Providing in-depth training in
Network Penetration, Ethical Hacking, Cloud Computing, Risk Management, FISCAM, Privacy
Successful attacks on public and private sector information systems can result in serious or grave damage to the national and economic security interests of any country.
Given the significant and growing danger of these threats, it is imperative that leaders at all levels of an organization understand their responsibilities for achieving adequate information security and for managing information system-related security risks and hiring the right Cyber Security experts."
We firmly believe that our purpose is not just how we train, energize, empower, and engage our clients – it’s also how we operate in supporting organizations achieve adequate information security and proactively counter attacks on their information systems.
Mr. Asamoah has over 10 years of experience in information
systems security audits and compliance. He has managed and
performed numerous FISMA, Cybersecurity, and Compliance
Audits, Reviews for Federal agencies, and departments as
well as numerous private companies.
Mr. Asamoah has experience in reviewing and auditing information security controls over sophisticated distributed system architectures, critical system processes and a variety of platforms including Windows, UNIX/Linux, CSAM, Mainframe, Oracle, SQL Server, Office 365 platforms and many more.
Mr. Asamoah holds a bachelor’s degree in Information Systems Security (Cyber-Security) from the ITT Tech Institution. He is also a Certified CompTIA Advanced Security Practitioner (CASP+) Mastery Level, Certified Information Security Manager (CISM), and Six Sigma Yellow belt certified.
Mr. Mensah has over 17 years of experience in financial
management and information systems security consulting and
audits. He has managed and performed numerous FISMA,
FISCAM (CFO Act/GMRA), Cybersecurity, and Compliance
Audits, Reviews and Consulting for over 17 Federal
agencies and departments as well as numerous private
companies, local governments, and transit agencies.
Mr. Mensah has experience in reviewing and auditing information security controls over sophisticated distributed system architectures, critical system processes and a variety of platforms including Windows, UNIX/Linux, AS 400, zOS, OpenVMS, Oracle, Sybase, SQL Server, RACF, ACF2 and Top Secret, Oracle Financials, and PeopleSoft.
Mr. Mensah holds an MBA in Finance and BSc in Business Administration (Accounting) from the University of Ghana Business School. He is also a Certified Public Accountant (CPA), Certified Information Systems Auditor (CISA), and Certified Global Management Accountant (CGMA) and currently a member of the American Institute of Certified Public Accountants (AICPA) and the Information Systems Audit and Control Association (ISACA).
Graduated as a process engineer (Chemical Engineer). He has Associate degree in Applied science focused in Nuclear Medicine. He also works as a system Engineer, Arcsight Engineer, cybersecurity Engineer and CDM splunk Engineer.
Nana Osafo-Mensah is an accomplished Information
Technology leader with over 28 years of demonstrated
experience designing, building and delivering complex and
successful IT system solutions or products efficiently and
with high quality.
Nana Osafo-Mensah Specialises in Modern Workplace, Digital Transformation, IT project management, Enterprise Architectures, Business Process Engineering, Business Process Re-engineering, Business Process Automation, Enterprise Content Management, Low Code/No Code Solutions (LCNC), PowerApps, Power BI Power Virtual Agent(PVA), Power Automate, Dynamics 365, DataVerse formerly (CDS), Enterprise Common Data Models, Artificial Intelligence(AI) Machine Learning(ML) , Robotic Process Automation (RPA), Azure Cloud, Azure, Cognitive Services, Data lake, Azure DevOps, AWS Cloud, Google Cloud Platform.
Nana Osafo-Mensah holds a BS in IT, an MBA in Technology Management, ITIL and Agile Certified SCRUM Master.
It's time to get I.T
FISMA - Risk Management and Compliance
FISCAM – Financial Audit
Penetration Testing and Ethical Hacking
Splunk – Tool
- Understanding the Three (3) Primary Types of Cloud Environments.
- Understanding The Main Cloud Service Models Generally Fall into Three (3) Categories.
- The future of cloud computing.
Take a look at our other services
Like our courses?
Why choose us?
- 01. We are strongly creative.
- 02. We are very responsible.
- 03. We are super friendly.
Admission is in progress