Our services

Atveroreas Pin sdf hero vero eos et accusamus

Photo sessions for men

Lorem ipsum dolor sit amet, consectetur sdgaaa adipiscing elit, sed do eius fgtrrwe mod tempor incididunt ut labore et dolore magna aliqua.

Photo sessions for women

Fusce dolor libero, efficitur et lobortis at, faucibus nec nunc. Proin fermentum turpis eget nisi facilisis lobortis. Praesent malesuada facilisis maximus.

General photo sessions

Mauris sodales tellus vel felis dapibus, sit amet porta nibh egestas. Sed dignissim tellus quis sapien sagittis cursus. Cras porttitor auctor sapien, eu tempus nunc placerat nec.

Conceptual photos

Donec metus tortor, dignissim at vehicula ac, lacinia vel massa. Quisque mollis dui lacus, et fermentum erat euismod in. Integer sit amet augue ligula.

City moments

Efficitur ipsum dolor sit amet, consectetur adipiscing elit. Praesent efficitur tristique felis, nec malesuada neque. Nulla nulla ante, dictum at tempor eget.

Nature & animals

Lobortis usce dolor libero, efficitur et lobortis at, faucibus nec nunc. Proin eget nisi facilisis lobortis. Praesent malesuada facilisis maximus.

WOLFPACK TRAINING

EXECUTIVE MANAGEMENT

Certified Chief Information Security Officer | CCISO

EC-Council’s Certified Chief Information Security Officer (CCISO) Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, formed the foundation of the program and outlined the content covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as instructors. Each segment of the program was developed with the aspiring and sitting CISO in mind and looks to transfer the knowledge of seasoned executives to the next generation of leaders in the areas that are most critical in the development and maintenance of a successful information security program.

Risk Management Approach and Practices | RM

This risk management course is specifically designed to guide a CISO in defining and implementing a risk management approach within an IS program. The course introduces the student to the most common approaches and practices used by organizations worldwide. It is not intended to cover risk outside of the IS enterprise (including financial and business risks).

ETHICAL HACKING

Certified Ethical Hacker (CEH)

The world’s most advanced ethical hacking course with 20 of the most current security domains an ethical hacker will want to know when planning to beef up the information security posture of their organization. In 20 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers. Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification!

Ethical Hacking Core Skills | EHCS

In this course you will learn the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build a solid knowledge of the lowest layers of the network. In the course, you will conduct extensive hands-on exercises. You will learn to master the TCP/IP protocol. You will learn essential UNIX and Linux survival skills that separate you from the many security professionals who are Windows centric.. Additionally, you will be introduced to vulnerability assessment and the hacking methodology. When you finish this course you will have a solid security foundation to pursue more advanced security training. For many, when you take a class like the Certified Ethical Hacker (CEH) you have not established the foundation that is needed to get the most from the course, this is where ethical hacking core skills come in, it is the bridge between a beginning level security course and CEH; furthermore, it focuses on the main concepts required to build a foundation in security.

NETWORK SECURITY

Certified Network Defender | CND

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators. The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and white papers for additional learning.

COMPUTER FORENSICS

Computer Hacking Forensic Investigator | CHFI

The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators. The CHFI certification gives participants (Law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.) the necessary skills to perform an effective digital forensics investigation. CHFI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence.

Dark Web Forensic | DWF

Dark Web Forensics Deep Dive In this workshop you will be given a tour of the dark web and walked through the technical details of how it works. You will get hands-on experience conducting dark web investigations. This includes how to identify relevant information and how to investigate it. WARNING: The content in this video contains potentially offensive topics and adult content. Viewer discretion advised. You must be 18 and over to take this workshop!

Malware and Memory Forensics | M&MF

Malware & Memory Forensics Deep Dive In this Malware & Memory Forensics workshop, you will learn details of how malware functions, and how it is categorized. Then you will be shown details of the structure of memory, and how memory works. There is plenty of hands-on memory forensics. You will learn how to analyze memory to find evidence of malware.

Mobile Forensics | MF

Mobile Forensics Deep Dive Smart phones are ubiquitous, and for that reason, it is hard to imagine any investigation that cannot be enhanced with investigating relevant smart phones. This workshop will show you how to conduct such investigations. You will learn mobile phone architecture, how to use phone forensics tools and open-source tools. There will be a strong focus on Android phones, including how to use the Android Debugging Bridge to perform forensics.

