We offer comprehensive training and awareness programmes to empower organisations to employ and adopt the best dataprotection and cybersecurity practices. These programmes equip businesses withthe knowledge to implement robust measures that ensure compliance with local and international regulations, reduce risk, and build a culture of accountability and resilience.
Participants gain practical insights into data governance, risk management, incident response, and the protection of sensitive information.
This course introduces teams to thecore principles of cybersecurity and equips participants with the knowledge to identify, prevent, and respond to common security threats in the workplace. It’s designed for both technical and non-technical staff who handle sensitive data or interact with digital systems.
By the end of the session, your team will be better prepared to protect information assets, spot risky behaviours, and act confidently in the face of potential attacks.
How to
● Understand the CIA triad: confidentiality, integrity, & availability
● Recognise common threats:phishing, ransomware, malware, social engineering
● Learn secure password and access control practices
● Protect sensitive data through classification and tagging
● Apply security best practices to everyday tools and tasks
● Respond effectively to potential incidents or breaches
● Module 1: Cybersecurity in Everyday
● Module 2: Human Element of Cybersecurity
● Module 3: Recognising Threats
● Module 4: Responding to Suspicious Activity
● Module 5: Securing Access & Authentication
● Module 6: Device & Workspace Security
● Module 7: Protecting Data
● Module 8: Everyday Best Practices
This interactive session places security and leadership teams in a simulated cyber crisis to test their ability to manage incidents under pressure. Participants will walk through a real-time attack scenario and learn how to coordinate a swift, compliant, and effective response.
By the end of the session, teams will be better prepared to identify weaknesses, improve internal playbooks, and enhance communication across departments during critical incidents.
● Understand the stages of a cyberincident
● Respond to a coordinated,simulated attack
● Assign clear roles for technicaland executive teams
● Practice communication andreporting during crisis
● Update and strengthen internalresponse procedures
● Identify process gaps and lessonslearned
● Cybersecurity Incident Lifecycle
● Simulated Breach & LiveResponse Exercise
● Technical Response Roles vsExecutive Roles
● Internal & ExternalCommunication Protocols
● Post-Incident Review &Reporting
● Lessons Learned and PlaybookDevelopment.
This course provides comprehensivetraining on the ISO/IEC 27001 standard for information security management. It is ideal for organisations pursuing certification or looking to enhanceinternal security controls and compliance maturity.
By the end of the session,participants will understand how to implement and maintain an ISMS, aligncontrols to Annex A, and prepare effectively for audits.
How to
● Understand ISO/IEC 27001 structureand requirements
● Build and operate an effectiveInformation Security Management System (ISMS)
● Align Annex A controls withbusiness processes
● Conduct internal audits andprepare for certification
● Maintain continuous improvement ofsecurity posture
● Navigate certification stages and assessor expectations
● Overview of ISO/IEC 27001 and CorePrinciples
● Annex A Controls & Risk Assessment Techniques
● ISMS Planning, Implementation & Operation
● Documentation & ControlObjectives
● Internal Audit & ManagementReview
● Audit Preparation
● Integration with Other Frameworks (e.g., NIST, NDPA).
We are at your service. Read through our FAQs to get
quick hints on our training offerings.
Our programmes are open toprofessionals, students, and organisations across Africa and beyond, looking tobuild expertise in privacy, data protection, technology policy, cybersecurity,corporate governance, and related fields.
We providea range of trainings including official IAPP certification courses, dataprotection workshops, startup and business advisory trainings, compliancetrainings, technology policy and governance programmes, and customisedcorporate training.
You will gain practical skills, industry insights, and, where applicable, professional certification. Participants also get access to course materials, guides, casestudies, and certificates of completion.
We offer both virtual and in-person sessions depending on the programme. This ensures flexibility and accessibility for individuals and organisations across different regions.
Duration varies by course, from one-day sessions to multi-day certification programmes,so you can choose a schedule that fits your needs.
Yes. Our instructors and team provide guidance throughout the training, answer questions, and ensure participants can apply the learning practically.
Registration is quick via our website. Payment options and detailed course information are provided on each training page. Scholarships and special programmes may also be available for eligible participants.
