Featured Courses:

GENERAL CYBERSECURITY AWARENESS

Attacks such as ransomware has increased in recent times. Organizations can reduce the risk of breaches with effective training and in turn avoid fines and reputational damage. This training equips employees with knowledge employees need to adequately secure their organizations.
Read more

Featured Courses:

Cyber Intelligence

Open-Source Intelligence Methods and tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. This course covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity.
Read more

Featured Courses:

ISO 27001 Implementer Training

ISO/IEC 27001 implementer training will enable employees to develop the necessary expertise to support their organizations in establishing, implementing, managing, and maintaining an Information security Management System (ISMS) based on ISO/IEC27001.
Read more

Featured Courses:

ISO 27001 Implementer Training

ISO/IEC 27001 implementer training will enable employees to develop the necessary expertise to support their organizations in establishing, implementing, managing, and maintaining an Information Security Management System (ISMS) based on ISO/IEC27001.
Read more

Featured Courses:

Disaster Recovery and Business Continuity

At the time of a disaster, it is critically essential to have a team that is competent and knowledgeable in managing any business disruption scenario. This course equips employees with skills and knowledge needed to react and recover mission critical processes, operations, data, and systems in a timely manner.
Read more

Training for Every Member of the Enterprise

When it comes to quality instruction in a classroom setting,our Cybersecurity Centre is the leader. Whether you’re a student looking to advance your career or start a new one, or a team leader looking to make sense out of new threats in technology, you’re virtually guaranteed to find a course at the right time, in the right locationthe University’s Cybersecurity Centre!

General Cybersecurity Awareness

Featured Course
Attacks such as ransomware has increased in recent times. Organizations can reduce the risk of breaches with effective training and in turn avoid fines and reputational damage. This training equips employees with knowledge employees need to adequately secure their organizations.

Who Should Attend?

  • Every member of the organization; All internet users
  • Duration: 1 Days (8 Hours)
  • Fees: Ghc. 200.00
  • Emerging Cyber Threats
  • Mobile Money Fraud
  • Advance Persistent Threats (APT)
  • Fake News
  • Data Privacy/Insecurity
  • Hacking into phones and computers
  • Ransomware infections
  • Data theft/Destructions and Unavailability
  • Website Defacement
  • Internet Fraud/Sakawa
  • Credit/Visa Card Fraud/ATM Skimming
  • Social Engineering/Impersonation Attacks
  • Malicious Employee within the organization
  • Mobile Device Theft
  • Identity Theft/Use of Someone’s Identity
  • Picture or Video Blackmail on internet
  • Child Exploitation & Child Pornography
  • Email Abuse
  • Sexting and Social Media Abuse

Cyber Intelligence

Featured Course
Open-Source Intelligence Methods and tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. This course covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity.

Target Audience:

This coursewill benefit journalists, Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies.
Duration: 2 to 4 Weeks
Fees:Ghc2500

ISO 27001 Implementer Training

Featured Course
ISO/IEC 27001 implementer training will enable employees to develop the necessary expertise to support their organizations in establishing, implementing, managing, and maintaining an Information Security Management System (ISMS) based on ISO/IEC27001.

Who Should Attend?

  • Every member of the organization; All internet users
  • Duration: 1 Days (8 Hours)
  • Fees: Ghc. 200.00
  • Introduction to information security and ISO/IEC 270013 organization
  • Leadership
  • Planning
  • Support
  • Operations
  • Performance evaluation
  • Improvement
  • Information security policies
  • Organization of information security
  • Human resources security
  • Asset management
  • Access control
  • Cryptography
  • Physical and environmental security
  • Operations security
  • Communications security
  • System acquisition, development, and maintenance
  • Supplier relationships
  • Information security incident management
  • Information security aspects of business continuity management

PCI-DSS Fundamentals

Featured Course
This course will provide an overview of the PCI-DSS and the requirements for all service provider and merchant compliance programme. It will also educate teams on the requirements, roles, and processes under the PCI DSS.