INCIDENT HANDLING

Certified Incident Handler | ECIH

The EC-Council Certified Incident Handler (ECIH) program focuses on a structured approach for performing the incident handling and response (IH&R) process. The IH&R process includes stages like incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication. This systematic incident handling and response process creates awareness among incident responders in knowing how to respond to various types of security incidents. Cybersecurity Professionals interested in pursuing incident handling and response as a career require comprehensive training on the IH&R concepts as well as real-world scenarios. The ECIH program includes hands-on learning delivered through iLabs, online labs within the training program.

Certified SOC Analyst | CSA

The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations. CSA is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team. Being an intense 3-day program, it thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need.

Certified Threat Intelligence Analyst | CTIA

Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. In the ever-changing threat landscape, C|TIA is an essential program for those who deal with cyber threats on a daily basis. Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks.

PEN TESTING

Advanced Penetration Testing | APT

The Advanced Penetration Testing (APT) course will teach you how to perform a professional security test as well as how to produce the next most important thing… the findings and the report! The ranges progress in difficulty and reflect an enterprise level architecture. There will be defenses to defeat and challenges to overcome. This is not your typical FLAT network! As the range levels increase you will encounter the top defenses of today and learn the latest evasion techniques. The format you will use has been used to train 1000s of penetration testers globally, it is proven and effective! The APT is a Follow-on to the ECSA You should have completed the ECSA Practical Prepares you for the LPT Master Certification. Learn More Teaches you how to assess targets and escalate privileges. You will learn a repeatable and measurable approach to penetration testing

Certified Security Analyst | ECSA

The EC-Council Certified Security Analyst (ECSA) course is a fully hands-on program with labs and exercises that cover real world scenarios. By practicing the skills that are provided to you in the ECSA class, we are able to bring you up to speed with the skills to uncover the security threats that organizations are vulnerable to. This can be achieved effectively with the EC-Council iLabs Cyber Range. It allows you to dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection. Our guided step-by-step labs include exercises with detailed tasks, supporting tools, and additional materials allowing you to launch a complete live range for any form of hacking or testing.

SECURE CODING

Certified Application Security Engineer | CASE .NET

The Certified Application Security Engineer (CASE .NET) credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment. The CASE certified training program is developed concurrently to prepare software professionals with the necessary capabilities that are expected by employers and academia globally.It is designed to be a hands-on, comprehensive application security course that will help software professionals create secure applications. The training program encompasses security activities involved in all phases of the Software Development Lifecycle (SDLC): planning, creating, testing, and deploying an application. Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices and includes secure requirement gathering, robust application design, and handling security issues in post development phases of application development.

Certified Application Security Engineer | CASE JAVA

The CASE credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment. The CASE certified training program is developed concurrently to prepare software professionals with the necessary capabilities that are expected by employers and academia globally.It is designed to be a hands-on, comprehensive application security course that will help software professionals create secure applications. The training program encompasses security activities involved in all phases of the Software Development Lifecycle (SDLC): planning, creating, testing, and deploying an application. Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices and includes secure requirement gathering, robust application design, and handling security issues in post development phases of application development.

PHP Security (MicroDegree) | PSM

Security is difficult to add on to an existing application and the cost of a data breach can be enormous to you; Under the GDPR your company can be fined up to €10 million if you are found to be negligent in how you secure your customers data. This course will help you to learn the practical skills that you can apply while developing in order to produce a secure web application. It takes a practical approach to security and comprehensively addresses each part of your web application and how it is deployed.

Python Security (MicroDegree) | PSM

The Python programming language is one of the most popular languages currently in use. In addition to being easy to learn and use, it has large support for a number of areas, from data science to cyber security. This course will teach you the basic and intermediate Python programming, such as data structures, functions, object-oriented programming, and even parallel processing, providing a foundation for any programming project. In addition, practical use of Python within cyber security is also covered, including socket programming, cross-platform scripting, and password cracking. Starting from scratch, this course will provide everything you need to know to be proficient in Python programming. By the end of the course, you will be able to competently write Python programs for general purpose applications, as well as understand how to apply it for cyber security.

