Auditors, IT Operations Managers, IT Project Managers

DESCRIPTION

Every organization has a mission. In this digital era, as organizations use automated

information technology (IT) systems1 to process their information for better support

of their missions, risk management plays a critical role in protecting an organization’s

information assets, and therefore its mission, from IT-related risk.

An effective risk management process is an important component of a successful IT

security program. The principal goal of an organization’s risk management process

should be to protect the organization and its ability to perform their mission, not just

its IT assets. Therefore, the risk management process should not be treated primarily

as a technical function carried out by the IT experts who operate and manage the IT

system, but as an essential management function of the organization.

The objective of this course is to provide attendees with the necessary perspective,

knowledge and skills to understand the essential elements and benefits of applying

effective IT risk management and to learn how it assists:

•  Management in ensuring that the appropriate resources are effectively applied

in order to achieve the mission

•  Users in ensuring that proper controls are applied to address integrity,

confidentiality, and availability of the IT systems and data that they own

•  IT professionals in promoting IT policy adherence and maintain security of the IT systems

INTERMEDIATE Information Security Risk Management using ISO 27005 3 Days COURSE DESCRIPTION
COURSE
Information Security Risk Management using ISO 27005

LEVEL
INTERMEDIATE

DURATION
3 Days
EXPERT Certified in Risk and Information Systems Control (CRISC) 5 Days COURSE DESCRIPTION
COURSE
Certified in Risk and Information Systems Control (CRISC)

LEVEL
EXPERT

DURATION
5 Days
EXPERT Enterprise Risk Management 5 Days COURSE DESCRIPTION
COURSE
Enterprise Risk Management

LEVEL
EXPERT

DURATION
5 Days
EXPERT ISO 31000 Certified Risk Manager 5 Days COURSE DESCRIPTION
COURSE
ISO 31000 Certified Risk Manager

LEVEL
EXPERT

DURATION
5 Days
INFORMATION SECURITY MANAGEMENT
LEVEL COURSE DURATION  
FOUNDATION COBIT (Control Objectives for Information and Related Technology) 5 Foundation 3 Days COURSE DESCRIPTION
COURSE
COBIT (Control Objectives for Information and Related Technology) 5 Foundation

LEVEL
FOUNDATION

DURATION
3 Days
WHO SHOULD ATTEND

IT auditors, IT managers, IT quality professionals, IT leadership, IT developers, process practitioners and managers in IT service providing firm

DESCRIPTION

COBIT 5 is the only business framework for the governance and management of enterprise IT. Launched in April 2012, COBIT 5 helps maximize the value of information by incorporating the latest thinking in enterprise governance and management techniques, and provides globally accepted principles, practices, analytical tools and models to help increase the trust in, and value from, information systems.

Learn the importance of an effective framework to enable business value. Delve into the elements of ISACA’s evolutionary framework to understand how COBIT 5 covers the business end-to-end and helps you effectively govern and manage enterprise IT. Developed for anyone interested in obtaining foundation-level knowledge of COBIT, the course explains the COBIT framework and supporting materials in a logical and example-driven approach.

FOUNDATION Introduction to ISO 27001:2013 2 Days COURSE DESCRIPTION
COURSE
Introduction to ISO 27001:2013

LEVEL
FOUNDATION

DURATION
2 Days
WHO SHOULD ATTEND

• Professionals who are responsible for handling management systems based on ISO 27001.

• IT and Security professionals 

• Professionals who wish to follow with the ISO27001:2013 Lead Implementer and Lead Auditor courses

DESCRIPTION

Introduction to ISO27001:2013 is a 2-day course, designed to provide a fundamental understanding of the use of the ISO27001:2013 standard which forms the basis for a systematic and integrated approach to audit of an Information Security Management System (ISMS). ISO27001:2013 standard aids organisations to manage the security of their financial information, employee information, intellectual property, third-party data that has been entrusted to the organisation and similar information assets. 

