Security Training
Footprint Africa Business Solutions (FABS) provides a variety of different certified security courses. These courses can either be done remotely or facilitated by one of our security experts.
FABS offers the following courses:
EC Council Training
Certified Ethical Hacker (CEH)
C|EH is the world’s most advanced certified ethical hacking course that covers 20 of the most current security domains any individual will ever want to know when they are planning to significantly improve the information security posture of their organisation.
Certified Chief Information Security Officer (CCISO)
The C|CISO certification is an industry-leading program that recognises the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for a C-Level positions, the C|CISO program combines audit management, governance, information security controls, human capital management, strategic program development, and the financial expertise vital for leading a highly successful information security programme.
​
Certified Application Security Engineer (CASE - .Net / CASE - Java)
CASE goes beyond just the guidelines on secure coding practices but include secure requirement gathering, robust application design, and handling security issues in post development phases of application development. This makes CASE one of the most comprehensive certifications for secure software development in the market today. It’s desired by software application engineers, analysts, testers globally, and respected by hiring authorities.
FABS offers certified training for both CASE - .Net and CASE – Java.
​
EC Council Certified Incident Handler (ECIH)
The ECIH program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats.
​
Certified Secure Computer User (CSCU)
CSCU provides individuals with the necessary knowledge and skills to protect their information assets. This course covers fundamentals of various computer and network security threats such as identity theft, credit card fraud, phishing, virus and backdoors, emails hoaxes, loss of confidential information, hacking attacks, and social engineering.
​
Advanced Network Defence (CAST 614 / CAST 611)
Advanced Network Defence is an advanced course offering the opportunity to deep dive into the crucial practical aspects of enterprise network security. It covers fundamental areas of fortifying your defences by discovering methods of developing a secure baseline and how to harden your enterprise architecture from the most advanced attacks.
Computer Hacking Forensic Investigator (CHFI)
CHFI is a comprehensive course covering major forensic investigation scenarios, enabling students to acquire hands-on experience. The program provides a strong baseline knowledge of key concepts and practices in the digital forensic domains relevant to today’s organizations. Moreover, CHFI provides firm grasp on the domains of digital forensics.
EC Council Certified Security Analyst (ECSA)
ECSA is a globally accepted hacking and penetration testing program that covers the testing of modern infrastructures, operating systems, and application environments while teaching the students how to document and write a penetration testing report.
​
​
Certified Network Defender (CND)
CND is the world’s most advanced network defence course that covers 14 of the most current network security domains any individuals will ever want to know when they are planning to protect, detect, and respond to the network attacks.
​
​
EC Council Disaster Recovery Professional (EDRP)
The EDRP course identifies vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organisation. It also provides the networking professional a foundation in disaster recovery course principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies and procedures, an understanding of the roles and relationships of various members of an organisation, implementation of a plan, and recovering from a disaster.