Information Security Training Programmes

» AKATI Academy » Information Security Training Programmes


AKATI Academy is committed to deliver excellence through our professional cybersecurity training programmes covering both management and technical tracks focusing on specialisations. All training programmes can be customised to suit the needs and requirements of cyber security practitioners.

Available Programmes


  • add Penetration Testing Training Programmes
    AKATI Consulting Penetration Testing (ACPT) Level 1
    Duration Who should attend: Description:
    5 Days Penetration Testing connoisseurs - If you or your organization requires the knowledge or skills to identify, track, and remediate information security vulnerabilities, then this is the workshop for you. ACPT Level 1 is unique in that it provides all the necessary advanced skills to carry out a thorough and professional penetration test. Thanks to the extensive use of hands-on labs and the coverage of the latest researches in the information security field, the ACPT Level 1 course is not only the most practical training course on the subject but also the most up to date. The course, although based on the offensive approach, contains, for each chapter, advices and best practices to solve the security issues detected during the penetration test.
    AKATI Consulting Penetration Testing (ACPT) Level 2
    Duration Who should attend: Description:
    5 Days If you or your organization requires the knowledge or skills to identify, track, and remediate the web security vulnerabilities, then this is the workshop for you. ACPT Level 2 is unique in that it provides all the necessary advanced skills to carry out a thorough and professional penetration test against modern web applications. Thanks to the extensive use of hands-on labs and the coverage of the latest researches in the web application security field, the ACPT Level 2 course is not only the most practical training course on the subject but also the most up to date. The course, although based on the offensive approach, contains, for each chapter, advices and best practices to solve the security issues detected during the penetration test.
    AKATI Consulting Penetration Testing (ACPT) Level 3
    Duration Who should attend: Description:
    5 Days If you or your organization requires the knowledge or skills to identify, track, and remediate the web security vulnerabilities, then this is the workshop for you. ACPT Level 3 is unique in that it provides all the necessary advanced skills to carry out a thorough and professional penetration test. Thanks to the extensive use of hands-on labs and the coverage of the latest researches in the information security field, the ACPT Level 3 course is not only the most practical training course on the subject but also the most up to date. The course, although based on the offensive approach, contains, for each chapter, advices and best practices to solve the security issues detected during the penetration test.
    Certified Ethical Hacker
    Duration Who should attend: Description:
    5 Days Security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
    Certified Counter Hacking Associate
    Duration Who should attend: Description:
    5 Days This course will significantly benefit Security Officers, Auditors, Security Professionals, Site Administrators, Network Policy Designers, E-Business Consultants, Auditors, Project Managers and anyone who is related to the integrity of the network infrastructure. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
    Certified Counter Hacking Practitioner
    Duration Who should attend: Description:
    5 Days This course will significantly benefit Security Officers, Auditors, Security Professionals, Site Administrators, Network Policy Designers, E-Business Consultants, Auditors, Project Managers and anyone who is related to the integrity of the network infrastructure. This is the advance course of the Certified Counter Hacking Associate (previously mentioned)
  • add Digital Forensics Training Programmes
    Computer Hacking Forensics
    Duration Who should attend: Description:
    5 Days E-Business Security Professionals, Systems Administrators, Legal Professionals, Chief Technology Officers, Computer Security Officers, Managers (at relevant levels), IT Managers, Project Managers, Network Engineers and Designers, Database Engineers /Administrators, Policy Designers, Auditors and various other departments. The Computer Forensics course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.
    CSI: Computer Systems Investigation
    Duration Who should attend: Description:
    3 Days CISO, CTO, Computer Security Officers, Managers at all levels who use networks and are concerned about protecting sensitive information, IT Directors/Managers, Law Enforcement Community who are responsible for computer systems, First Responder Communities, Inspector General Staff In this 3-day interactive hands-on workshop, participants will discover how to identify an intruder's footprints and properly gather the necessary evidence to prosecute in a court of law. Securing and analyzing electronic evidence is a central theme in an ever increasing conflict situations and criminal cases.