Why you should attend

  • The course provides a taster to the ISO27001:2013 standard
  • The course helps you decide if your organisation is in a position to implement the standard.
  • This course is designed to benefit all IT and Security professionals, regardless of whether you directly get involved in the implementation of management systems based on ISO27001:2013 standard or not.
  • The course provides sufficient knowledge on how to effectively utilise the ISO27001:2013 standard

The Introduction to ISO27001:2013 course also serves as a great starter for more in-depth courses such as ISO27001:2013 Lead Implementer and Lead Auditor.

INTERMEDIATE COBIT 5 Implementation 3 Days COURSE DESCRIPTION
COURSE
COBIT 5 Implementation

LEVEL
INTERMEDIATE

DURATION
3 Days
WHO SHOULD ATTEND

IT auditors, IT managers, IT quality professionals, IT leadership, IT developers, process practitioners and managers in IT service providing firms, business managers

DESCRIPTION

Get a practical appreciation of how to apply COBIT 5 to specific business problems, pain points, trigger events and risk scenarios within the organization. Learn how to implement and apply COBIT 5 into your enterprise and how to effectively use it for client initiatives. Attendees will walk away with an appreciation of how to effectively use COBIT 5 for different organizational scenarios. The course material is supported by practical exercises and case-based scenarios. Candidates learn how to apply the COBIT 5 continual improvement lifecycle approach to address requirements and establish and maintain a sustainable approach to governing and managing enterprise IT as “normal business practice”

INTERMEDIATE ISO 27001:2005-2013 Transition Training 2 Days COURSE DESCRIPTION
COURSE
ISO 27001:2005-2013 Transition Training

LEVEL
INTERMEDIATE

DURATION
2 Days
WHO SHOULD ATTEND

Anyone with ISO/IEC 27001 responsibility, including

  • Business Continuity, Risk, Information Security, IT and Operations Managers or Consultants
  • Management system practitioners who will be converting to ISO/IEC 27001:2013
  • Internal and external management system auditors who will be auditing to ISO/IEC 27001:2013
  • People interested in finding out how ISO/IEC 27001:2013 differs from its 2005 version
DESCRIPTION

Are you already familiar with ISO/IEC 27001:2005 and want to find out what has changed in the transition to ISO/IEC 27001:2013? This course is particularly valuable for individuals directly involved in the planning, implementing, maintaining or auditing of an ISO/IEC 27001 Information Security Management System (ISMS).

An experienced instructor will explain the new ISO (high level) structure applied to new management systems and then through application: explain the resulting differences between ISO/IEC 27001:2005 and ISO/IEC 27001:2013, while explaining the impact of additions and amendments contained within the new international standard.

The course will also deal with the certification transition where this is applicable to your organization

INTERMEDIATE ISMS (Information Security Management System) Implementation Workshop 3 Days COURSE DESCRIPTION
COURSE
ISMS (Information Security Management System) Implementation Workshop

LEVEL
INTERMEDIATE

DURATION
3 Days
WHO SHOULD ATTEND

This course is designed for people assigned to implement an ISMS practically e.g. managers already involved with control of another management system, consultants

DESCRIPTION

Two days  ISMS  Foundation course gives a thorough introduction to Information

Security Management, together with the requirements for ISMS implementation.

Objectives - To give an understanding of:

•  What an information security management system (ISMS) is and how it can help

business

•  Why companies are going for registration to ISO 27001:2013

•  The basic registration process

•  Where to get help and information

•  Where to start to implement a system

•  The ISO 27001 standard and its documentation requirements

•  Risk assessment

•  To identify the requirements for an ISMS

•  To explain the tools used to meet the requirements

•  To assist people in attaining the skills to be able to implement an effective ISMS

•  The relationship between ISO/IEC 17799:2000 & ISO 27001:2013

•  The control objectives in ‘Annex A’

•  A statement of applicability and a risk treatment plan •  The audit process utilising a risk treatment plan

INTERMEDIATE 1 Day COURSE DESCRIPTION
COURSE

LEVEL
INTERMEDIATE

DURATION
1 Day
ADVANCED COBIT 5 Assessor for Security 3 Days COURSE DESCRIPTION
COURSE
COBIT 5 Assessor for Security

LEVEL
ADVANCED

DURATION
3 Days
WHO SHOULD ATTEND

Internal and external auditors, IT auditors and consultant

DESCRIPTION

The COBIT 5 Assessor course provides a basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model (PAM). Evidence-based to enable a reliable, consistent and repeatable way to assess IT process capabilities, this model helps IT leaders gain C-level and board member buy-in for change and improvement initiatives.

