IT Security and Cybercrime Prevention Course


Course Cover

Register for this course

We are proud to offer this course in a variety of training formats to suit your needs. We use the highest quality learning facilities to make sure your experience is as comfortable as possible. Our face to face calendar allows you to choose any classroom course of your choice to be delivered at any venue of your choice - offering you the ultimate in convenience and value for money.

June 2025

Date Duration Location Standard Fee Action
16 Jun - 27 Jun 10 days Half-day KES 110,000 | $ 1,190 Individual Group

July 2025

Date Duration Location Standard Fee Action
21 Jul - 1 Aug 10 days Half-day KES 110,000 | $ 1,190 Individual Group

August 2025

Date Duration Location Standard Fee Action
18 Aug - 29 Aug 10 days Half-day KES 110,000 | $ 1,190 Individual Group

Introduction 

In today's digital world, IT security and cybercrime prevention are more important than ever. Cybercriminals are becoming increasingly sophisticated, and the threats to our personal and business data are constantly evolving. Cybercriminals use the internet to steal data, commit fraud, and disrupt businesses. When data is stolen, it can be used to commit identity theft and stop business operations making businesses lose billions. Cybercrime can also be used to harass or intimidate individuals.

This course will teach you the skills and knowledge you need to protect yourself and your organization from cybercrime. You will learn about the different types of cyber threats, how to identify and assess your vulnerabilities, and how to implement effective security measures. You will also learn about the importance of cybersecurity awareness and best practices. You will learn about the different types of cyber threats, how to identify and assess your vulnerabilities, and how to implement effective security measures. You will also learn about the importance of cybersecurity awareness and best practices.

Duration

10 days.

Who Should Attend

  • IT Security Professionals
  • System Administrators and Network Administrators
  • IT Managers
  • Legal and Compliance Professionals
  • Ethical Hackers and Penetration Testers
  • Auditors and Risk Assessors

Course Level:

Course Objective 

At the end of the course training, participants should be able to;

  • Understand the fundamental concepts of IT security.
  • Recognize and classify various cyber threats.
  • Learn the importance of security policies and best practices.
  • Explore network security measures and protocols.
  • Understand the security considerations for applications.
  • Learn how to protect sensitive data through encryption.
  • Explore the importance of security awareness and training.
  • Learn how to respond to security incidents and recover from them.

Course Outline:

Module 1: Introduction to IT Security and Cybercrime

  • Understanding IT security and cybercrime
  • The importance of IT security
  • Types of cyber threats and attacks
  • Legal and ethical considerations
  • Employee Training and Security Awareness Programs

Module 2: Fundamentals of Network Security

  • Network security principles
  • Firewalls and intrusion detection systems
  • Virtual Private Networks (VPNs)
  • Securing wireless networks

Module 3: Types of Cyber Threats

  • Malware (Viruses, Trojans, Ransomware)
  • Phishing Attacks and Simulation
  • DDoS Attacks and Simulation
  • Insider Threats and Simulation
  • Social Engineering Attacks 

Module 4: Information Security Policies and Procedures

  • Developing security policies and procedures
  • Access control and user management
  • Data classification and protection
  • Incident response planning
  • The CIA Triad Matrix

Module 5: Cryptography and Encryption

  • Introduction to cryptography
  • Encryption algorithms and methods
  • Public key infrastructure (PKI)
  • Securing communications and data at rest

Module 6: Web Security

  • Web application security
  • Common web vulnerabilities
  • Authentication and Authorization
  • Security for e-commerce and online transactions
  • Content Security Policy (CSP)

Module 7: Mobile Device and IoT Security

  • Security challenges in mobile devices
  • Mobile app security
  • Internet of Things (IoT) security considerations
  • Best practices for securing mobile and IoT devices

Module 8: Cloud Security

  • Cloud computing security fundamentals
  • Securing cloud infrastructure and services
  • Identity and access management in the cloud
  • Compliance in the cloud

Module 9: Social Engineering and Insider Threats

  • Understanding social engineering tactics
  • Recognizing and mitigating insider threats
  • User awareness and training
  • Psychological aspects of security

Module 10: Risk Management and Compliance

  • Risk assessment and analysis
  • Regulatory compliance 
  • Security audits and assessments
  • Business continuity and disaster recovery planning

Module 11: Data Security and Encryption

  • Data Classification
  • Data Loss Prevention (DLP)
  • Encryption Methods

Module 12: Incident Response and Forensics

  • Preparing for and responding to security incidents
  • Digital forensics principles
  • Investigating and documenting security breaches
  • Legal aspects of incident response

Related Courses


Course Administration Details:

Methodology

These instructor-led training sessions are delivered using a blended learning approach and include presentations, guided practical exercises, web-based tutorials, and group work. Our facilitators are seasoned industry experts with years of experience as professionals and trainers in these fields. All facilitation and course materials are offered in English. Participants should be reasonably proficient in the language.

Accreditation

Upon successful completion of this training, participants will be issued an Indepth Research Institute (IRES) certificate certified by the National Industrial Training Authority (NITA).

Training Venue

The training will be held at IRES Training Centre. The course fee covers the course tuition, training materials, two break refreshments, and lunch. All participants will additionally cater to their travel expenses, visa application, insurance, and other personal expenses.

Accommodation and Airport Transfer

Accommodation and Airport Transfer are arranged upon request. For reservations contact the Training Officer.

Tailor-Made

This training can also be customized to suit the needs of your institution upon request. You can have it delivered in our IRES Training Centre or at a convenient location. For further inquiries, please contact us on:

Payment

Payment should be transferred to the IRES account through a bank on or before the start of the course. Send proof of payment to [email protected]


Course Registration

Click here to register for this course.

Register Now
Customize Attendance Dates

Customized Schedule is available for all courses irrespective of dates on the Calendar. Please get in touch with us for details.

Information Request

Do you need more information on our courses? Talk to us.


Who else has taken this course?


# Job Title Organisation Country
1 Information system Auditor K.unity sacco Kenya
2 ICT Officer Capital Markets Authority Kenya
3 ICT Officer Capital Markets Authority Kenya
4 Network Administrator II National Council for Law Reporting Kenya
5 ICT Officer Capital Markets Authority Kenya
Customize your Dates of Attendance
📱 Install our app for a better experience!