BLOCKCHAIN

Certified Blockchain Professional | CBP

Introducing the first Blockchain Professional Training and Blockchain Certification Program to set the global standard in Blockchain Technology. The Certified Blockchain Professional (CBP) Course was developed to help professionals gain the knowledge they need in Blockchain technology to understand its impact on business and beyond. The Certified Blockchain Professional training program teaches blockchain technology and cryptocurrency! The Certified Blockchain Professional is fully vendor-agnostic and practical, focusing on the current state of blockchain technology as well as its future potential. The Certified Blockchain Professional course digs deep into the main characteristics and features of the distributed ledger technology (DLT) as well as introduces Blockchain’s new 3S (Secure-Scalable-Sustainable) proprietary framework. Students will also get a deep understanding of blockchain technology and mining of cryptocurrency. The Certified Blockchain Professional course begins with the technical foundations of blockchain, such as distributed and decentralized systems, cryptography, and mining. Students will then learn how to develop applications using Ethereum, a decentralized virtual machine. Additionally, students will explore different blockchain enterprise applications such as Hyperledger, introduced by the Linux Foundation and widely used by IBM. Most importantly, the course will cover multiple blockchain implementation concepts by immersing students into sustainable and scalable blockchain development, the cornerstone of a decentralization strategy.

MOBILE SECURITY TOOLKIT

STORM Mobile Security Toolkit: Ethical Hacking Core Skills

The course content was derived by pulling carefully selected modules from EC-Council’s Certified Network Defender (CND) and Certified Ethical Hacker (CEH) certification courses to create the most comprehensive one-day ethical hacking workshop available. Students will learn how to navigate their new STORM – Mobile Security Tool Kit as well as the most important aspects of Ethical Hacking. The learning doesn’t stop when the workshop ends because each student will have 1-year access to the associated e-book and 6 months access to the iLabs, EC-Council’s online labs platform.

STORM Mobile Security Toolkit: Ethical Hacking Intermediate Skills

Take the Storm hacking to the next level! In this course you will learn how to deploy more elite skills, you will learn how to assess the Industrial Control System (ICS) ModBus protocol, and read and write to the registers and coils which can modify the behavior of the controller. You will learn how to integrate the Storm device with AI and perform image recognition. Additionally, you will learn techniques of intrusion analysis and malware forensics. Finally, you will learn how to use your Storm device as a cyber weapon with the concept of deception and much more.

IT PROJECT MANAGEMENT

Certified Project Management | CPM

The program enables students to obtain immediately implementable knowledge on leading project teams, directing project processes and delivering project results within the constraints of schedule, budget, resources and management expectations. Gain Analytical Skills You’ll learn how to process raw and unstructured data and how to provide insights that impact your business decisions Gain Tactical Skills Learn when and how to apply certain methodologies in your projects for guaranteed success

DISASTER RECOVERY

Disaster Recovery Professional | EDRP

EC Council Disaster Recovery Professional (EDRP) is a compressive professional course that teaches students how to develop enterprise-wide business continuity and disaster recovery plans. It teaches professionals various methods of identifying vulnerabilities and taking countermeasures against the said vulnerabilities. The professionals will learn how to secure their data by putting policies and procedures in place, and how to recover and restore their organization’s critical data in the aftermath of a disaster. EDRP provides the professionals with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing of risks, developing policies and procedures, and implementing a plan.

ENCRYPTION

Certified Encryption Specialist | ECES

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. Participants will also be provided a practical application of the following: How to set up a VPN Encrypt a drive Hands-on experience with steganography Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA.

FUNDAMENTALS

Certified Secure Computer User | CSCU

Soar to new Heights with this introduction to cyber security! The purpose of the Certified Secure Computer User (CSCU) training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.

Our offers

Tgsdgwe sfgdrss dfw vero eos et accusamus

Photography

Fusce dolor libero, efficitur et lobortis at, faucibus nec nunc.

$100.00
  • 10% In hac habitasse platea
  • 10gb Praesent egestas ac arcu
  • 20 emails Sed eget aliquet nisl
  • no Proin laoreet accumsan nisl
July 08, 2017

Focused on helping our clients to build a great business

At vero eos et accusamus et iusto odio dignissimos ducimus qui blanditiis praesentium voluptatum deleniti atque corrupti quos dolores.

Kathy Reyes

May 26, 2017

Praesentium to website realise imperdiet demore elementum

Nullam elementum tincidunt massa, a pulvinar leo ultricies ut. Ut fringilla lectus tellusimp imperdiet molestie est volutpat at. Sed viverra cursus nibh.

James Doe

July 08, 2017

Focused on helping our clients to build a great business

At vero eos et accusamus et iusto odio dignissimos ducimus qui blanditiis praesentium voluptatum deleniti atque corrupti quos dolores.

