OUR FORENSICS AND CYBER TRAINING COURSES
Forensics and Cyber Training
- Forensic Accounting and Fraud Investigation
- Detection and Prevention of Fraud
- Computer forensics
- Legal Components in a Forensic Investigation
- Cyber Security
- Ethical Hacker
- Interviewing and Presentation Evidence
Forensic Accounting Investigation (Hands-on Practical Training) using Forensic Intelligence Analyst Software
This is to develop the specialist accounting skills and knowledge needed to start a career in forensic accounting investigation. In work places, a forensic approach to accounting is often used. This course gives you a quick start in the forensic Accounting field.

Please browse through our training programs below:

Fighting Fraud
- Fraud Investigation Technique
- Fraud Risk Assessment
- Internal Controls for Fraud Prevention
- Bribery And Corruption Act
- Legal elements of Bribery and Corruption
- Identifying common corruption schemes
- Respond to red flags of Corruption.
- Money Laundering Act
- Legal Element of Money Laundering
- Measures necessary for combating money laundering
- Investigation for Money Laundering
Electronic Crime
- Electronic Crime Principles
- Name of Viruses
- Identity Fraud
Law of Evidence
- Gathering Evidence
- Data Protection Act.
- Cybercrime Prevention training covers the following:
- Hacking
- Phishing
- Denial of service attacks
- Unauthorised data access.
Finger Print Training
Presentation to Fingerprints, Description and Promotion of Fingerprints, Categorisation of Fingerprints, Henry method of fingerprint categorisation, Classifying various fingerprint forms, distinguishing persons from fingerprint shapes. Thrilling fingerprints from various objects, Types of Fingerprints and Class & Individual Characteristics, Different methods of latent fingerprint development Photography of fingerprints, Comparison / Verification of fingerprints, Automatic fingerprint identification system, Fingerprint expert in court, Expert Opinion Writing
Attacks can be targeted at servers, websites, computers, mobile devices and tablets and as well as information stored in the cloud.