Free course
US$0.00
Premium course
US$30.90
IT Security Course
Boost your IT security skills with our in-depth course specifically designed for security professionals in Kenya. You'll learn how to do vulnerability assessments properly, from spotting threats to writing up reports. Know how to prepare and present security reports that are easy to understand, understand how IT systems work, and use the latest security tools. Identify and deal with threats from inside and outside the organization, and put in place the best ways to keep improving security. Level up your skills and protect your company with confidence.
- Conduct vulnerability assessments: Know how to spot security weaknesses and which ones to fix first.
- Prepare security reports: Write clear, brief, and well-organized reports with your findings.
- Understand IT infrastructure: Get a good grasp of all the parts and how they're set up.
- Use security tools: Know how to use network and computer protection tools effectively.
- Identify security threats: Recognize and understand the risks that come from both inside and outside.

from 4 to 360h flexible workload
certificate recognized by the MEC
What will I learn?
Boost your IT security skills with our in-depth course specifically designed for security professionals in Kenya. You'll learn how to do vulnerability assessments properly, from spotting threats to writing up reports. Know how to prepare and present security reports that are easy to understand, understand how IT systems work, and use the latest security tools. Identify and deal with threats from inside and outside the organization, and put in place the best ways to keep improving security. Level up your skills and protect your company with confidence.
Elevify advantages
Develop skills
- Conduct vulnerability assessments: Know how to spot security weaknesses and which ones to fix first.
- Prepare security reports: Write clear, brief, and well-organized reports with your findings.
- Understand IT infrastructure: Get a good grasp of all the parts and how they're set up.
- Use security tools: Know how to use network and computer protection tools effectively.
- Identify security threats: Recognize and understand the risks that come from both inside and outside.
Suggested summary
Before starting, you can change the chapters and workload. Choose which chapter to start with. Add or remove chapters. Increase or decrease the course workload.What our students say
FAQs
Who is Elevify? How does it work?
Do the courses have certificates?
Are the courses free?
What is the course workload?
What are the courses like?
How do the courses work?
What is the duration of the courses?
What is the cost or price of the courses?
What is an EAD or online course and how does it work?
PDF Course