Available courses

Certificate in Digital Forensics

Digital Forensics professionals are needed to provide solutions to individual, corporate and government
What student learns
  • Introduction to Digital Forensics (Practical Lab Setup)
  • Digital Forensics Imaging (FTK)
  • Digital Forensics Analysis (AutoPsy)
  • Network Forensics
  • Social Media Forensics  
  • Memory Forensics and Analysis
  • Database Forensics
  • Mobile Forensics (Android and Iphone)
  • Report Writing / Expert Witness
  • Forensic case, report writing & presentation
Digital Evidence Examination Process Imaging
  • Introduction to OSFClone
  • Introduction to WINUFO
  • Hashes and Checksums
  • Conducting Key word searches
  • Evidence Assessment
  • Evidence Acquisition
  • Evidence Preservation
  • Evidence Examination and Analysis
  • Network analysis (Wireshark)
  • Password hacking (Hydra)
  • Collecting various log files for evidence
  • Creating understandable and accurate reports
Digital Forensics Tools
  • Digital Forensics Framework
  • Autopsy
  • FTK Imager
  • KALI Linux

Duration
Between one to three months

Entry Requirements

  • Availability in Nairobi / Kikuyu depending on the student availability
  • Student must have a valid ID or Passport
  • Passion in Digital Forensics


Objectives of the Course
1. One year membership to those who are not our active members
2. Teach and train hands on skills on digital forensics
3. Improve your career as a digital forensics investigator
4. Create your own self employment in digital forensics
5. Develop a career in digital forensics investigation
6. An opportunity to work with our partners companies
7. Opportunity to take an international exam (Certified Computer Examiner / CHFI)



Certificate in CyberSecurity

Introduction to CyberSecurity And  Basic terminologies

  • Setting up Linux in VirtualBox (CENTOS / UBUNTU)
  • TCP/IP basics, Protocols and Ports
  • Application security, E-mail security, Social networking and messaging (Zimbra and exchange loopholes)
  • Questions and answer session
  • Assignment on port scanning and services enumeration


Insider Security Threat

  • 2017 insider threat report
  • Malicious insider / Exploited Insider / Careless Insider
  • Industrial espionage / I.T sabotage / Payment card breach
  • Example of insider risk breaches
  • Identity management and governance
  • Mitigating insider security risks / Social Engineering
  • Bring Your Own Device (BYOD)
  • Assignment user awareness


Cloud Security

  • Internet of things / Types of clouds
  • Private cloud security / Public cloud security
  • Data breaches / Data loss
  • Account and Service Traffic Hijacking
  • Insecure API / Denial of service / Malicious insider / Shared technology
  • Information security policy for cloud
  • Assignment on cloud security


Mitigating Threats And Dangerous Malwares

  • What are ransomware and how are they prevented / cured (CryptoLocker)
  • Trojan horses and behavioral analytics (Dridex, Zeus)
  • Baseline security policies, Resource access
  • Identify and contain malware threats / Secure Windows Endpoint
  • Patch operating systems / Patch applications /
  • Cyber Intelligence (Open Source Intelligence)
  • Know your cyber enemies
  • Computer Incident Response Team (CERT: OTRS)


Business Continuity And Organizational Security

  • Redundancy planning, Disaster recovery, Environmental controls
  • ISO 27001 implementation procedures
  • Information Security Policy design / adoption
  • User cyber security awareness
  • Setting up SIEM (Security Information and Events Management:  AlienVault)
  • Introduction to digital forensics / Investigative mindset (OSForensics)
  • Assignment on Logalyze setup


Information Security Tools

  • OpenVAS (Vulnerability Assessment)
  • Nessus (Vulnerability Assessment)
  • Snort (Scanning and Vulnerabilities)
  • BURP Suite (Web Application Scanning)
  • Web Shag (Web Scanning)
  • BlindElephant Web Scanner
  • ResolveHost (Resolve Domains to Hostname)
  • OSSEC (Network Forensics)

Duration
Between one to three months
Entry Requirements
    Availability in Nairobi / Kikuyu depending on the student availability
    Student must have a valid ID or Passport
    Passion in Digital Forensics
Objectives of the Course
1. One year membership to those who are not our active members
2. Teach and train hands on skills on CyberSecurity
3. Improve your career as a CyberSecurity specialist
4. Create your own self employment in CyberSecurity
5. Develop a career in CyberSecurity
6. An opportunity to work with our partner companies for handons experience
7. Opportunity to take an international exam (Certified Ethical Hacker)





Site announcements

(No announcements have been posted yet.)