Assessment results provide a determination of process capability. They can be used for process improvement, delivering value to the business, measuring the achievement of current or projected business goals, benchmarking, consistent reporting and organizational compliance.

ADVANCED Certified Information Security Manager (CISM) 5 Days COURSE DESCRIPTION
COURSE
Certified Information Security Manager (CISM)

LEVEL
ADVANCED

DURATION
5 Days
WHO SHOULD ATTEND
  • Information Security Managers
  • Aspiring Information Security Managers 
  • IS/IT Consultants
DESCRIPTION

The demand for skilled information security management professionals is on the rise, and the CISM certification is the globally accepted standard of achievement in this area.

CISMs understand the business. They know how to manage and adapt technology to their enterprise and industry.

  • Demonstrates your understanding of the relationship between an information security program and broader business goals and objectives

Distinguishes you as having not only information security expertise, but also knowledge and experience in the development and management of an information security program

  • Puts you in an elite peer network
  • Is considered essential to ongoing education, career progression and value delivery to enterprises.
ADVANCED ISO 27001:2013 Lead Implementer 5 Days COURSE DESCRIPTION
COURSE
ISO 27001:2013 Lead Implementer

LEVEL
ADVANCED

DURATION
5 Days
EXPERT Certified in the Governance of Enterprise IT (CGEIT) 5 Days COURSE DESCRIPTION
COURSE
Certified in the Governance of Enterprise IT (CGEIT)

LEVEL
EXPERT

DURATION
5 Days
EXPERT (ISC)2 Certified Information Systems Security Professional (CISSP) 5 Days COURSE DESCRIPTION
COURSE
(ISC)2 Certified Information Systems Security Professional (CISSP)

LEVEL
EXPERT

DURATION
5 Days
EXPERT ISO 27001:2013 Lead Auditor 5 Days COURSE DESCRIPTION
COURSE
ISO 27001:2013 Lead Auditor

LEVEL
EXPERT

DURATION
5 Days
ON THE FIELD
COMPUTER FORENSICS
LEVEL COURSE DURATION  
FOUNDATION Corporate Fraud 3 Days COURSE DESCRIPTION
COURSE
Corporate Fraud

LEVEL
FOUNDATION

DURATION
3 Days
WHO SHOULD ATTEND

CXOs, Chief Internal Auditors, Heads of Internal Audit, Chief security officers, Headsof Risk Management, Heads of Legal Department, Heads of Regulatory Compliance, Heads of Legal, In-house Legal Counsel, Accountants, Internal, External Auditors

DESCRIPTION

This course combines fraud accounting with digital forensics and explains to the participants the nature of financial fraud, how to detect fraudulent activities, and most importantly how to investigate any type of financial fraud. It also explores the various possible avenues of computer-based investigations. The training focuses on audit techniques, fraud detection techniques, accounting and law, practically auditing and investigation of frauds, collection of evidence/documentation that can stand the test of legal scrutiny and write succinct, factual reports. It is power-packed with case studies designed to give participants a clear idea of real-world frauds and how investigative techniques can be deployed to nail the fraudsters and determine the extent and exact nature of the fraud. 