Target Audience:

Employees from financial institutions; For all members of staff mandated to comply with PCI-DSS
Duration: 2 Days (14 Hours)
Fees:Ghc500.00

High Level Outline

  • High-level overview of PCI requirements and how they enhance data security and support compliance with the PCI Data Security Standard
  • Roles and responsibilities of the key players in the compliance process
  • Overviews of the Internal Security Assessor (ISA), Qualified Security Assessor (QSA,) and Approved Scanning Vendor (ASV) programs
  • PCI Data Security Standard (DSS) overview
  • PCI reporting overview
  • What constitutes PCI compliance
  • Synopsis of the infrastructure used by organizations to accept payment cards and communicate with verification and payment facilities

Disaster Recovery and Business Continuity

Featured Course
At the time of a disaster, it is critically essential to have a team that is competent and knowledgeable in managing any business disruption scenario. This course equips employees with skills and knowledge needed to react and recover mission critical processes, operations, data, and systems in a timely manner.

Targeted Audience

Business continuity managers IT DR managers and coordinators Data Center staff and managers Business continuity team members IT DR consultants Risk Management Professionals Chief Information Officers IT staff and managers Facilities coordinators Internal/External Auditors IT DR Auditors
  • Duration: 2 Days (14 Hours)
  • Fees:Ghc. 500.00

High Level Course Outline

  • Introduction and Key Concepts
  • ISO 22301 –Business Continuity Management System
  • Governance
  • Risk Management
  • Business Impact Analysis (BIA)
  • Business Continuity Planning (BCP)
  • Linkage with IT Disaster Recovery and Related Plans
  • The Human Factor
  • Business Continuity Testing
  • Business Continuity Maintenance, Monitoring and Assurance

CYBERSECURITY WORKSHOPS PROGRAMMES

Cyber Incident Response & Investigations

Course Description

Your organization’s future depends on people, processes, and technology. Being able to handle any incident effectively can have a positive effect on company’s reputation and market value, and it can increase customer confidence. This course enables employees to detect, respond, and remediate incidents in a timely manner


Target Audience:

All staff & employees

CEH

This course/certification will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Target Audience:

This course/certification will benefit Network Administrators, Network Security Administrators, Network Security Engineer, Network Defense Technicians, Security Analyst, Security Operator, or anyone involved in network operations.

Duration: 4 to 8 Weeks
Fees: Ghc. 2800.00

CHFI

This course prepares students adequately for incident investigations. It equips students with skills needed to gather evidence of suspected crime.

Target Audience:

This course/certification will benefit Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies.
Duration: 4 to 8 Weeks
Fees: Ghc.2800

Certified Threat Intelligence Analyst (C|TIA)

Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats.

Target Audience:

Law enforcement officers, intelligence analysts, System Admins, network engineers, IT auditors, incident responders.

Duration: 4 to 8 Weeks
Fees: Ghc.2100

The Certified SOC Analyst (CSA)

The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.

Target Audience:

System Admins, network engineers, incident responders, penetration testers, SOC analysts

Duration: 4 to 8 Weeks
Fees: Ghc.1800

Disaster Recovery Professional (DRP)

DRP provides the professionals with a strong understanding of disaster recovery principles, including conducting business impact analysis, assessing of risks, developing policies and procedures, and implementing a plan. It also teaches professionals how to secure data by putting policies and procedures in place, and how to recover and restore their organization’s critical data in the aftermath of a disaster.

Target Audience:

This course is good for those supporting their companies’ critical infrastructure.System Admins, network engineers, incident responders, penetration testers, SOC analysts, etc can enroll in this course.

Duration: 4 to 8 Weeks
Fees: Ghc.1800

Certified Chief Information Security Officer

The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.

Target Audience:

This course is designed for high executive officials and those in IT and security management positions.

Duration: 4 to 8 Weeks
Fees: Ghc.2200

OTHER COURSES

  • CompTIA Security+ (Exam Prep and Hands-on) (Fees: Ghc. 1500.00)
  • CompTIA Certified Cybersecurity Analyst+ (CySA+) (Exam Prep and Hands-on) (Fees: Ghc.2500.00
  • CompTIA Advanced Practitioner (Exam Prep and Hands-on) (Fees. Ghc.2800)
  • ISACA CISA Exam Prep and Hands-on (Fees. Ghc.2800.00
  • Forensic and Fraud Examination (Hands-On) (Fees. Ghc.2800)
  • ISACA CISM Exam Prep and Hands-on (Fees: Ghc. 2500.00)
  • ISACA CRISC Exam Prep and Hands-on (Fees: Ghc.2500)

Sunyani Technical University