Programs

To implement PEbAAL, we have developed tailored programs to suit organizations.  There is no one size fits all. Depending on the readiness of our partners or clients, we offer 2 basic types of program implementation:

(1)  Face to face implementation with a focus on capability building at both the C-suite as well as operational level

(2)  Cloud-based digital services via the implementation of the PEbAAL systems; and

(3) Hybrid of the above 2 approaches.

On the substantive or content side, we focus on transactions and we have tailored programs for different target audience at different levels.  Using the PEbAAL methodology, we provide the following programs in both face to face teaching, e-learning or hybrid learning:

  • Introduction to Cybersecurity Law and Investigation
  • Legal Risk Management in Cybersecurity
  • Governance, Risk and Compliance in Cybersecurity
  • Managing Digital Evidence in Cybersecurity: A legal perspective

Click here to download the full Course Outline on “Cybersecurity Law and Investigation”

 

Targeted Learners

These programs target the following groups according to their needs and level of understanding:

  1. Students in Tertiary Institutions
    1. Law students (university and diploma level students)
    2. ICT, Engineering and Business Students (university and diploma level students)
    3. Law lecturers (train-the-trainers) teaching law, IT, Engineering and Business
  1. Legal Practitioner and Legal Advisors
    1. In-house counsels working in enterprises and government bodies
    2. Legal practitioners in private practice as well as Bar Councils or Law Societies
    3. Government lawyers (eg from Attorney-General Chambers)
  1. IT and Business Professionals
    1. IT security professionals in particular and IT professionals in general
    2. IT professionals taking the CISSP[1] examinations
    3. Business professionals
  1. Law Enforcement Officers
    Those with responsibilities for cybersecurity investigations and enforcement including:

    1. Police
    2. Military; and
    3. Civil defence
    4. Judicial officers (who deal with cybercrime cases), arbitrators and mediators
    5. Policy makers responsible for cybersecurity policies

[1] Certified Information System Security Professional qualifications