Information Security

Cyber Security Training Courses in Kenya

If you’re looking to learn the fundamentals of cybersecurity, advance tactics, or prepare for industry-recognized certifications, we’ve got you covered. At an alarming rate, data breaches are occurring. We no longer have to wonder what will happen next, but rather when. It is now necessary for the C-suite to cooperate with IT experts to develop […]

Cyber Security Training Courses in Kenya Read More »

What is Phishing? – How to Protect Yourself

Phishing: What It Is and How to Protect Yourself In today’s digital age, we rely heavily on the internet and technology to go about our daily lives. We use email to communicate with friends and colleagues, shop online for products and services, and conduct banking transactions from the comfort of our own homes. While these

What is Phishing? – How to Protect Yourself Read More »

confidentiality, integrity and availability

What is Confidentiality, Integrity and Availability – CIA Triad

Confidentiality, Integrity and Availability – What is it? You may have heard information security specialists referring to the “CIA” — but they’re usually not talking about the Central Intelligence Agency. CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of confidentiality, integrity and availability of information. Data confidentiality

What is Confidentiality, Integrity and Availability – CIA Triad Read More »

API Security | Applications

Complete Guide on API Security for Mobile Apps | Creative Ground Tech     What is API security? The world has transitioned to an era of interconnectivity with the Internet of Things (IoT) taking over all phases of everyday human life. And, API is the most common thread that connects all devices and microservices. With

API Security | Applications Read More »

Zero Trust

Zero Trust Cyber Security Approach

We adopt a “Zero Trust Architecture” (ZTA) cybersecurity paradigm. Why? Inadequate access controls can lead to data exfiltration, unauthorized access, lateral movement and/or the introduction of malware into an environment. Consequences of that include damage to brand/reputation, fines, erosion of customer confidence, delays in service delivery due to unplanned downtime, lengthened approval processes and impacts

Zero Trust Cyber Security Approach Read More »

cgt

C2: Command and Control Explained

A successful cyberattack is about more than just getting your foot into the door of an unsuspecting target. To be of any real benefit, the attacker needs to maintain persistence access within the target environment, communicate with infected or compromised devices inside the network, and potentially exfiltrate sensitive data. The key to accomplishing all these

C2: Command and Control Explained Read More »

WHAT IS VULNERABILITY RESPONSIBLE DISCLOSURE?

What Is Vulnerability Responsible Disclosure?

  Vulnerability Responsible Disclosure refers to the best practice followed by most security researchers of not disclosing a critical vulnerability in a software product until a vendor patch or fix has been made readily available. The reason that the security analysts and researchers aren’t able to share the information publicly is that hackers and cyber

What Is Vulnerability Responsible Disclosure? Read More »

what is Sql injection

What is SQL injection?

SQL injection, also known as SQLi, is a common database attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed. This information may include any number of items, including sensitive data, user details or private customer information. SQL (pronounced “ess-que-el”) stands for Structured Query

What is SQL injection? Read More »

error: Content is protected !!

Our training courses are designed to help businesses develop the workforce with the vital skills any organization requires.

The #1 cyber security and data science training provider in Africa.

Our Courses

Newsletter

Sign up to our newsletter