Cybersecurity Capacity Building Course
Level 1
Foundational Cybersecurity
Mrs. Fafali Mathis
Head Instructor/
Chief of Operations
Chief of Operations
Mr. Kɔmla Elikem
Head Facilitator/CEO
Nana Yaw Ababio
Facilitator / Cyber Solutions Architect
This isn't just another cybersecurity course. This is your transformation from user to strategist, from operator to leader. In 16 intensive weeks, you'll gain the strategic mindset and comprehensive knowledge to manage cybersecurity operations, lead teams, and make critical decisions that protect organizations from evolving threats.
What's included?
-
5 Chapters
-
17 Courses
-
17 Quizes
-
6 Assignments
-
4 modules
-
2 Practicals
-
Final Exam
-
Certificate of Completion
Become a Cyber Defender
This isn't just another cybersecurity course. This is your transformation from user to strategist, from operator to leader. In 16 intensive weeks, you'll gain the strategic mindset and comprehensive knowledge to manage cybersecurity operations, lead teams, and make critical decisions that protect organizations from evolving threats.
WHO THIS IS FOR:
- Future Chief Information Security Officers (CISOs) starting their leadership journey
- Anyone frustrated by surface-level training who craves deep, practical cybersecurity knowledge
- Managers who need to make informed cybersecurity decisions and budget allocations
- IT managers being asked to "handle security" without proper training
- Aspiring cybersecurity managers who need to lead teams and make critical decisions
Course Lessons
Meet the Head Facilitator
Mr. Kɔmla Elikem
Mr. Kɔmla Elikem has over 25 years of experience in ICT and cybersecurity for the United States Department of Defense and the private sector. His expertise is in network defense and management. His years of leadership made him a valuable asset in research and development, international collaborations on IT projects, and education and training.
Patrick Jones - Course author
Guaranteed Security using one of the most advanced encrypted systems on the market.
The information in this page is being processed and encrypted securely using industry-leading encryption and fraud prevention tools.