Policy and control procedure documents are absolutely worthless until all staff know their role in the Information security and business continuity process, and where their responsibility starts and ends.
We follow a user-friendly format with simple techniques to facilitate engaging and realistic awareness sessions to ensure optimal learning by all participants and create support, enthusiasm and buy-in across your workforce.
Our trainings courses concentrate on addressing real life challenges faced by organizations both technical and non-technical. We use of a wide range of frameworks and industry best practice standards to equip your workforce with necessary skills to anticipate, detect, respond and contain adversaries as a key aspect of our training program.
Each learner who receives a score of 70 percent or higher on the relevant post-assessment will be able to print or be handed a Certificate of Training for that module. This can be used as evidence of meeting annual training requirements.
Courses offered include:
Speak to our consultants now and find out how we can meet your training needs.