top of page
WKTA_Training and Development Banner.png

Training & Development

NATIONAL CYBERSECURITY STRATEGY (NCS)

STANDARDS & COMPLIANCE (SNC) 

PRIVACY & DATA PROTECTION (PDP)

CRITICAL NATIONAL INFRASTRUCTURE PROTECTION (CNI)

CYBERSECURITY PUBLIC POLICY (CPP)

TECHNOLOGY (TEC)

CYBERSECURITY EDUCATION (CED)

Start Learning

Register your interest and we’ll be in contact to share further details shortly.

Your Selected Courses

NCS01: National Cybersecurity Strategy Lifecycle

NCS02: Managing & Organising a CERT

NCS03: Incident Handling & Response

SNC01: Common Criteria & Its Applications

SNC02: ISMS for Organisations

SNC03: Risk Management Strategy

SNC04: GDPR Implementation & Compliance

SNC05: Introduction to Cybersecurity Audit

PDP01: Data Protection & Privacy

PDP02: Protecting National Sovereignty Through Cybersecurity

PDP03: Data Privacy & Social Networks

PDP04. Protecting Kids Online

CNI01: Introduction To Critical National Information Infrastructure Protection

CNI02: Critical National Information Infrastructure Protection Workshop
– Transportation Sector Case Study

CNI03: Critical National Information Infrastructure Protection Workshop
– Financial Sector Case Study

CNI04: Critical National Information Infrastructure Protection Workshop
– Energy & Power Sector Case Study

CNI05: Critical National Information Infrastructure Protection Workshop
– Water & Utilities Sector Case Study

CNI06: Critical National Information Infrastructure Protection Workshop
– Food & Agriculture Sector Case Study

CNI07: Critical National Information Infrastructure Protection Workshop
– Government Services Sector Case Study

CNI08: Critical National Information Infrastructure Protection Workshop
– Healthcare Sector Case Study

CNI09: Critical National Information Infrastructure Protection Workshop
– Information Technology Sector Case Study

CNI10: Critical National Information Infrastructure Protection
– Emergency Services Case Study

CNI11: Critical National Information Infrastructure Protection
– National Defence Case Study

CNI12: Critical National Information Infrastructure Protection Workshop

CNI13: Supply Chain Security

CPP01: Working with International Organisations on Cybersecurity

CPP02: Working with Other Governments on Cybersecurity

CPP03: Working with Private Sector on Cybersecurity

CPP04: Budgeting for Cybersecurity Programmes

CPP05: Rightsizing Cybersecurity for your Nation’s Needs & Obtaining Funding for It

CPP06: Cybersecurity for e-Gov Services

CPP07: Cybersecurity & Privacy for Campaigns

CPP08: VIP Security

TEC01: Introduction to Security Awareness

TEC02: Security Awareness Workshop

TEC03: Social Engineering & Ransomware

TEC04: Managing Network Security Threats

TEC05: Managing Threats to IoT Security

TEC06: Managing Zero Days Exploits

TEC07: Implementing AI & Machine Language to Improve Cybersecurity

TEC08: Encryption for Data in Motion & Data at Rest

TEC09: Mobile Device Security

TEC10: Firewall & Intrusion Detection Systems

TEC11: Access Control & Password Management

TEC12: Cloud Security Best Practices & Implementation

TEC13: Understanding Digital Forensics & Its Lifecycle

TEC14: Securing Your Datacentre

TEC15: Managing Vendor & Partner Relationships

TEC16: 5G Security Essentials

CED01: Building a Cybersecurity Training Roadmap

CED02: Training & Retaining Cybersecurity Staff

CED03: Cybersecurity Education & Certification

Thank You!

An error occurred. Try again later

bottom of page