Zero Trust

Zero Trust Cyber Security Approach

We adopt a “Zero Trust Architecture” (ZTA) cybersecurity paradigm. Why? Inadequate access controls can lead to data exfiltration, unauthorized access, lateral movement and/or the introduction of malware into an environment. Consequences of that include damage to brand/reputation, fines, erosion of customer confidence, delays in service delivery due to unplanned downtime, lengthened approval processes and impacts …

Zero Trust Cyber Security Approach Read More »

Maturity Models of Enterprise Information Security

For today’s enterprises that are highly dependent on information competitiveness, the importance of information security has no need to be overstated, which is reflected in the increasing information security budget of enterprises every year and the continuous improvement of information security priorities. However, with the continuous acceleration of technological innovation in the information security market, …

Maturity Models of Enterprise Information Security Read More »

data science training in Kenya

Data Science – All You Need To Know

Data science has recently become a hot field in computing. Data science involves using the computing power of computers to process data, extract information from data, and then form “knowledge”. It has influenced branches of computing such as computer vision, signal processing, and natural language recognition. Data science has been widely used in IT, finance, medicine, autonomous …

Data Science – All You Need To Know Read More »

IT Risk Assessment

Threat, Vulnerability & Risk – Cyber Security Concepts

The most commonly mixed up security terms; Threat, vulnerability, and risk. While it might be unreasonable to expect those outside the security industry to understand the differences, more often than not, many in the business use these terms incorrectly or interchangeably. Maybe some definitions (from Strategic Security Management) might help. Asset – People, property, and …

Threat, Vulnerability & Risk – Cyber Security Concepts Read More »


What is Server Side Request Forgery (SSRF)

SSRF (Server-Side Request Forgery) is a security loophole constructed by an attacker to form a request initiated by the server. In general, the target of an SSRF attack is an internal system that cannot be accessed from the external network . (Because it is initiated by the server, it can request the internal system connected to it but isolated from the …

What is Server Side Request Forgery (SSRF) Read More »


C2: Command and Control Explained

A successful cyberattack is about more than just getting your foot into the door of an unsuspecting target. To be of any real benefit, the attacker needs to maintain persistence access within the target environment, communicate with infected or compromised devices inside the network, and potentially exfiltrate sensitive data. The key to accomplishing all these …

C2: Command and Control Explained Read More »

Open XDR

Open XDR. What is it?

Open XDR is a unified, AI-powered approach to detection and response, that collects and correlates all existing security tools, to protect the entire enterprise attack surface effectively and efficiently. Open XDR is more like ‘Everything Detection and Response’, more than eXtended Detection and Response, because it must defend against all threats across the entire attack surface. The …

Open XDR. What is it? Read More »

Penetration Testing & Vulnerability Assessment

we will do it amazingly Penetration Testing Services Cybersecurity Services in Africa How We Can Help A comprehensive vulnerability assessment provides organizations with the knowledge, awareness and risk background necessary to understand threats to their environment. Remediation measures can then be applied accordingly. Identifying risks before hackers do will drastically improve the cyber security posture …

Penetration Testing & Vulnerability Assessment Read More »

Nmap Cheat Sheet

Nmap Cheat Sheet

  Here are simple nmap commands that will make your penetration testing easier. Nmap is a free and open-source network scanner. Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing Computer Networks, including Host Discovery and Services …

Nmap Cheat Sheet Read More »

error: Content is protected !!

Our training courses are designed to help businesses develop the workforce with the vital skills any organization requires.

The #1 cyber security and data science training provider in Africa.

Our Courses


Sign up to our newsletter