Cybersecurity Training
1. Cybersecurity: Detect & Response (SOC Lite)
Overview:
Equip your IT teams with the skills to detect, investigate, and respond to cyber threats in real time.
This course covers SOC operations, incident handling, phishing defence, and use of threat
intelligence platforms.
Ideal For: Security analysts, support engineers, SOC teams
Outcomes:
• Build incident response playbooks
• Implement alert triage processes
• Understand SIEM integration basics
Duration: 3 – 5 Days
2. Identity & Access Management (IAM)
Overview:
Gain a deep understanding of user access control, identity governance, and modern authentication
strategies including MFA, RBAC, and PAM.
Ideal For: IAM specialists, IT managers, compliance officers
Outcomes:
• Design secure IAM policies
• Deploy identity governance tools
• Achieve regulatory IAM compliance
Duration: 3 – 4 Days
3. Cyber Strategy & Governance (CISO-as-a-Service)
Overview:
This leadership-focused programme helps executives align cyber risk with business strategy. Learn to
structure security governance, risk frameworks, and board-level cyber reporting.
Ideal For: CIOs, CISOs, senior leadership, enterprise risk teams
Outcomes:
• Define enterprise cyber risk posture
• Lead cybersecurity transformation projects
• Align compliance with POPIA & global standards
Duration: 2 – 3 Days
4. Application Security (DevSecOps)
Overview:
Embed security into the software development lifecycle. This course focuses on secure coding,
vulnerability scanning, and CI/CD pipeline security.
Ideal For: Developers, DevOps teams, QA leads, AppSec engineers
Outcomes:
• Apply SAST/DAST tools
• Conduct secure code reviews
• Shift-left with DevSecOps practices
Duration: 3 – 5 Days
5. Infrastructure, Cloud & Emerging Tech Security
Overview:
This course helps your teams secure cloud, on-prem, and hybrid infrastructure. Learn about zero
trust, cloud misconfiguration, AI/IoT risks, and infrastructure hardening.
Ideal For: Cloud engineers, infrastructure teams, security architects
Outcomes:
• Design secure cloud architectures
• Mitigate cloud-native threats
• Apply zero trust architecture
Duration: 3 – 5 Days