The objectives of this course is as follows:

•  Understanding nature of fraud and fraudster

•  Purpose of Investigation

•  How to Detect Large Value Frauds

•  Forensic Auditing Techniques

•  Computer-based Forensics

•  Data Analytics for Fraud Detection and Investigation

•  Evidence Presentation •  Report Writing and Articulation

FOUNDATION CSI: Computer System Investigation 2 Days COURSE DESCRIPTION
COURSE
CSI: Computer System Investigation

LEVEL
FOUNDATION

DURATION
2 Days
WHO SHOULD ATTEND

CISO and Staff

Chief Technology Officers and Staff

Computer Security Officers and staff

Managers at all levels who use networks and are concerned about protecting

sensitive information

Program Managers

IT Directors / Managers

Law Enforcement Community who are responsible for computer systems

First Responder Communities

Inspector General Staff

Digital and Computer Forensic Executives, Managers, and Staff Incident Response Executives, Managers and Staff

DESCRIPTION

In this 3-day interactive hands-on workshop, participants will discover how to identify an intruder’s footprints and properly gather the necessary evidence to prosecute in a court of law. Securing and analyzing electronic evidence is a central theme in an ever increasing conflict situations and criminal cases. Electronic evidence is critical in the

following situations:

•  Disloyal employees

•  Computer break-ins

•  Possession of pornography

•  Breach of contract

•  Industrial espionage

•  E-mail Fraud

•  Bankruptcy

•  Disputed dismissals

•  Web page defacements

•  Theft of company documents

Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer Forensics Investigators can draw on an array of methods for discovering data that  resides in a computer system, or recovering deleted, encrypted, or damaged file informatio

INTERMEDIATE CSI Reloaded: Incident Response & Forensics 3 Days COURSE DESCRIPTION
COURSE
CSI Reloaded: Incident Response & Forensics

LEVEL
INTERMEDIATE

DURATION
3 Days
ADVANCED EC-Council Computer Hacking Forensic Investigator (CHFI) 5 Days COURSE DESCRIPTION
COURSE
EC-Council Computer Hacking Forensic Investigator (CHFI)

LEVEL
ADVANCED

DURATION
5 Days
ADVANCED (ISC)2 Certified Cyber Forensics Professional (CCFP) 5 Days COURSE DESCRIPTION
COURSE
(ISC)2 Certified Cyber Forensics Professional (CCFP)

LEVEL
ADVANCED

DURATION
5 Days
EXPERT Cybercrime Investigations for Law Enforcement 5 Days COURSE DESCRIPTION
COURSE
Cybercrime Investigations for Law Enforcement

LEVEL
EXPERT

DURATION
5 Days
IT SECURITY PRACTITIONER AND PROFESSIONAL
LEVEL COURSE DURATION  
FOUNDATION Security+ 5 Days COURSE DESCRIPTION
COURSE
Security+

LEVEL
FOUNDATION

DURATION
5 Days
WHO SHOULD ATTEND

IT administrators IT staff

DESCRIPTION

IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place. That’s where CompTIA Security+ comes in. Get the Security+ certification to show that you have the skills to secure a network and deter hackers and you’re ready for the job.

FOUNDATION Network+ 5 Days COURSE DESCRIPTION
COURSE
Network+

LEVEL
FOUNDATION

DURATION
5 Days
WHO SHOULD ATTEND

Network administrator

DESCRIPTION

The stakes are high. Data networks are more crucial for businesses than ever before. They are the lifeline to the critical financial, healthcare and information services that need to function at the highest, most secure level. With a CompTIA Network+ certification, you will possess the key skills to troubleshoot, configure and manage these systems and keep your company productive.

INTERMEDIATE (ISC)2 System Security Certified Practitioner (SSCP) 5 Days COURSE DESCRIPTION
COURSE
(ISC)2 System Security Certified Practitioner (SSCP)

LEVEL
INTERMEDIATE

DURATION
5 Days
ADVANCED Advanced Security Professional 5 Days COURSE DESCRIPTION
COURSE
Advanced Security Professional

LEVEL
ADVANCED

DURATION
5 Days
EXPERT EC-Council Certified Security Analyst (ECSA) 5 Days COURSE DESCRIPTION
COURSE
EC-Council Certified Security Analyst (ECSA)

LEVEL
EXPERT

DURATION
5 Days
TECHNICAL DEEP DIVE
NEXT GENERATION SECURITY
LEVEL COURSE DURATION  
FOUNDATION Mobile Security 3 Days COURSE DESCRIPTION
COURSE
Mobile Security

