ethical hacking

Cyber Security Training Courses in Kenya

If you’re looking to learn the fundamentals of cybersecurity, advance tactics, or prepare for industry-recognized certifications, we’ve got you covered. At an alarming rate, data breaches are occurring. We no longer have to wonder what will happen next, but rather when. It is now necessary for the C-suite to cooperate with IT experts to develop […]

Cyber Security Training Courses in Kenya Read More »

API Security | Applications

Complete Guide on API Security for Mobile Apps | Creative Ground Tech     What is API security? The world has transitioned to an era of interconnectivity with the Internet of Things (IoT) taking over all phases of everyday human life. And, API is the most common thread that connects all devices and microservices. With

API Security | Applications Read More »

Maturity Models of Enterprise Information Security

For today’s enterprises that are highly dependent on information competitiveness, the importance of information security has no need to be overstated, which is reflected in the increasing information security budget of enterprises every year and the continuous improvement of information security priorities. However, with the continuous acceleration of technological innovation in the information security market,

Maturity Models of Enterprise Information Security Read More »


C2: Command and Control Explained

A successful cyberattack is about more than just getting your foot into the door of an unsuspecting target. To be of any real benefit, the attacker needs to maintain persistence access within the target environment, communicate with infected or compromised devices inside the network, and potentially exfiltrate sensitive data. The key to accomplishing all these

C2: Command and Control Explained Read More »

What is Cross-site Request Forgery (CSRF)?

What is Cross-site Request Forgery (CSRF)?

What is Cross-Site Request Forgery (CSRF)? Cross-site Request Forgery, also known as CSRF is an attack whereby an attacker tricks an end user to execute unwanted actions on a web application in which they’re currently authenticated. The impact of the attack depends on the level of permissions that the victim has on the application. Such

What is Cross-site Request Forgery (CSRF)? Read More »

what is Sql injection

What is SQL injection?

SQL injection, also known as SQLi, is a common database attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed. This information may include any number of items, including sensitive data, user details or private customer information. SQL (pronounced “ess-que-el”) stands for Structured Query

What is SQL injection? Read More »

error: Content is protected !!

Our training courses are designed to help businesses develop the workforce with the vital skills any organization requires.

The #1 cyber security and data science training provider in Africa.

Our Courses


Sign up to our newsletter