Available courses

Based on the CISSP CBK, taking a broader view of cybersecurity by including a focus on governance and risk management.

In the course, we cover topics such as information security governance, legal and regulatory requirements, risk management, security controls, security operations, and software development security. 

When a cyber incident is suspected, the first 15minutes are critical. 

This kit provides an actionable, evidence‑safe triage workflow that executives and ops can run together — with clear roles, decision points, and communications.

Based on the CISSP CBK, taking a broader view of cybersecurity by including a focus on governance and risk management.

In the course, we cover topics such as information security governance, legal and regulatory requirements, risk management, security controls, security operations, and software development security. 

In an era where digital data is increasingly interwoven with any forensic investigation, understanding secure communication, encrypted data transmission, and protected storage is critical for both digital and physical forensic practitioners. While encryption is often viewed as a challenge to forensic investigations, it is also a vital tool for preserving evidential integrity, securing sensitive forensic findings, and ensuring compliance with modern forensic standards. 

This course is designed to supplement the AANZFSS2025 workshop to bridge the gap between traditional forensic science and digital forensics, demonstrating how encryption serves as a protective measure rather than an investigative barrier. By equipping forensic practitioners with essential cybersecurity skills, this session ensures that forensic investigations remain secure, resilient, and aligned with modern best practices.

Navigate the Digital Operational Resilience Act requirements with confidence.

Helping financial entities build robust ICT risk management frameworks, ensuring compliance while strengthening operational resilience.

Stay ahead of regulatory deadlines and avoid costly penalties.

Cybersecurity & Risk Management Modules 

Artificial intelligence is reshaping how we work, communicate, and make decisions. This course gives professionals the knowledge and hands-on skills to engage with AI tools confidently, critically, and responsibly.

Across ten modules, participants move from foundational understanding through to practical application. We begin by demystifying what AI actually is, how it reasons, and where it reliably falls short. From there, participants learn to communicate effectively with AI systems, integrate them into everyday workflows, and evaluate outputs with appropriate scepticism.

The course pays close attention to the ethical dimensions of AI use, including data privacy, bias, and the professional obligations that remain firmly human. Participants are encouraged to bring their own workplace contexts into the learning, ensuring the skills developed are immediately applicable.

By the end of the course, participants will have a personal AI practice they can build on, a critical lens for evaluating new tools as they emerge, and a clear sense of where human judgement remains essential.

No technical background is required. What is required is curiosity, a willingness to experiment, and the professional judgement you already bring to your mahi.