LEVEL
FOUNDATION

DURATION
3 Days
WHO SHOULD ATTEND

Those tasked with implementing, testing and deploying secure mobile applications and devices

DESCRIPTION

In this course, you learn to mitigate the risks associated with mobile devices as well  as how to develop and deploy mobile applications. You also gain the skills to implement an effective mobile device security strategy for your organization, identify potential flaws in proprietary and third party iOS and Android applications, and leverage development and security best practices.In particular, you will learn how to:

•  Develop secure applications for Android and iOS

•  Leverage OWASP best practices for secure application development

•  Identify and mitigate the most significant threats to mobile apps

•  Protect application data at rest and in motion

•  Implement optimum platform-specific application security configuration •  Secure credentials in Android and iOS Keychains

INTERMEDIATE Social Media Security Professional 3 Days COURSE DESCRIPTION
COURSE
Social Media Security Professional

LEVEL
INTERMEDIATE

DURATION
3 Days
ADVANCED Advanced VoIP Security 2 Days COURSE DESCRIPTION
COURSE
Advanced VoIP Security

LEVEL
ADVANCED

DURATION
2 Days
ADVANCED Malware Analysis & Reverse Engineering 3 Days COURSE DESCRIPTION
COURSE
Malware Analysis & Reverse Engineering

LEVEL
ADVANCED

DURATION
3 Days
EXPERT Advanced Malware Analysis & Reverse Engineering 5 Days COURSE DESCRIPTION
COURSE
Advanced Malware Analysis & Reverse Engineering

LEVEL
EXPERT

DURATION
5 Days
SECURITY POSTURE ASSESSMENT
LEVEL COURSE DURATION  
FOUNDATION Strategic Security Posture Assessment 3 Days COURSE DESCRIPTION
COURSE
Strategic Security Posture Assessment

LEVEL
FOUNDATION

DURATION
3 Days
WHO SHOULD ATTEND

Information Security staff Penetration testers

DESCRIPTION

The overall security plan of an organisation which includes the organisation's approach to security planning to implementation is its security posture. Security Posture is defined by both technical and non-technical policies, procedures and controls that protect the organisation from both internal and external threats. Every organisation regardless of how large or small will sooner or later experience a security breach. The key is to have a plan to get back to business as soon as possible. A Security Posture Assessment enables an organisation to determine how secure its networks and systems are. This course will enable candidates to strategically plan a successful Security Posture Assessment. Both hands-on and theoretical aspects are included in the course. 

INTERMEDIATE AKATI Consulting Penetration Test (ACPT) Level 1 5 Days COURSE DESCRIPTION
COURSE
AKATI Consulting Penetration Test (ACPT) Level 1

LEVEL
INTERMEDIATE

DURATION
5 Days
ADVANCED AKATI Consulting Penetration Test (ACPT) Level 2 5 Days COURSE DESCRIPTION
COURSE
AKATI Consulting Penetration Test (ACPT) Level 2

LEVEL
ADVANCED

DURATION
5 Days
ADVANCED Lead Pentest Professional 5 Days COURSE DESCRIPTION
COURSE
Lead Pentest Professional

LEVEL
ADVANCED

DURATION
5 Days
ADVANCED RESILIA – Cyber Resilience Best Practice 5 Days COURSE DESCRIPTION
COURSE
RESILIA – Cyber Resilience Best Practice

LEVEL
ADVANCED

DURATION
5 Days
EXPERT AKATI Consulting Penetration Test (ACPT) Level 3 5 Days COURSE DESCRIPTION
COURSE
AKATI Consulting Penetration Test (ACPT) Level 3

LEVEL
EXPERT

DURATION
5 Days
EXPERT Emerging Security Threats & Counter Measures 5 Days COURSE DESCRIPTION
COURSE
Emerging Security Threats & Counter Measures

LEVEL
EXPERT

DURATION
5 Days
PUBLIC KEY INFRASTRUCTURE (PKI)
LEVEL COURSE DURATION  
ADVANCED PKI for Security Professionals – A 3 Days COURSE DESCRIPTION
COURSE
PKI for Security Professionals – A

