Providing in-depth training in
Network Penetration, Ethical Hacking, Cloud Computing, Risk Management, FISCAM, Privacy
Successful attacks on public and private sector information systems can result in serious or grave damage to the national and economic security interests of any country.
Given the significant and growing danger of these threats, it is imperative that leaders at all levels of an organization understand their responsibilities for achieving adequate information security and for managing information system-related security risks and hiring the right Cyber Security experts."
We firmly believe that our purpose is not just how we train, energize, empower, and engage our clients – it’s also how we operate in supporting organizations achieve adequate information security and proactively counter attacks on their information systems.
Mr. Asamoah has over 10 years of experience in information
systems security audits and compliance. He has managed and
performed numerous FISMA, Cybersecurity, and Compliance
Audits, Reviews for Federal agencies, and departments as
well as numerous private companies.
Mr. Asamoah has experience in reviewing and auditing
information security controls over sophisticated
distributed system architectures, critical system
processes and a variety of platforms including Windows,
UNIX/Linux, CSAM, Mainframe, Oracle, SQL Server, Office
365 platforms and many more.
Mr. Asamoah holds a bachelor’s degree in Information
Systems Security (Cyber-Security) from the ITT Tech
Institution. He is also a Certified CompTIA Advanced
Security Practitioner (CASP+) Mastery Level, Certified
Information Security Manager (CISM), and Six Sigma Yellow
belt certified.
Mr. Mensah has over 17 years of experience in financial
management and information systems security consulting and
audits. He has managed and performed numerous FISMA,
FISCAM (CFO Act/GMRA), Cybersecurity, and Compliance
Audits, Reviews and Consulting for over 17 Federal
agencies and departments as well as numerous private
companies, local governments, and transit agencies.
Mr. Mensah has experience in reviewing and auditing
information security controls over sophisticated
distributed system architectures, critical system
processes and a variety of platforms including Windows,
UNIX/Linux, AS 400, zOS, OpenVMS, Oracle, Sybase, SQL
Server, RACF, ACF2 and Top Secret, Oracle Financials, and
PeopleSoft.
Mr. Mensah holds an MBA in Finance and BSc in Business
Administration (Accounting) from the University of Ghana
Business School. He is also a Certified Public Accountant
(CPA), Certified Information Systems Auditor (CISA), and
Certified Global Management Accountant (CGMA) and
currently a member of the American Institute of Certified
Public Accountants (AICPA) and the Information Systems
Audit and Control Association (ISACA).
Graduated as a process engineer (Chemical Engineer). He has Associate degree in Applied science focused in Nuclear Medicine. He also works as a system Engineer, Arcsight Engineer, cybersecurity Engineer and CDM splunk Engineer.
Nana Osafo-Mensah is an accomplished Information
Technology leader with over 28 years of demonstrated
experience designing, building and delivering complex and
successful IT system solutions or products efficiently and
with high quality.
Nana Osafo-Mensah Specialises in Modern Workplace, Digital
Transformation, IT project management, Enterprise
Architectures, Business Process Engineering, Business
Process Re-engineering, Business Process Automation,
Enterprise Content Management, Low Code/No Code Solutions
(LCNC), PowerApps, Power BI Power Virtual Agent(PVA),
Power Automate, Dynamics 365, DataVerse formerly (CDS),
Enterprise Common Data Models, Artificial Intelligence(AI)
Machine Learning(ML) , Robotic Process Automation (RPA),
Azure Cloud, Azure, Cognitive Services, Data lake, Azure
DevOps, AWS Cloud, Google Cloud Platform.
Nana Osafo-Mensah holds a BS in IT, an MBA in Technology
Management, ITIL and Agile Certified SCRUM Master.
Our Courses
It's time to get I.T
FISMA - Risk Management and Compliance
FISCAM – Financial Audit
Penetration Testing and Ethical Hacking
Splunk – Tool
Cloud Computing
- Understanding the Three (3) Primary Types of Cloud Environments.
- Understanding The Main Cloud Service Models Generally Fall into Three (3) Categories.
- The future of cloud computing.
Other Services
Take a look at our other services
Like our courses?
Why choose us?
- 01. We are strongly creative.
- 02. We are very responsible.
- 03. We are super friendly.
Contact
Admission is in progress