Cybersecurity Capacity Building Course 
Level 1
Foundational Cybersecurity

Write your awesome label here.

Mrs. Fafali Mathis

Head Instructor/
Chief of Operations

Mr. Kɔmla Elikem

Head Facilitator/CEO

Nana Yaw Ababio

Facilitator / Cyber Solutions Architect
This isn't just another cybersecurity course. This is your transformation from user to strategist, from operator to leader. In 16 intensive weeks, you'll gain the strategic mindset and comprehensive knowledge to manage cybersecurity operations, lead teams, and make critical decisions that protect organizations from evolving threats.

What's included?

  • 5 Chapters
  • 17 Courses
  • 17 Quizes
  • 6 Assignments
  • 4 modules
  • 2 Practicals 
  • Final Exam
  • Certificate of Completion

Become a Cyber Defender

This isn't just another cybersecurity course. This is your transformation from user to strategist, from operator to leader. In 16 intensive weeks, you'll gain the strategic mindset and comprehensive knowledge to manage cybersecurity operations, lead teams, and make critical decisions that protect organizations from evolving threats.

WHO THIS IS FOR:

  • Future Chief Information Security Officers (CISOs) starting their leadership journey
  • Anyone frustrated by surface-level training who craves deep, practical cybersecurity knowledge
  • Managers who need to make informed cybersecurity decisions and budget allocations
  • IT managers being asked to "handle security" without proper training
  • Aspiring cybersecurity managers who need to lead teams and make critical decisions

Course Lessons

Meet the Head Facilitator

Mr. Kɔmla Elikem

Mr. Kɔmla Elikem has over 25 years of experience in ICT and cybersecurity for the United States Department of Defense and the private sector. His expertise is in network defense and management. His years of leadership made him a valuable asset in research and development, international collaborations on IT projects, and education and training.

Patrick Jones - Course author
Guaranteed Security using one of the most advanced encrypted systems on the market.
The information in this page is being processed and encrypted securely using industry-leading encryption and fraud prevention tools.
Created with