Certified Cybersecurity Professional


Cyber attacks are the fastest growing crime in the world, and they continue to grow in size and sophistication. Companies like Facebook, Panera Bread, Under Armour and Uber made headlines after having customer information stolen. With each breach, administrative fears and the demand for cybersecurity certifications increase.

These fears are not unfounded. Several researches show that over 60 %  in the U.S. would likely halt any interaction with a business that’s officially been hacked.

As a company, you might find yourself scrambling to hire top cybersecurity talent or equip your IT team with cybersecurity certifications. As an IT professional, the demand for cybersecurity skills presents a huge opportunity to boost your résumé, stand out among candidates and increase your earning potential.

According to a  CyberSeek report, the number of cybersecurity job openings in the U.S. stands at almost 302,000, with nearly 769,000 cybersecurity professionals employed in today’s workforce. Projections continue to be robust further out: CSO  expects that number to hit 500,000 by 2021, with more than 3 million cybersecurity jobs open for the rest of the world that same year.

Our Certified Cybersecurity Risk Management Professional encompasses the following other relevant certifications:

  • Certified Ethical Hacker
  • Certified Information Security Manager
  • CompTIA Security+
  • CISSP: Certified Information Systems Security Professional
  • GSEC: SANS GLAC Security Essentials

To stop a hacker, you must be able to think like one. It’s an interesting balance between toeing the line of moral actions and processing the malicious thoughts the average cybercriminal would have. This kind of mentality isn’t easy to come by, which is why we offer the CCSP.

Course Modules

Introduction to Cybersecurity

  • Overview of the cyber threat landscape
  •  Impacts of cyber security incidents as well as tactics and strategies to aid cyber defence.
  •  Passwords and password management-Importance of strong passwords
  •  Simple techniques to assist users in choosing and managing their passwords.
  •  An introduction to hacking
  •  Basic technical concepts behind the various stages of a hacking attack
  • Some common tools and techniques used by hackers and security professionals alike.

Phishing Attacks

  • What is Phishing?
  • Why is Phishing a Problem?
  • Malicious Web Links
  • Malicious Attachments
  • Fraudulent Data
  • Phishing Statistics: What they say
  • How to Combat Phishing



Social Engineering and Insider Threats

  • The weakest security link in any organisation – its people
  • How to help people do the right thing, and deterring or detecting malicious intent.
  • What is social engineering  and who or what are social engineers, what they want, how they get it, and how to stop them.
  • Bring Your Own Device (BYOD) – the growing trend of BYOD, the Pros and Cons as well as policy considerations.

Internet and Social Networking

  • Safe internet.
  • Online and mobile banking
  • Online shopping
  • Social networking
  • Using wireless networks
  • Antivirus software and installing updates
  • Introduction to PCI DSS
  • Managing Home and Mobile Working Risks
  • Managing and Preventing Malware
  • Managing Physical security
  • Basics of Removable Media