LEVEL
ADVANCED

DURATION
3 Days
PYTHON FOR SECURITY
LEVEL COURSE DURATION  
FOUNDATION Python Essentials 2 Days COURSE DESCRIPTION
COURSE
Python Essentials

LEVEL
FOUNDATION

DURATION
2 Days
WHO SHOULD ATTEND

Advanced users, system administrators and web site administrators who want to use Python to support their server installations, as well as anyone else who wants to automate or simplify common tasks with the use of Python script

DESCRIPTION

This 4 day course leads the student from the basics of writing and running Python scripts to more advanced features such as file operations, regular expressions, working with binary data, and using the extensive functionality of Python modules. Extra emphasis is placed on features unique to Python, such as tuples, array slices, and output formatting. This is a hands-on programming class. All concepts are reinforced by informal practice during the lecture followed by graduated lab exercises. Python Programming is a practical introduction to a working programming language, not an academic overview of syntax and grammar. Students will immediately be able to use Python to complete tasks in the real world.

ADVANCED Python for Security Professionals 3 Days COURSE DESCRIPTION
COURSE
Python for Security Professionals

LEVEL
ADVANCED

DURATION
3 Days
ADVANCED Python for Incident Response & Forensics 3 Days COURSE DESCRIPTION
COURSE
Python for Incident Response & Forensics

LEVEL
ADVANCED

DURATION
3 Days
SECURE SOFTWARE ENGINEERING
LEVEL COURSE DURATION  
FOUNDATION ACL: Certified Secure Software Engineer 3 Days COURSE DESCRIPTION
COURSE
ACL: Certified Secure Software Engineer

LEVEL
FOUNDATION

DURATION
3 Days
WHO SHOULD ATTEND

Software Engineers including managers and team leaders of software developing companies. Students studying software development can also follow this training program

DESCRIPTION

This hands-on training program will teach the students that the secure code they develop need to be secured in architecture, design, implementation, operations, automation and testing. This course exposes you to 'Secure Coding' fundamentals and prepares you to dive into common languages. C|SSE course curriculum will touch on programing languages such as C, Java, .NET, but it is not a specialized coding course. C|SSE course prepares you for extensive secure coding training courses specializing in a particular programing language offered by the International Council of Electronic Commerce Consultants (EC-Council), USA.

Students going through C|SSE training will learn:

•  Provide insight into current efforts and future plans for corporate network security via Secure Coding.

•  Provide helpful perspective on nature of today's Internet security risk 

•  Provide guidelines to achieving goals of rock-solid code

ADVANCED EC-Council Certified Secure Programmer (ECSP) 5 Days COURSE DESCRIPTION
COURSE
EC-Council Certified Secure Programmer (ECSP)

LEVEL
ADVANCED

DURATION
5 Days
ADVANCED C/C++ Secure Coding 3 Days COURSE DESCRIPTION
COURSE
C/C++ Secure Coding

LEVEL
ADVANCED

DURATION
3 Days
ADVANCED Advanced Android Secure Coding 3 Days COURSE DESCRIPTION
COURSE
Advanced Android Secure Coding

LEVEL
ADVANCED

DURATION
3 Days
ADVANCED Advanced iOS Secure Coding 3 Days COURSE DESCRIPTION
COURSE
Advanced iOS Secure Coding

LEVEL
ADVANCED

DURATION
3 Days
ADVANCED .NET, C#, ASP.NET Secure Coding 3 Days COURSE DESCRIPTION
COURSE
.NET, C#, ASP.NET Secure Coding

LEVEL
ADVANCED

DURATION
3 Days
ADVANCED JAVA Secure Coding 3 Days COURSE DESCRIPTION
COURSE
JAVA Secure Coding

LEVEL
ADVANCED

DURATION
3 Days
ADVANCED Advanced Web Application Security 5 Days COURSE DESCRIPTION
COURSE
Advanced Web Application Security

