Welcome to Serensic Africa. Please create a new user name Bulk sms services
System and Network Security Introduction
4
Starter guide to cybersecurity
Security Awareness training
Identity Management fundamentals
Managing PKI
Identity Management
Defending the Perimeter from Cyber Attacks 4
Endpoint Security and Network Access Control
Cybersecurity: Accessibility and Quality
Penetration Testing: Tools and Techniques
Vulnerability Assessment: Protecting Your Organization
Advanced Persistent Treats(APT): Targeted Attacks & Defenses
Metasploit
1
1
1
1
4
4
4
4
4
4
4
1
Digital Forensics Tools and Techniques
5
Cyber Security Risk Assessment &Management
Disaster Recovery Planning: Ensuring Business Continuity
Cyber Security :Key Elements for Success
Targeted Human Treats: Social Engineering Deceptions, Exploits and Defenses
4
4
1
3
Compliance Checklist (NIST Framework)
Cybersecurity for Management and Boardroom
National Cybersecurity Workforce Framework Workshop
1
1
1
Essentials of Cloud security management
Mobile Application and Device Security
Securing Web Applications, Services and Servers
Implementing Web Application Security
3
3
4
1
Certified Ethical Hacker (CEH) Certification Exam Preparation
Certified Information Systems Auditor (CISA) Certification Exam Preparation
Certified Information Security Manager (CISM) Certification Exam Preparation
5
5
5