Kathy Reyes

June 15, 2017

We build your website to realise your vision, project and more

At vero eos et accusamus et iusto odio dignissimos ducimus qui blanditiis praesentium voluptatum deleniti atque corrupti quos dolores.

William Sh.

May 26, 2017

Praesentium to website realise imperdiet demore elementum

Nullam elementum tincidunt massa, a pulvinar leo ultricies ut. Ut fringilla lectus tellusimp imperdiet molestie est volutpat at. Sed viverra cursus nibh.

James Doe

Information Risk Assessment

Our world-class information risk assessment ensures over 450 vulnerabilities are reviewed in interviews with strategic and tactical teams. The assessment factors in concerns raised by stakeholders, audit findings and past incidents ensuring that all security requirements are identified and prioritised according to business impact.

IT Governance and IT Risk Review

IT governance is a framework that ensures your IT infrastructure supports and enables an organisation to achieve its goals. We will perform an IT process maturity review, IT risk assessment and can assist with remediation of your IT environment.

Information Security Management System (ISMS) and ISO 27001 Certification

We have the necessary skills and experience to partner with you to scope, establish an ISMS, and take it through to a successful ISO 27001 certification. We can furthermore assist with certified lead auditor and lead implementer training for all teams.

Supplier and Third-Party Risk

We will review your current supplier management lifecycle to ensure that the applicable governance components such as NDAs, SLAs and other contracts are in line with information risk management requirements. We also perform independent third-party risk assessments.

Privacy and Protection of Personal Information Act (PoPIA) Reviews

Organisations are expected to safeguard personal information entrusted to them; ignorance is no longer accepted as an excuse. We conduct a privacy impact assessment and provide the necessary consulting services to ensure your organisation is compliant with relevant privacy and data protection requirements.

Disaster Recovery (DR)

Following an alignment process to the Business Continuity Management (BCM) strategy, we establish detailed disaster recovery plans for all key areas of the organisation. We then run simulated disaster scenario tests and help to mentor and upskill the DR Operations Team.

A proactive approach

The implementation of a proactive approach to information risk management will ensure that your business is better prepared for any internal or external attacks, leaving your company more secure and ensuring better governance. However, businesses without such an approach in place are left vulnerable, with potentially disastrous consequences. Wolfpack provides an advisory plan which enables you to be well-equipped to achieve full adherence to the ISO Standards, as well as maintaining a defendable, risk-management based security posture in the face of a constantly changing regulatory, customer, and threat environment.
Wolfpack will partner with you to build a solid, business-aligned security strategy, thereby
improving your organisation’s cyber risk management.

Information Risk Strategy and Roadmap

Our information risk framework provides the foundation upon which we architect the strategy to support business objectives and the subsequent information risk programme. The modular nature of the framework furthermore provides an agile environment to allow the organisation to continuously re-evaluate their priorities and approach as the business and threat landscape evolves.

Security Architecture and Design

A well-designed security architecture programme will ensure that all security is business-driven, risk-focused, comprehensive, modular, auditable and transparent, demonstrates compliance and provides two-way traceability of business requirements.

Human Resource (HR) Governance

We have the necessary skills and experience to partner with you to scope, establish an ISMS, and take it through to a successful ISO 27001 certification. We can furthermore assist with certified lead auditor and lead implementer training for all teams.

IT and Network Security Reviews

IT and network devices are crucial for the operation of any organisation. An IT and network review will ensure that weaknesses in configuration are identified and remediated, reducing the risk of a security incident.

Change and Release Management

IT change and release management is primarily concerned with the governance of transitioning new technology and procedural adjustments into a live operational environment, with as little risk as possible.

Business Continuity and Crisis Management

We will establish the required BCM governance components in accordance with ISO 22301. We then conduct a Business Impact Analysis (BIA) with senior management teams to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency.

Incident Management (IM)

We review your current IM, DR and BCM environment and ensure an ISO 27035 aligned incident management programme is in place to handle major privacy or cyber incidents. We provide the necessary governance documentation, detailed “battle guides” and training / simulated incident testing for the Incident Response Team (IRT).

Data Governance Framework – Classification and Handling

The data governance framework aims to provide an approach to proactively minimise the likelihood and impact of a data leak. Through a consultative approach, we help both business and IT to understand the value of their data, establish classification rules and then provide guidelines and traning to communicate securely.

