Upcoming Training: 3rd Certified Cyber Security Associate (CCSA) Training Seminar


Upcoming Training: 3rd Certified Cyber Security Associate (CCSA) Training Seminar

Training Date: From 25th to 29th August 2014 Venue: Safari Park Hotel, Nairobi.

Having recognized the phenomenal challenge posed to organizational systems by emerging cyber security threats, the ICT Association of Kenya (ICTAK) has launched a comprehensive system security program for ICT professionals. The inaugural participants of this rigorous training received their certification on March 28th 2014 and are expected to steer their organizations towards excellence in ICT security.

In view of the great need to drive awareness and impart cutting edge skills to professionals driving ICT programmes across various sectors, ICTAK was pleased to announce the second edition of Certified Cyber Security Associate (CCSA) training.

TOPICS TO BE COVERED
Appraising the Security of Systems
Holistic Information Security Audit
System Security Procedure
Ethical Hacking Concepts
Penetration Testing
Network Scanning
Wireless System Security
Server Security
Intrusion Detection
Cryptography
Social Engineering Designs
Digital Forensics
Cyber Law and Policy
Disaster Recovery Planning
Business Continuity Management

Charges:
KSh.75, 000 (US$875) for ICTAK members
KSh.85, 000 (US$990) for non-members.
Successful participants will be awarded Certified Cyber Security Associate (CCSA) certification. This payment is inclusive of 5 days expert guided tutorials, course materials, certification, refreshments and meals.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: