fbpx

Testimonials

Want create site? Find Free WordPress Themes and plugins.

 

“I would like to appreciate Sentinel Africa for successfully taking us through the PECB ISO 27001 Certification. The training was exhaustive thus we were able to get fully certified as Lead Auditors with PECB” – Nicholas Mugambi, Head Internal IT- Mobile Decisioning Africa

 

“Having been working on my company’s Information Security Management Systems (ISMS) based on ISO 27001/2, I needed to get certified to distinguish myself as an ISO 27001 Lead Implementer and Lead Auditor. Sentinel Africa helped me achieve this and prepared me very well for the certification examinations. The certifications have enabled me put into perspective the key concepts of the ISO 27001 standard” – Leonard Kamau

 

“We exist in an information economy and data is the currency. Organization’s are willing to go to extreme lengths to ensure this data is protected and remain confidential. What better way than setting up an ISMS? That’s where ISO27001 comes in for me!” – Sam Muiruri Mburu

Did you find apk for android? You can find new Free Android Games and apps.

News & Events

22301 Lead Implementer (Business Continuity)

Sep 30, 2019

Start Date:14th October 2019  End Date:18th October 2019

Time: 9am-5pm   Venue: Nairobi

ISO 22301 Lead Implementer training course enables

you to develop the necessary expertise to support an organization

in establishing, implementing, managing and maintaining a

Business Continuity Management System (BCMS)

based on ISO 22301.

Read More

Cyber Security Audit Training

Jun 24, 2019

Start Date: 28th  November 2019  End Date: 29th November 2019

Time: 9am – 5pm            Venue: Nairobi

The Cybersecurity Audit training course encapsulates the basic knowledge of auditing a cybersecurity program. The content of this training course incorporates the essentials of cybersecurity auditing encompassed in a two-day foundation course. Cybersecurity audits are an essential tool in testing the effectiveness and safety of the mitigation strategies that organizations employ to protect their systems against cyber attacks. Moreover, candidates will become familiarized with the key concepts of cybersecurity. These key concepts include different controls such as preventive, detective and corrective controls, and more importantly the knowledge of applying the appropriate controls to various environments. During this training course you will be able to understand the different modules of cybersecurity audit, including the cybersecurity frameworks, management of the cybersecurity risks, audit activities such as the initiation of an audit and draft of audit reports, cybersecurity controls and audit strategies.

Read More