Awareness

HUMAN RISK MANAGEMENT SERVICES

Easy Policy Communication Tool

There is often a disconnect between policy writers and their audiences. We have summarised key requirements from a typical information security policy into an easy to read, branded story booklet available in digital format that can be shared electronically or printed, which outlines expected behaviours.

Awareness Programme Management

Wolfpack provides a full turnkey awareness solution that includes business needs analysis, content development and customisation, programme management, an intuitive learning management system, as well as various human vulnerability assessments conducted using our online threat platform Camo Wolf.

Professional Awareness Content

Wolfpack maintains its custom range of short professional animated videos that are both fun to watch as well as being a highly effective learning tool as they are based on realistic incidents. Each video topic comes with supporting materials such as posters, cartoons and screensavers that are branded in accordance with corporate identity guidelines to further drive the message home.

Digital Simulations

Simulations are online interactive lessons where a student has to navigate their way through the course and make the correct decisions.

VIP Cyber Protection

Online protection from impersonators, physical and travel threats, credential theft, malicious links and more.

Employee Cyber Protection

Online protection from credential theft, malicious links, viruses, and abusive posts via monitoring, alerting and online training.

"Let us not look back in anger, nor forward in fear, but around in awareness." -James Thurber

Camo Wolf - Human Vulnerability Assessments

We have an online threat assessment platform that can be used to conduct realistic attack scenarios on teams within your organisation. We are able to conduct spear-phishing, bad USB, ransomware simulations, dumpster diving as well as test your physical security by gaining access to facilities. All tests are conducted in a controlled professional manner without reducing the realism of an actual attack.

Cyber Wellness
Workshops

We run workshops teaching your employees how to protect themselves and their families against relevant cyber threats when using social media, mobile devices, games, etc. The workshops use a combination of interactive feedback technology and “eye-opening” demonstrations and are extremely effective at getting a “buy-in” from your users.

Grey Wolf Learning Management System (LMS)

Grey Wolf is an affordable integrated assessment and e-learning platform that can either be installed within your environment or run in the cloud. The assessment system can provide access for multiple users that are spread across departments in various geographical locations. We offer a full maintenance and Service Level Agreement (SLA) to take the hassle out of managing the system.

Threat Intelligence


National and
Industry Research
Programmes

Wolfpack has conducted a number of national or sector- specific related threat research projects on topics such as cybercrime and critical information infrastructure protection. Our research is 100% vendor-neutral and is aimed at providing guidance to policy makers and strategic public and private sector stakeholders.

Alert Africa -
Community Awareness Website

One of the challenges highlighted at previous CyberCon events was the lack of a national awareness programme for South Africa. Wolfpack partnered with the British High Commission to build Alert Africa to provide a guidance on cyber threats and provide a portal to report a cybercrime in South Africa.

Wolfpack Cares -
Social Responsibility Projects

Wolfpack’s culture is one of community engagement and support and as such undertake a number of pro bono projects each year.

Training

WOLFPACK CYBER ACADEMY




The Wolfpack Cyber Academy was created from a need to educate all levels of any type of organisation on the risks of not securing information properly as well as providing certification on the required standards and practices. The courses that we offer to the public, our clients and government departments focus on various areas of IT governance, risk, information security and cyber security. These courses vary in complexity and are tailored to suit any level of employee regardless of industry or organisation.

HUMAN RISK MANAGEMENT SERVICES


Specialist Government and Industry Training Programmes

We have successfully run training programmes for the banking and government sectors. Based on specific industry or country needs, we are able to structure a course tailored to your specific requirements.

Tailored Training Programmes for Companies - Executives or Operational Areas

We have successfully built and facilitated cyber training courses (ranging from 1 to 4 hours in length) for board members and executives. We then run more detailed operational courses for line management and GRC/IT teams so that the entire management team understands their roles to support the organisation.

TECHNOLOGY RISK MANAGEMENT SERVICES


Online Brand Reputation Management

Protection from takeover, fake spoofing, fraud/scams, counterfeit, violence, phishing and inappropriate use.

Social Media Protection

Facebook and LinkedIn auto content moderation and domain protection from takeover, violence, phishing and scams.

Cyber Incident Response

We have relationships with local and international partners to assist our clients with an incident response service thereby giving you access to a highly-experienced incident response specialist, at the time when you need it most.

Contact Us

Building 1, Pendoring Office Park 299 Pendoring Road Blackheath Northcliff 2195 Johannesburg, South Africa
LinkedIn