Site Overlay

Cyber Security Courses

Certified Information Security Awareness Manager
Customized Digital Forensic Training
Certified Information Security Awareness Manager

Certified Information Security Awareness Manager (CISAM)

Organizations implements security policies and invests into technology, but most neglect educating their workforce. Due to this, the employees become the desired target for cyber attackers. The most effective way to address the human element is to establish an comprehensive security awareness programme that goes beyond compliance, changes human behaviour and to create a security culture. Certified Information Security Awareness Manager (CISAM) is a 2 days hands-on training and certification programme that provides the essential know-how, enabling information security professionals to develop and manage an effective security awareness programme for their organization.The CISAM examination is certified by the Global ACE Certification based on examination framework aligned with relevant Knowledge, Skills and Attitudes (KSA), necessary for an Information Security Awareness Manager.


Training Objective(s)

  1. Identify the “As-Is” state of your organisation’s awareness and competence levels.
  2. Understand the difference between awareness, training and education.
  3. Build and maintain a comprehensive awareness and competence programme, as part of an organisation’s information security programme.
  4. Identify awareness, training and competence needs, develop a training plan, and get organisational buy-in for the funding of awareness and competence programme efforts
  5. Select awareness, training and competence topics; Find sources of awareness and training materials.
  6. Implement awareness and training material, using various methods.
  7. Evaluate the effectiveness of the programme; Understanding and overcoming the obstacles to success; Update and improve the focus of technology and organisational priorities change
  8. Create an effective social engineering assessment programme.



The candidate should have fundamental understanding of ICT and Information Security


Learning Outcome(s)

  1. Understand the human risk to organisations
  2. Understand the difference between awareness, training and education
  3. Understand the current level of awareness among your peers in your organisation
  4. Build and maintain a comprehensive awareness and competence programme, as part of an organisation’s information security programme.
  5. Learn how to build a business case and justify funding for an awareness programme.
  6. Selecting the right topics and knowing the sources of information .
  7. Comparing the various communication channels.
  8. Understanding the obstacles and critical success factors.


Skills Outcome

  1. Is able to develop a business case for implementing an awareness programme for organisation
  2. Is able to measure the current levels and conduct needs assessment
  3. Is able to apply the qualities of a good awareness management system, Is able to apply the strategies for awareness and behaviour management, Is able to apply the strategies for communication and commitment plan,Is able to define the indicators for measurement,Is able to execute awareness programme, Is able to measure and adjust the programme


Module Title


Module 1

Introduction - The difference between “awareness” and “behavior”

Module 2

The elements of risks and analysis on why humans are the weakest link

Module 3

Designing an Awareness and Competence Programme

Module 4

Conducting awareness and training needs assessment

Module 5

Developing Awareness and Competence Material

Module 6

Implementing the Awareness and Competence Programme

Module 7

Various techniques for delivering awareness material

Module 8


Module 9

Overcome Obstacles to Success

Module 10

Conducting Phishing Assessment


Type of Training:

Instructor-led Training (ILT)


Course/Certification Level:



Career Track/Job Roles:

Cyber Risk Analyst, Security Manager



Technical, End User


Register Now

Customized Digital Forensic Training


Un-patched, unprotected computers connected to the Internet are compromised in less than 3 days. The Digital Forensics and Investigation course will teach the students about techniques and tools for successful forensic investigation in hands-on and practical. Students will learn knowledge and technical to perform effective and successful digital forensics. In addition, our trainer will provide necessary forensics tools and testing images for students to conduct the real digital forensics investigations. Upon completion of the 5-day training, students will receive a certification for participation. They will be provided with a test image to take home and investigate/ recover the image with the skills and tools they have learned from the training. If the students successfully recover the image and provide the result / report to us, they will be issued a certificate for successfully complete the training.


Course Contents

Theory hours / P: Practical hours


  1. Introduction (2T / 0P hours)


  • Introduction to Digital Forensics
  • Digital forensic work phase
  • Types of digital forensic
  • News and forensic cases analysis examples sharing


  1. Digital evidence and related legal issues (2T / 0P hours)


  • Types and characteristics of digital evidence
  • Digital forensic legal issues
  • Digital evidence impartiality


  1. On-site standard search procedure (1T / 1P hour)


  • On-site evidence collection preparation
  • On-site evidence collection process
  • Digital evidence storage procedure
  • Digital evidence transportation requirements
  1. Digital forensic laboratory and analysis program (2T / 0P hours)
  • Partition of digital forensic la and tasks
  • Forensic laboratory organisation, role and responsibility
  • Forensic analysis procedure description


  1. Windows file system and file restoration (3T / 2P hours)
  • Disk structure and configuration
  • Disk sector recovery
  • Folder and file recovery
  • Introduction to the file system
  • Add and delete files for Windows FAT system
  • Folder recovery
  • File recovery


  1. File characteristics and data concealment (2T / 1P hours)
  • File characteristics analysis
  • Data hiding
  • Data camouflage


  1. Open Source digital forensics tools and operations (3T / 2P hours)
  • Usage of open source
  • SIFT-Integrated digital forensic platform
  • Autosy-key word searching and analysis


  1. Keyword search and hash value comparison (1T / 2P hours)
  • Raw search syntax
  • How to execute index search
  • Hash comparison


  1. Windows Advanced analysis (2T / 2P hours)
  • NTFS advanced analysis
  • Windows special file analysis


10.Case study -Practice of Simulation (1T /3Phours)

  • Windows platform simulation case analysis


11.Anti-forensic Technology and practice (1T /1P hours)

  • Anti-forensic overview
  • Introduction to Anti-Forensics
  • Anti-forensic practice


12.Case study -Practice of Simulation (2T /4P hours)

  • Linux platform simulation case


Course Duration

5 Days


Level Basic


Register Now