Africa Cyber Immersion Centre offers a wide range of Cybersecurity training courses and students can choose from a variety of learning options, including virtual classroom, live face-to-face,or self-paced classes. Our courses provide extensive hands-on exercises and case studies. Search our catalog to find training by course.

ON-SITE TRAINING
onsite-logo
LIVE ON-LINE TRAINING
onsite-logo
CUSTOMIZED TRAINING
onsite-logo
E-LEARNING

Programme

Course Overview

Penetration Testing Traning

ACIC’s Penetration Testing training teaches the methodologies, techniques, and tactical tools of modern adversaries. This course is uniquely designed to meet local use cases such as ATM attacks, Mobile attack and starts with proper planning, scoping and recon, then dives deep into scanning, target exploitation, web app manipulation, and attacking the Windows domain, with over 30 detailed hands-on labs throughout. The course is chock full of practical, real-world tips from some of the best penetration testers to help you do your job safely, efficiently...and with great skill.

Who should attend
ICT Teams
System Admins
Database Administrators
Security personnel
Auditors
Red Team Members
Blue Team Members
Forensics specialists
Event Details
Penetration Testing
5 days
8:30 AM to 4:30 PM March, Kenya (18 - 22nd) May, Nigeria (18-22nd)

Course Overview

Certified Ethical Hacking (C|EH v10) Penetration Testing Traning

C|EH is the world’s most advanced ethical hacking course covering 20 of the most important security domains any individual will need when they are planning to beef-up the information security posture of their organization. The course provides hacking techniques and tools used by hackers and information security Professionals.

Who should attend
ICT Teams
System Admins
Database Administrators
Security personnel
Infrastructure
Red Team Members
Blue Team Members
Forensics specialists
Event Details
Certified Ethical Hacking and Countermeasures Version: 10
5 days
8:30 AM to 4:30 PM Location and Dates: February, 24th-28th- Nairobi Kenya June, 25th - 29th- Nairobi Kenya September, 24th – 28th- Nairobi Kenya

Course Overview

Cyber Defense and Network Security

This training is focused on improving the blue- teaming capabilities of the attendees to allow them detect and respond to network attacks in a timely manner. Candidates will be required to perform practical blue-teaming exercises to successfully complete the course. Successful candidates will be provisioned with their certificate and will gain Cyber Immersion Club membership.

Who should attend
ICT Teams
System Admins
Database Administrators
Security personnel
Infrastructure
Red Team Members
Penetration
Blue Team Members
Forensics specialists
Event Details
Cyber Defense and Network Security
5 days
8:30 AM to 4:30 PM, August, 17th-21 st , Mauritius

Course Overview

Risk Quantification and Exposure Analysys

TAre you struggling to measure and communicate your current cybersecurity risk posture in monetary terms? This workshop will enable ICT, Audit, Operations and Risk Management professionals to provide ExCo, the Board and regulators with objective, quantifiable and observable cyber security metrics to enable key stakeholders to make strategic decisions.

Who should attend
ICT and Information Security Professionals
Risk Management and Audit Officers
Legal and Compliance Officers
Finance and Strategy Managers
Event Details
Cyber Risk Quantification and Exposure Analysis
5 days
March, 23rd-27th , Botswana April, 6th-10th , Kenya May, 11-15th , Tanzania June, 22-25 th , Ethiopia July, 6th-10 th , Nigeria September,21 -25 th Tanzania October 12th-16 th , Botswana November,9th -13 th , Kenya

Course Overview

Operating and managing SIEM

This is a 2-day in class course that prepares non- technical business managers to understand, assess and take a proactive posture in cyber security. Along the way, attendees investigate risk assessment and management frameworks that help mitigate the risks, as well as identify potential security gaps that could prove a liability. This course enables non-technical business managers to address and handle the threats from emerging cyber security advances that can decimate an organization.

Who should attend
Security Analysts
Security Architects
Senior Security Engineers
TEchnical Security Managers
SOC Analysts
SOC Engineers
SOC Managers
CND Analysts
Security Monitoring
System Administrators
Cyber THreat Investigators
Event Details
SIEM Training
3 days
8:30 AM to 4:30 PM Location and Dates: April, 15-17 th , Kenya October, 7th- 9 th , Kenya

Course Overview

Business Managers Masterclass

This is a 2-day in class course that prepares non- technical business managers to understand, assess and take a proactive posture in cyber security. Along the way, attendees investigate risk assessment and management frameworks that help mitigate the risks, as well as identify potential security gaps that could prove a liability. This course enables non-technical business managers to address and handle the threats from emerging cyber security advances that can decimate an organization.

Who should attend
Human Resource Managers
Procurement Managers
Operations Managers
Legal Teams
Finance teams
Event Details
Masterclass for Business Managers
3 days
8:30 AM to 4:30 PM Location and Dates: April, 8th-10 th , Kenya July, 1st-3 rd , Nigeria

Course Overview

Exco/Board Training

The objective of this course is to provide Senior Executives and Board members with a thorough and operational knowledge of information security so that this critical area is recognized as a management issue and not an IT issue. In this workshop, CEOs and Board Directors will get first-hand information on how companies are managing their information security risk and building secure organizations in the face of more sophisticated attacks. The course will be undertaken using a moderated roundtable format with panel discussions and structured breakouts.

Who should attend
Executives
Board Members
Event Details
On demand

Course Overview

End User Training

The EndUser Training Content Series is the latest in cyber security training for employees. Equipped with a variety of brand-new Training Content Styles and fresh updates to our existing computer-based training styles, we evoke engagement of every employee, regardless of their comprehension level through dynamic, effective training content, teaching best-in-class security behaviors. The expertly created, comprehensive suite of cyber security awareness training for employees will help you build a powerful program that embodies your organization’s needs and learning levels. We’ve taken the guesswork out of building a program to suit your organization’s specific culture. Training can be crafted into a custom mix of training to cover the relevant awareness topics and can be hosted on nearly any platform.

Who should attend
All Employees
Event Details
End User Training
On demand