    Fraud Detection, Investigation and Prevention
    Duration Who should attend: Description:
    2 Days CXOs, Chief Internal Auditors, Heads of Internal Audit, Chief security officers, Heads of Risk Management, Heads of Legal Department, Heads of Regulatory Compliance, Heads of Legal, In-house Legal Counsel, Accountants, Internal, External Auditors This course combines fraud accounting with digital forensics and explains to the participants the nature of financial fraud, how to detect fraudulent activities, and most importantly how to investigate any type of financial fraud. It also explores the various possible avenues of computer-based investigations. The training focuses on audit techniques, fraud detection techniques, accounting and law, practically auditing and investigation of frauds, collection of evidence/documentation that can stand the test of legal scrutiny and write succinct, factual reports. It is power-packed with case studies designed to give participants a clear idea of real-world frauds and how investigative techniques can be deployed to nail the fraudsters and determine the extent and exact nature of the fraud.
    E−Crime and Computer Forensics
    Duration Who should attend: Description:
    5 Days E−Business Security Professionals, Systems Administrators, Legal Professionals, Chief Technology Officers, Computer Security Officers, Managers (at relevant levels), IT Managers, Project Managers, Network Engineers and Designers, Database Engineers /Administrators, Policy Designers, Auditors and various other departments The Computer Forensics course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber criminal."
  • add Network, Wireless & Cloud Security Training Programmes
    Network Security Masterclass: Wired & Wireless Network
    Duration Who should attend: Description:
    3 Days Network Security Masterclass course provides coverage of security issues from both a business and technical perspective. The course is intended for anyone involved in wired & wireless security implementations, decision-making management or analysis, including IT Managers & Project Managers, IT Security, System Architects, Network Infrastructure, and Internal IT Auditors As a network administrator, architect, or security professional, you need to under- stand the capabilities, limitations, and risks associated with integrating wireless LAN technology into your current wired infrastructure. This workshop provides an overview of the evolving technology, identifies common vulnerabilities in device settings and configuration, and discusses practical ways in which wired & wireless security can be improved. Focusing on the novel and practical ways, you will learn to analyze and deploy a full spectrum view of 802.11, from the minute details of the specification, to deployment, monitoring, and troubleshooting.
    Network Security Essentials
    Duration Who should attend: Description:
    3 Days Network Server Administrators, Network Policy Designers, Network Architects / Designers, Firewall Administrators, Systems Administrators, E-Business Consultants, Application Developers, Support Staff and IT Security Officers. This course is designed to provide fundamental skills that require analyzing the internal and external security threats against a network, and to develop security policies that will protect their information. Participants will learn various methods to evaluate network and Internet security issues and design, and ways to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them.
    Wireless Security: Are We Safe?
    Duration Who should attend: Description:
    3 Days The course is intended for those involved in wireless security implementations, decision making management or Analyst, including IT Directors / Managers & Project Managers, IT Security, Chief Technology Officers, Computer Security Officers, Managers (at relevant levels), System Architects, Network Infrastructure, and Internal IT Auditors. This introduction to wireless security provides an overview of the evolving technology, identifies common vulnerabilities in device settings & configuration, and discusses practical ways in which wireless security can be improved. This course will provide participants with an understanding of how the technology works as well as security implications and methods in which implementations can be best secured with existing protocols.
    Cloud Computing Security
    Duration Who should attend: Description:
    5 Days Internal and external auditors (IT, financial, operational), Chief Technology Officers, General Counsels, Chief Information Officers, Chief Security Officers, Controllers, and persons charged with establishing or reviewing the implications of establishing strategies that embrace cloud computing. As organizations transition to cloud computing technology, security issues are a vital concern. In order to protect sensitive data and maintain regulatory compliance, you must address the unique cyber security challenges faced when moving to a cloud environment. This course provides hands-on experience identifying and resolving the security issues specific to public and private clouds.
