Training

Training Calendar 2026

Training Calendar 2026

Course Description

This course equips Senior Executives and Board Members with essential, non-technical knowledge of cybersecurity. It frames information security as a business and governance issue, rather than a purely technical one. Participants gain first-hand insights into how organizations manage cyber risks, align security with strategic goals, and respond to modern threats.

Delivered through a moderated roundtable format, the session combines expert presentations, interactive panel discussions, and scenario-based breakout sessions to drive practical understanding and boardroom-level decision-making confidence.

Learning Objectives

By the end of this course, participants will:

  • Understand the strategic impact of cybersecurity on business continuity and reputation.
  • Learn the fundamentals of information security governance and risk management.
  • Identify their role in overseeing cybersecurity strategy, compliance, and resilience.
  • Gain insights into incident response leadership and board-level communication during crises.
  • Explore case studies on breaches and lessons learned at the executive level.

Who Should Attend?

This course is ideal for:

  • C-Level Executives (CEOs, CFOs, COOs, CIOs, CISOs)
  • Board Members and Non-Executive Directors
  • Heads of Departments and Risk Committees
  • Corporate Governance Leaders

Legal and Compliance Officers

Who should attend?

Course Description

Our ISO training programs are designed to equip professionals and organizations with the knowledge and skills to implement, audit, and maintain international standards in information security, IT service management, business continuity, and risk governance.

Whether you’re looking to align with regulatory requirements, enhance internal processes, or achieve certification, our ISO courses deliver practical insights guided by certified instructors.

ISO Standards Covered

  1. ISO/IEC 27001:2022 — Information Security Management Systems (ISMS)
  2. ISO/IEC 27002:2022 — Code of Practice for Information Security Controls
  3. ISO/IEC 27005 — Information Security Risk Management
  4. ISO/IEC 27701 — Privacy Information Management (Extension to ISO/IEC 27001 for Privacy)
  5. ISO/IEC 22301 — Business Continuity Management Systems (BCMS)
  6. ISO/IEC 20000-1 — IT Service Management Systems (ITSM)
  7. ISO 31000 — Risk Management Guidelines
  8. ISO 9001 — Quality Management Systems (for security process optimization)
  9. ISO 38500 — IT Governance

Learning Objectives

Participants will:

  • Understand the scope, structure, and application of each standard.
  • Learn how to plan, implement, and audit systems based on ISO requirements.
  • Gain knowledge on aligning organizational controls to ISO standards.
  • Prepare for certification exams and audit-readiness.
  • Develop policies, risk registers, and control frameworks for compliance.

Who Should Attend?

  • Information Security Officers (ISOs)
  • Compliance & Risk Managers
  • Internal Auditors
  • IT Managers and Consultants
  • Data Protection Officers
  • Business Continuity and Governance Professionals

Course Description

Human error remains one of the biggest cybersecurity vulnerabilities in any organization. This course is designed to equip end users—your first line of defense—with the awareness and habits needed to recognize, avoid, and respond to common cyber threats.

Delivered in an engaging and practical format, the training focuses on real-world scenarios, interactive demos, and quizzes that help employees internalize security best practices in their daily roles.

Learning Objectives

By the end of this course, participants will:

  • Recognize phishing, social engineering, and scam tactics.
  • Safely handle emails, attachments, and links.
  • Create and manage strong passwords and use multi-factor authentication (MFA).
  • Identify suspicious behavior and know how to report incidents.
  • Understand basic data privacy, safe internet usage, and device security.
  • Develop cyber hygiene habits that protect both personal and organizational data.

Key Topics Covered

  • Cybersecurity threats overview
  • Phishing, vishing, and smishing
  • Password safety and authentication
  • Secure browsing and email hygiene
  • Device and mobile security
  • Data protection and confidentiality
  • Incident reporting protocols

Who Should Attend?

  • All staff members (technical and non-technical)
  • Administrative and support teams
  • Front-line personnel (customer service, sales, operations)
  • Contractors and third-party users with system access
  • New hires as part of onboarding

Course Description

Our Cybersecurity Masterclasses are immersive, expert-led sessions tailored for mid to senior-level professionals seeking to deepen their knowledge in high-impact cybersecurity domains. These masterclasses focus on real-world application, threat simulation, and strategic defense design across a wide range of security specialties.

Each session is built around current threat landscapes, global standards, and practical tooling—equipping participants with advanced capabilities to lead, defend, and respond at the frontlines of cyber defense.

Masterclass Topics

  1. Advanced Penetration Testing & Red Teaming
    Techniques for exploiting infrastructure, bypassing defenses, and simulating adversarial campaigns.
  2. Cyber Threat Intelligence & Dark Web Monitoring
    Collect, analyze, and apply threat intelligence using OSINT tools and dark web surveillance.
  3. Security Operations & SIEM Tuning (Splunk, ELK, Sentinel)
    Log correlation, alert tuning, and threat hunting in modern SOC environments.
  4. Incident Response & Digital Forensics
    Live-fire simulations and investigation workflows using industry forensic tools.
  5. Cloud Security (AWS, Azure, GCP)
    Designing and securing workloads across multi-cloud environments, including IAM, encryption, and logging.
  6. Zero Trust Architecture & Identity Access Management
    Principles, implementation, and technologies supporting Zero Trust models.
  7. Application Security & DevSecOps
    Secure coding, SDLC integration, static/dynamic analysis, and CI/CD pipeline hardening.
  8. Ransomware Defense & Business Continuity
    Strategies to prevent, detect, and recover from ransomware and destructive attacks.

Learning Objectives

Participants will:

  • Conduct real-world attack simulations in a lab environment.
  • Build security use cases aligned to business context and risks.
  • Integrate advanced tooling (e.g. Burp Suite, Metasploit, Velociraptor, TheHive, OSINT Frameworks).
  • Align strategies with NIST, MITRE ATT&CK, and ISO/IEC standards.
  • Lead response and remediation initiatives effectively in high-stress scenarios.

Who Should Attend?

  • Cybersecurity Engineers & Analysts
  • SOC Managers & Threat Hunters
  • Red/Blue/Purple Team Members
  • IT Security Architects
  • Digital Forensics Specialists
  • Security Managers & CISOs
  • DevSecOps Practitioners