Cybersecurity Courses
Certified Penetration Tester
The Certified Penetration Tester certification (CPENT) is an expert-level cybersecurity qualification. It has a hands-on, highly technical focus that covers the gamut of IT systems. The certification proves one's skills to conduct penetration tests against enterprise IT systems from business information systems to industrial control systems and IoT networks.
Certified Hacking Forensic Investigator
The CHFI certification validates the holders' skill to perform internal audits and conduct civil and criminal investigations into digital incidents or cases where digital evidence needs to be collected. This course teaches you how to gather digital evidence in a professional manner and present findings as an expert witness.
Certified Network Defender
The Certified Network Defender (CND) qualification ensures the holder has the skills to defend systems against cybersecurity threats, detect cybersecurity breaches and have processes in place to recover from a breach. The Certified Network Defender (CND) certification is an ideal stepping stone to the CEH certification.
Certified Ethical Hacker (CEH)
The Certified Ethical Hacker (CEH) qualification is the premier certification from EC Council. Our course teaches students the tools and techniques used by hackers to compromise systems, delivered by professional instructors to ensure you pass on your first attempt.
ISO/IEC 27002 Certification Training Courses
Our ISO/IEC 27002 training courses cover a range of requirements for those interested in ISO27002. Our awareness training is for thos who require a general knowledge about Information System Controls whilst our managerial level courses are for thos who need to implement and manage control systems.
ISO/IEC 27001 Certification Training Courses
Our suite of PECB ISO./IEC27001 training courses will provide you with the knowledge to pass your ceritication exam and effectively implment, manage and audit your entities Information Security Management System in an ISO27001 compliant manner.
ISO 31000 Risk Management & Training Courses
Learn how to manage risk in a ISO 31000 compliant manner with our range of ISO31000 training courses. Our courses cover fundamentals, for those who just need awareness of risk management, to advanced topics for senior managers who need to implement and manage risk processes.
CISM Certification Training
The Certified Information System Manger (CISM) certification from ISACA proves that one has the skill and experience to manage the IT security function in an organsation. The holder of this certificate can carry out IT governance functions, set up and maintain appropriate policy for IT security and manage security incident and response processes. Our qualified trainers, with years of practical experience will ensure you master the key knowledge domains of CISM to get certified and turbo boost your career.
CISA Certification Training
A qualified Certified Information System Auditor (CISA) candidate has the skills to audit information system controls, evaluate system acquisitions and assess the effectiveness of IT governance and management. Our course covers all the knowledge domain areas required to master the CISA objectives and obtain you CISA qualification. Get trained by qualified experts and advanced your career.
CRISC Certification Training
The Certified in Risk and Information Systems Control (CRISC) certification from ISACA certifies that the holder has the knowledge, skill & experience to identify, assess, mitigate and monitor risks to an organisation's critical information systems. The holder knows how to conduct, manage and evaluate cybersecurity risks faced by an organisation. Our in-depth course, led by expert instructors, will ensure you understand and master the key objectives and get certified.
CGEIT Certification Training
The Certified in the Governance of Enterprise IT (CGEIT) certification is aimed at those that are responsible for the assessment, design, implementmentation and management of enterprise IT governance systems. Learn how to develop, manage and implment governance and compliance systems, manage performance and resources to obtain your key organisational objectives. Our instructors will ensure you master the CGEIT subject matter, pass the certificaitone exam and accelerate your career in cybersecurity.
Essentials: Security Essentials
The Security Essentials certification from LPI is a comprehensive cyber security aweness certification aimed at end-users. It will provide candidates with the skill and knowledge to defend against Cybersecurity attacks and prevent privacy and security breaches.
LPIC-303: Enterprise Security
The Linux Enterprise Security certification certifies that holders have the skills and knowledge to harden Linux servers against Cybersecurity threats. From network security to hard disk encryption and mandatory access controls this certification validates your Linux security skills.
Linux Security Fundamentals
The Linux Security Fundamentals course fromThe Linux Foundation coves the basic skills & knowledge one needs to secure Linux based systems. Learn baout firewalls, encryption and logging & auditing. Become a cybersecurity professional with The Linux Foundation
Please contact us for any queries via phone or our contact form. We will be happy to answer your questions.
Ferndale,
2194 South Africa
Tel: +2711-781 8014 (Johannesburg)
+2721-020-0111 (Cape Town)
ZA
contactform.caption