    Mobile Security
    Duration Who should attend: Description:
    3 Days Those tasked with implementing, testing and deploying secure mobile applications and devices. In this course, you learn to mitigate the risks associated with mobile devices as well as how to develop and deploy mobile applications. You also gain the skills to implement an effective mobile device security strategy for your organization, identify potential flaws in proprietary and third party iOS and Android applications, and leverage development and security best practices.
  • add Software & Application Security Training Programmes
    Certified Secure Software Engineer
    Duration Who should attend: Description:
    3 Days Software Engineers including managers and team leaders of software developing companies. Students studying software development can also follow this training program. This hands-on training program will teach the students that the secure code they develop need to be secured in architecture, design, implementation, operations, automation and testing. This course exposes you to 'Secure Coding' fundamentals and prepares you to dive into common languages. C|SSE course curriculum will touch on programing languages such as C, Java, .NET, but it is not a specialized coding course. C|SSE course prepares you for extensive secure coding training courses specializing in a particular programing language offered by the International Council of Electronic Commerce Consultants (EC-Council), USA.

    Students going through CSSE training will learn:
    • Provide insight into current efforts and future plans for corporate network security via Secure Coding.
    • Provide helpful perspective on nature of today's Internet security risk.
    • Provide guidelines to achieving goals of rock-solid code.
  • add Incident Handling & Response Training Programmes
    CSI-Reloaded: Incident Response & Computer Forensics
    Duration Who should attend: Description:
    3 Days CISO, CTO, Computer Security Officers, Managers at all levels who use networks and are concerned about protecting sensitive information, IT Directors/Managers, Law Enforcement Community who are responsible for computer systems, First Responder Communities, Inspector General Staff Digital and Computer Forensic Professionals, Incident Response Professionals Detecting and efficiently responding to incidents, especially those where critical resources are exposed to elevated risks, has become paramount. To be effective, incident response efforts must have strong management processes to facilitate and guide them. Incident response and handling requires special skills and knowledge. A background in information security management or security engineering is not sufficient for managing incidents. Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client's systems, to tracing the originator of defamatory emails, to recovering signs of fraud.
    Discover in these 3 days' interactive hands on workshop how to identify an intruder's footprints and to properly gather the necessary evidence to prosecute in the court of law. Furthermore, incident responders with strong technical skills do not necessarily become effective incident response managers. Thus this training is necessary.
    Advance Reverse Engineering & Malware Analysis
    Duration Who should attend: Description:
    3 Days Attendees who found this course especially useful often had responsibilities in the areas of incident response, forensic investigation, information security, and system administration. This course explores malware analysis tools and techniques in depth. It helps forensic investigators, incident responders, security engineers, and IT administrators acquire the practical skills to examine malicious programs that target and infect Windows systems. Understanding the capabilities of malware is critical to an organization's ability to derive threat intelligence, respond to information security incidents, and fortify defenses. This course builds a strong foundation for reverse-engineering malicious software using a variety of system and network monitoring utilities, a disassembler, a debugger, and other tools useful for turning malware inside out.
  • add Security Management Training Programmes
    Business Continuity Management (BCM)
    Duration Who should attend: Description:
    5 Days Those responsible for implementing a business continuity management system (BCMS) or individuals who wish to understand the benefits of compliance with the ISO 22301 standard. This includes business continuity managers, IT managers, business managers, quality managers, compliance managers, project managers, ISO 22301 auditors and emergency planners.can also follow this training program This course provides a comprehensive introduction to the ISO/IEC 22301:2012 standard and the requirements of a business continuity management system (BCMS). ISO 22301, the international standard for business continuity, outlines the requirements of a business continuity management system (BCMS). An ISO 22301-compliant BCMS will reassure customers, investors and other stakeholders that an organisation is prepared to deal effectively with disruptions such as fire, theft, cyber attack, IT service issues, staff absences, terrorist activity and natural disasters. The ISO 22301 Certified BCMS Foundation Training Course provides a comprehensive overview of the requirements and benefits of a BCMS, and leads to the award of the ISO 22301 Certified BCMS Foundation (CBC F) qualification.
