ICT Security training Programs

Lecture Rooms

CIS Block B


ICT Security

Certified Information Systems Auditor (CISA) – The CISA designation is a globally recognized certification for IS audit control, assurance and security professionals. Being CISA-certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise. Certified Ethical Hacker (CEH) – become a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and use the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s).

Certified Information Systems Security Professional (CISSP) – is a globally recognized certification in the field of IT security whereby one gets deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. Certified Forensic Expert Training (CHFI) – one gets expertise in forensic techniques and procedures, standards of practice, and legal and ethical principles to assure accurate, complete, and reliable digital evidence admissible in a court of law. It also indicates the ability to apply forensics to other information security disciplines, such as e-discovery, malware analysis, or incident response. In other words, the CCFP is an objective measure of excellence valued by courts and employers alike. TOGAF – The Open Group Architecture Framework (TOGAF) is a framework for enterprise architecture that provides an approach for designing, planning, implementing, and governing an enterprise information technology architecture. TOGAF is a high-level approach to design. It is typically modelled at four levels: Business, Application, Data, and Technology. It relies heavily on modularization, standardization, and already existing, proven technologies and products. Control Objectives for Information and Related Technologies (COBIT ) an IT governance framework and supporting toolset that allows managers to bridge the gap between control requirements, technical issues and business risks. Vulnerability Assessment Training – in this training course, learn how to expose infrastructure, server, and desktop vulnerabilities, create and interpret reports, configure vulnerability scanners, detect points of exposure, and prevent network exploitation.

Systems Security Training – Network Security Training – learn how to take physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform. Information Security Awareness Training – Security awareness training is a formal process for educating employees about computer security (e.g. corporate policies and procedures for working with information technology (IT)). Employees receive information about who to contact if they discover a security threat and taught that data is a valuable corporate asset. Regular training is particularly necessary for organizations with high turnover rates and those that rely heavily on contract or temporary staff. Database Security – train in measures used to protect and secure a database or database management software from illegitimate use and malicious threats and attacks.

Website /Applications security – train and expand one’s knowledge and demonstrate skills in developing hacker-resistant software, reduce production costs, application vulnerabilities and delivery delays, secure each phase of the software lifecycle and implement web application security programs. Information Technology

Infrastructure Library (ITIL) – learn the best practices for businesses or companies to more effectively manage their IT services. Project Planning (PMP) – Recognized and demanded by organizations worldwide, the PMP validates one’s competence to perform in the role of a project manager, leading and directing projects and teams. Child Online Protection/Digital Parenting – designed to show parents how to use the tools their kids are using so they can advise and protect their kids online.

Business Continuity – learn to plan and prepare to ensure that an organization can continue to operate in case of serious incidents or disasters and is able to recover to an operational state within a reasonably short period.

VMware Certified Professional (VCP) – get skills in designing, installing, and managing VMware vSphere and a VMware NSX environment Junos Certification (JNCIA) – is designed for experienced networking professionals with beginner-to-intermediate knowledge of the Juniper Networks Junos OS, networking fundamentals, and basic Internet routing.

Office 365 – train to use Microsoft Office 365 applications or software, data, and computing needs that are accessed, stored, and occur over the Internet or the cloud. These applications include Word, Excel, PowerPoint, OneNote, Outlook, Publisher, and Access etc.