Information Technology & Cybersecurity Training and Consulting
— Inventory and Control of Enterprise Assets Inventory and Control of Software Assets Data Protection Secure Configuration of Enterprise Assets and Software Account Management Access Control Management Continuous Vulnerability Management Audit Log Management Email and Web Browser Protections Malware Defenses Data Recovery Network Infrastructure Management Network Monitoring and Defense Security Awareness and Skills Training Service Provider Management Application Software Security Incident Response Management Penetration Testing
— Govern Identify Protect Detect Respond Recover
— Devices Software Data Users Network Documentation
+234 1 4536171
[email protected]