Loading...
Skip to Content

Providing in-depth training in

Network Penetration, Ethical Hacking, Cloud Computing, Risk Management, FISCAM, Privacy

"Cyber-attacks on information systems today are often aggressive, disciplined, well-organized, well-funded,
and in a growing number of documented cases, very sophisticated.

Successful attacks on public and private sector information systems can result in serious or grave damage to the national and economic security interests of any country.

Given the significant and growing danger of these threats, it is imperative that leaders at all levels of an organization understand their responsibilities for achieving adequate information security and for managing information system-related security risks and hiring the right Cyber Security experts."
2nd Generation IT Group LLC goal is to Inspire Confidence and Provide Cyber security Training to our clients with all the needed skill set required to assist organizations protect their information system and manage information system-related security risks.

We firmly believe that our purpose is not just how we train, energize, empower, and engage our clients – it’s also how we operate in supporting organizations achieve adequate information security and proactively counter attacks on their information systems.

Mr. Asamoah has over 10 years of experience in information systems security audits and compliance. He has managed and performed numerous FISMA, Cybersecurity, and Compliance Audits, Reviews for Federal agencies, and departments as well as numerous private companies.

Mr. Asamoah has experience in reviewing and auditing information security controls over sophisticated distributed system architectures, critical system processes and a variety of platforms including Windows, UNIX/Linux, CSAM, Mainframe, Oracle, SQL Server, Office 365 platforms and many more.

Mr. Asamoah holds a bachelor’s degree in Information Systems Security (Cyber-Security) from the ITT Tech Institution. He is also a Certified CompTIA Advanced Security Practitioner (CASP+) Mastery Level, Certified Information Security Manager (CISM), and Six Sigma Yellow belt certified.

Ferdnard Asamoah
Director

Mr. Mensah has over 17 years of experience in financial management and information systems security consulting and audits. He has managed and performed numerous FISMA, FISCAM (CFO Act/GMRA), Cybersecurity, and Compliance Audits, Reviews and Consulting for over 17 Federal agencies and departments as well as numerous private companies, local governments, and transit agencies.

Mr. Mensah has experience in reviewing and auditing information security controls over sophisticated distributed system architectures, critical system processes and a variety of platforms including Windows, UNIX/Linux, AS 400, zOS, OpenVMS, Oracle, Sybase, SQL Server, RACF, ACF2 and Top Secret, Oracle Financials, and PeopleSoft.

Mr. Mensah holds an MBA in Finance and BSc in Business Administration (Accounting) from the University of Ghana Business School. He is also a Certified Public Accountant (CPA), Certified Information Systems Auditor (CISA), and Certified Global Management Accountant (CGMA) and currently a member of the American Institute of Certified Public Accountants (AICPA) and the Information Systems Audit and Control Association (ISACA).

Samuel Mensah
Instructor

Graduated as a process engineer (Chemical Engineer). He has Associate degree in Applied science focused in Nuclear Medicine. He also works as a system Engineer, Arcsight Engineer, cybersecurity Engineer and CDM splunk Engineer.

Nana Vincent
Instructor

Nana Osafo-Mensah is an accomplished Information Technology leader with over 28 years of demonstrated experience designing, building and delivering complex and successful IT system solutions or products efficiently and with high quality.

Nana Osafo-Mensah Specialises in Modern Workplace, Digital Transformation, IT project management, Enterprise Architectures, Business Process Engineering, Business Process Re-engineering, Business Process Automation, Enterprise Content Management, Low Code/No Code Solutions (LCNC), PowerApps, Power BI Power Virtual Agent(PVA), Power Automate, Dynamics 365, DataVerse formerly (CDS), Enterprise Common Data Models, Artificial Intelligence(AI) Machine Learning(ML) , Robotic Process Automation (RPA), Azure Cloud, Azure, Cognitive Services, Data lake, Azure DevOps, AWS Cloud, Google Cloud Platform.

Nana Osafo-Mensah holds a BS in IT, an MBA in Technology Management, ITIL and Agile Certified SCRUM Master.

Nana Osafo-Mensah
Instructor

Our Courses

It's time to get I.T

FISMA - Risk Management and Compliance

In Risk management and compliance, we train our clients how to identify, evaluate, mitigate and prioritization of risks within organization/systems followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact.

FISCAM – Financial Audit

In FISCAM we train our clients with practical methodology for performing information system (IS) control audits of federal, other governmental and private entities in accordance with applicable professional standards.

Penetration Testing and Ethical Hacking

In Penetration Testing and Ethical Hacking, we provide complete hands on with lab exercise, Learn modern penetration methodologies, techniques, and tools. Access to live machines and learn in-depth scanning, exploitation and post exploitation, and web application testing.

Splunk – Tool

In Splunk we provide training on the how Splunk allows security teams to analyze large data sets. Detect malicious network activity and respond to threats across environments quickly and more accurately than legacy SIEM systems.

Cloud Computing

In cloud computing we provide the following:
  1. Understanding the Three (3) Primary Types of Cloud Environments.
  2. Understanding The Main Cloud Service Models Generally Fall into Three (3) Categories.
  3. The future of cloud computing.

Other Services

Take a look at our other services

Like our courses?

Our courses are designed to equip participants on emerging trends of cybercrime, the domain of cyber security and the impacts of cyber security threats on institutions and national security at large.

Why choose us?

01. We are strongly creative.
02. We are very responsible.
03. We are super friendly.

Contact

Admission is in progress

Call Us
(202) 670-2270
Address
22050 Eastside Dr,
Ashburn, VA
Email
2ndgenerationitgroup@gmail.com

Want to discuss your new career path?

Ready to equip yourself with the knowledge and skills required to defend computer operating systems, networks and data from cyber-attacks?