LEVEL
ADVANCED

DURATION
5 Days
ADVANCED Secure Coding in PL/SQL (Procedural Language/Structured Query Language) 2 Days COURSE DESCRIPTION
COURSE
Secure Coding in PL/SQL (Procedural Language/Structured Query Language)

LEVEL
ADVANCED

DURATION
2 Days
VIRTUALIZATION SECURITY
LEVEL COURSE DURATION  
FOUNDATION Virtualization Security Essentials 3 Days COURSE DESCRIPTION
COURSE
Virtualization Security Essentials

LEVEL
FOUNDATION

DURATION
3 Days
WHO SHOULD ATTEND

· Anybody interested in working with virtualised servers

· Individuals already working the Virtual Infrastructure environment where they are responsible for the implementation and configuration of virtualized servers using VMware ESXi and VMware VirtualCenter

DESCRIPTION

This course delivers the fundamental knowledge required to secure a virtualized computer environment in an enterprise. The course provides candidates the skill set and knowledge to operate in a modern IT organization that is utilizing virtualization techniques and allows IT professionals to operate effectively in a cloud environment as they speak the appropriate language, and demonstrate an understanding of the key concepts and terminology relevant to virtualization. It provides the baseline foundation needed in order to successfully complete subsequent vendor-specific training programs

EXPERT Certified Virtualization Security Expert 5 Days COURSE DESCRIPTION
COURSE
Certified Virtualization Security Expert

LEVEL
EXPERT

DURATION
5 Days
CRITICAL INFRASTRUCTURE PROTECTION
LEVEL COURSE DURATION  
FOUNDATION ICS (Industrial Control Systems) Cyber Security Awareness 1 Day COURSE DESCRIPTION
COURSE
ICS (Industrial Control Systems) Cyber Security Awareness

LEVEL
FOUNDATION

DURATION
1 Day
WHO SHOULD ATTEND

The course is designed for the range of individuals who work in, interact with, or can affect industrial control system environments, including asset owners, vendors, integrators, and other third parties. These personnel primarily come from four domains

  • IT (includes operational technology support)
  • IT security (includes operational technology security)
  • Engineering
  • Corporate, industry, and professional standards
DESCRIPTION

The course is designed to ensure that the workforce involved in supporting and defending industrial control systems is trained to keep the operational environment safe, secure, and resilient against current and emerging cyber threats

INTERMEDIATE Understanding, Assessing & Securing Industrial Control Systems 5 Days COURSE DESCRIPTION
COURSE
Understanding, Assessing & Securing Industrial Control Systems

LEVEL
INTERMEDIATE

DURATION
5 Days
INTERMEDIATE ISA99/IEC 62443 Cybersecurity Fundamental Specialist Certificate Program 2 Days COURSE DESCRIPTION
COURSE
ISA99/IEC 62443 Cybersecurity Fundamental Specialist Certificate Program

LEVEL
INTERMEDIATE

DURATION
2 Days
ADVANCED Lead SCADA (Supervisory Control and Data Acquisition) Security Professional 5 Days COURSE DESCRIPTION
COURSE
Lead SCADA (Supervisory Control and Data Acquisition) Security Professional

LEVEL
ADVANCED

DURATION
5 Days
NETWORK SECURITY
LEVEL COURSE DURATION  
FOUNDATION Network Security Essentials 3 Days COURSE DESCRIPTION
COURSE
Network Security Essentials

LEVEL
FOUNDATION

DURATION
3 Days
WHO SHOULD ATTEND

Network Server Administrators,

Network Policy Designers,

Network Architects/Designers, 

Firewall Administrators, 

Systems Administrators, 

E-Business Consultants, 

Application Developers, 

Support Staff and IT Security Officers

DESCRIPTION

This course is designed to provide fundamental skills that require analyzing the      internal and external security threats against a network, and to develop security policies that will protect their information. Participants will learn various methods to evaluate network and Internet security issues and design, and ways to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them.

