Intermediate Courses
We will mentor you through the more in depth phases and nurture your skills to confidence in the subjects.

AWS Cloud Architect
This course is designed to enable students to build a reliable IT infrastructure using the AWS Cloud. It is driven by the singular goal of giving students the knowledge...

Cyber Security Strategic Planning, Policy & Leadership
The Cybersecurity Strategy Planning, Policy & Leadership course is designed with the intention ...

Cyber Security Threat Hunting
Cybercrime will keep causing a major slowdown in the years to come as the business world proceed with digitalisation. Despite implementing all traditional...

General Data Protection Regulation
This course is designed to introduce students to the EU General Data Protection Regulatory (GDPR) standard...

Identity Access Management
As the world continues to evolve and become more mobile friendly with the adoption of new technology, the need to provide a safe and secure place to store identifiable...

Internet of Things (IoT) Architect
As a foundation course, this program is designed to provide students the knowledge to understand how IoT works...

IoT Fundamentals & Data Visualization with Tableau
Data is at the heart of most breakthrough technologies in the 21st century. Today, there is an increase in the number...

Payment Card Industry
This Payment Card Industry course is fully aligned with the current PCI DSS v3.2.1 It will enable students to comprehensively learn the scope of PCI DSS...

Payment Service Directive II
This is a PSDII (2015/2366/EC) course that is designed to provide students a thorough overview and detailed knowledge of what PSD means in today’s economic,...

Penetration Testing
Penetration testing is a form of ethical hacking that simulates attacks on an organization’s network and its systems. This is done to help businesses find exploitable...

Vulnerability Management
In the world of Information Security, the job of a Vulnerability assessor has evolved quickly into what it is today, one of the first lines of defence against cyber criminals.

Application Security Fundamentals
Data is at the heart of most breakthrough technologies in the 21st century. Today, there is an increase in the number...
What Our Students Have to Say




Join Our 7452 Happy Students Today!
Our trainees also benefit from a strong mentoring programme, a lively online community of practice and a rich online toolbox of resources for skills and career development.