    Disaster Recovery & Business Continuity
    Duration Who should attend: Description:
    5 Days Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals This course teaches you the methods in identifying vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization. It also provides the networking professional with a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster. This course takes an enterprise-wide approach to developing a disaster recovery plan.
    Information Security Management Systems (ISMS) Foundation Training
    Duration Who should attend: Description:
    2 Days This course is designed for people assigned to implement an ISMS practically e.g. managers already involved with control of another management system, consultants. Two days ISMS Foundation course gives a thorough introduction to Information Security Management, together with the requirements for ISMS implementation
    SAFE − Security Awareness For Everyone
    Duration Who should attend: Description:
    2 Days Office Knowledge Workers, Frontline Bank Executives, Marketing Executives, HR Executives, Finance / Accounting Executives, General Executives, Help Desk/ Call Centre, General Administrators and General Staff that has access to a computer and internet connection This course is designed to provide vital internet security knowledge for every employee to ensure they know how to detect, protect and eliminate problems caused by viruses, Trojans, malicious attacks via e-mails and phishing. This course outline has been formulated, analyzed and designed by The International Association of IT Governance Standards (ITGOVS), from USA to be major compliance knowledge for every institution to equip their manpower with sufficient internet security knowledge.
    Emerging Security Threats and Countermeasures
    Duration Who should attend: Description:
    2 Days This course is focused on all security enthusiasts, team leads, IT managers, decision makers, senior managers to understand the latest threats to information security and the preventive measures for the same. This course will include:
    • Introduction to real-life incidents, which have caused multi-million dollar losses to companies due to lax security controls and implementation.
    • Understanding the discovery and reconnaissance techniques, which are popularly used by attackers to know about the weak points of entry in the organization's network.
    • Specific attack techniques such as privilege escalation, password cracking, denial-of-service attacks and so on are put forward to demonstrate how weak security practices and implementation go a long way to compromise the security of the systems where the information assets reside.
    • Security exploits framework, Threat modeling are now put forward to demonstrate how an attacker is able to penetrate and compromise the security of the organization's network.
    • Defensive strategies to contain the impact of threat agent to the most prized information asset(s) in the organization.
    • If a breach occurs, the incident management procedures are put forward for proper asset recovery and salvaging.
    Information Technology Risk Management
    Duration Who should attend: Description:
    5 Days IT Risk and Security Managers, IT Technology and Systems Managers, IT Auditors, IT Operations Managers, IT Project Managers The objective of this course is to provide attendees with the necessary perspective, knowledge and skills to understand the essential elements and benefits of applying effective IT risk management and to learn how it assists:
    • Management in ensuring that the appropriate resources are effectively applied in order to achieve the mission
    • Users in ensuring that proper controls are applied to address integrity, confidentiality, and availability of the IT systems and data that they own
    • IT professionals in promoting IT policy adherence and maintain security of the IT systems
    Enterprise Risk Management
    Duration Who should attend: Description:
    4 Days Accounting & finance professionals who need to know more about risk management in their roles; Managers, directors or controllers who are responsible for protecting their organization, managing risk and/or embedding effective systems of corporate governance; CEOs, CFOs, VPs and other executives and heads of departments who require a better understanding of risk management and the role it should play in their organizations. Enterprise risk management (ERM) is a significant advancement in the field of risk management, and provides a process for companies to identify, measure, manage, and disclose all key risks to increase value to stakeholders. ERM solves the challenges discussed above. In addition, ERM provides a better framework for fundamental risk-return decision-making at the highest levels, elevating ERM to advancement in business management.
For more information on these courses, contact us at ask@akati.com