ADVANCED EC-Council Network Security Administrator (ENSA) 5 Days COURSE DESCRIPTION
COURSE
EC-Council Network Security Administrator (ENSA)

LEVEL
ADVANCED

DURATION
5 Days
EXPERT Network Security Master-class: Wired & Wireless Network 3 Days COURSE DESCRIPTION
COURSE
Network Security Master-class: Wired & Wireless Network

LEVEL
EXPERT

DURATION
3 Days
ERP SECURITY
LEVEL COURSE DURATION  
FOUNDATION SAP® ERP Security Essentials 2 Days COURSE DESCRIPTION
COURSE
SAP® ERP Security Essentials

LEVEL
FOUNDATION

DURATION
2 Days
WHO SHOULD ATTEND

Starting Role Administrators

Security / Compliance Manager

Security / Compliance Officer

Security / Compliance Consultant

Auditors / Internal controls Advisors

SAP Authorization Consultants

SAP Consultants

DESCRIPTION

The training guides through the security processes of SAP. It further highlights key security elements for protecting the system and the business processes in the SAP system. At the end of this training you will be able to create a basic authorization concept and understand how SAP security works in general

ADVANCED SAP® ERP Security Advanced 3 Days COURSE DESCRIPTION
COURSE
SAP® ERP Security Advanced

LEVEL
ADVANCED

DURATION
3 Days
DATA SECURITY
LEVEL COURSE DURATION  
FOUNDATION Data Classification & Security 1 Day COURSE DESCRIPTION
COURSE
Data Classification & Security

LEVEL
FOUNDATION

DURATION
1 Day
WHO SHOULD ATTEND

IT Audit staff 

IT Policy makers

DESCRIPTION

A Data Classification Program is an extremely important first step to building a secure organization. Classifying data is the process of categorizing data assets based on nominal values according to its sensitivity (e.g., impact of applicable laws and regulations). By classifying data, the company can prepare generally to identify the risk and impact of an incident based upon what type of data is involved. The classifications as listed (public, internal, confidential) give a basis for determining the impact based upon the level and type of access to data.

INTERMEDIATE Secure Big Data Implementations 1 Day COURSE DESCRIPTION
COURSE
Secure Big Data Implementations

LEVEL
INTERMEDIATE

DURATION
1 Day
EXPERT Hardening & Securing Oracle 1 Day COURSE DESCRIPTION
COURSE
Hardening & Securing Oracle

LEVEL
EXPERT

DURATION
1 Day
EXPERT Oracle Database Security Auditing 1 Day COURSE DESCRIPTION
COURSE
Oracle Database Security Auditing

LEVEL
EXPERT

DURATION
1 Day
CLOUD SECURITY
LEVEL COURSE DURATION  
FOUNDATION Cloud Essentials 2 Days COURSE DESCRIPTION
COURSE
Cloud Essentials

LEVEL
FOUNDATION

DURATION
2 Days
WHO SHOULD ATTEND

·       IT students interested in cloud computing

·       Employees interested in the business aspects of the IT infrastructure

·       Company executives who have to make financial or IT business decisions

·       IT staff and freelancers who want to gain an understanding of cloud computing

DESCRIPTION

We've all heard of cloud computing and the chances are you are already using it when we access e-mail, watch videos online or listen to music but what exactly is it? This entry level course explains what actually constitutes cloud computing. We look not only at the technical aspects but the business issues (benefits and risks).

The curse will cover:

  • Models of cloud computing available
  • Learning common cloud terminology
  • Things to consider before moving to the cloud
  • Which parts of the IT department we can move to the cloud
  • Considerations if our cloud provider goes out of business
  • How to migrate our IT services to the cloud
  • Cost considerations (pros and cons)
  • IT Governance and cloud computing (managing it all)
  • Understanding the big vendor options
INTERMEDIATE Cloud Computing Security 3 Days COURSE DESCRIPTION
COURSE
Cloud Computing Security

LEVEL
INTERMEDIATE

DURATION
3 Days
ADVANCED (ISC)2 Certified Cloud Security Professional (CCSP) 5 Days COURSE DESCRIPTION
COURSE
(ISC)2 Certified Cloud Security Professional (CCSP)

LEVEL
ADVANCED

DURATION
5 Days