Africa Cyber Immersion Center (ACIC)

Why ACIC?

The Africa Cyber Immersion Centre (ACIC) is a cutting-edge hub for research, innovation, and training dedicated to addressing the diverse and evolving cybersecurity challenges faced by Africa. ACIC provides a collaborative platform where governments, private organizations, and individuals come together to develop practical solutions to emerging threats. By combining world-class education, advanced training programs, groundbreaking research, and real-world applications, ACIC empowers individuals, organizations, and governments to build robust cybersecurity ecosystems. Our mission is to bridge the gap between current cybersecurity capabilities and future demands, fostering a secure and innovative digital environment across the continent while promoting economic growth and resilience.

What is Our Goal?

Education and Training

We aim to provide tailored education, hands-on training, and advanced research infrastructure to enhance cybersecurity preparedness for both the public and private sectors. Our goal is to cultivate world-class cybersecurity professionals equipped with the skills to tackle modern challenges and advance Africa’s digital transformation.

Research and Development

Through leading-edge technology and research collaborations, we drive innovation that addresses Africa-specific cybersecurity threats. We provide local organizations with tools and resources to innovate, compete, and grow securely within the global digital landscape.

Cybersecurity and Protection

Our mission includes bolstering the protection of critical public resources, establishing efficient incident response mechanisms, and enhancing the security posture of organizations across Africa to mitigate the risks of cyber-related emergencies.

Membership

Programme

Course Overview

Penetration Testing Traning

ACIC’s Penetration Testing training is designed to equip participants with in-depth knowledge of attack methodologies, tools, and mitigation strategies. Participants will learn how to simulate real-world cyberattacks, including local use cases like ATM attacks and mobile threats, while ensuring ethical practices. The training includes over 30 hands-on labs focusing on reconnaissance, scanning, target exploitation, and advanced Windows domain attacks. This practical, lab-intensive course ensures participants gain industry-relevant expertise.

Who should attend
ICT Teams
System Admins
Database Administrators
Security personnel
Auditors
Red Team Members
Blue Team Members
Forensics specialists

Course Overview

Certified Ethical Hacking (C|EH v10) Penetration Testing Traning

The Certified Ethical Hacking (C|EH) course is the world’s most advanced ethical hacking program, covering 20 critical security domains necessary for strengthening an organization’s information security posture. The course equips participants with the same techniques and tools used by hackers and information security professionals, ensuring they can effectively identify, counter, and mitigate potential threats to digital infrastructure.

Who should attend
ICT Teams
System Admins
Database Administrators
Security personnel
Infrastructure
Red Team Members
Blue Team Members
Forensics specialists

Course Overview

Blue Teaming Training

This training focuses on improving the blue-teaming capabilities of attendees to enable them to detect and respond to network attacks in a timely manner. Candidates will be required to perform practical blue-teaming exercises to successfully complete the course. Successful candidates will receive their certification and gain Cyber Immersion Club membership.

Who should attend
ICT Teams
System Admins
Database Administrators
Security personnel
Infrastructure
Red Team Members
Penetration
Blue Team Members
Forensics specialists

Course Overview

Risk Quantification and Exposure Analysys

Are you struggling to measure and communicate your current cybersecurity risk posture in monetary terms? This workshop enables ICT, Audit, Operations, and Risk Management professionals to provide ExCo, the Board, and regulators with objective, quantifiable, and observable cybersecurity metrics. These metrics empower key stakeholders to make informed strategic decisions.

Who should attend
ICT and Information Security Professionals
Risk Management and Audit Officers
Legal and Compliance Officers
Finance and Strategy Managers

Course Overview

Operating and managing SIEM

This course provides participants with comprehensive knowledge and skills to operate and manage a Security Information and Event Management (SIEM) system effectively. Attendees will learn how to collect, analyze, and correlate log data to detect and respond to security incidents in real-time. The course includes hands-on labs to familiarize participants with SIEM configurations, tuning, and automation, enabling them to improve their organization's threat detection and incident response capabilities.

Who should attend
Security Analysts
Security Architects
Senior Security Engineers
TEchnical Security Managers
SOC Analysts
SOC Engineers
SOC Managers
CND Analysts
Security Monitoring
System Administrators
Cyber THreat Investigators

Course Overview

Business Managers Masterclass

This 2-day in-class course prepares non-technical business managers to understand, assess, and take a proactive posture in cybersecurity. Attendees investigate risk assessment and management frameworks to mitigate risks and identify potential security gaps that could pose liabilities. The course equips business managers to address emerging cybersecurity threats that can significantly impact an organization.

Who should attend
Human Resource Managers
Procurement Managers
Operations Managers
Legal Teams
Finance teams

Course Overview

Executive/Board Cybersecurity Training

The objective of this course is to provide Senior Executives and Board members with operational knowledge of information security, framing it as a management issue rather than an IT issue. In this workshop, CEOs and Board Directors will gain first-hand insights into how companies manage information security risks and build secure organizations amidst sophisticated attacks. The course employs a moderated roundtable format with panel discussions and structured breakouts.

Who should attend
Executives
Board Members

Course Overview

End User Training

The End User Training focuses on enhancing security awareness and data protection among employees. This training educates participants on identifying phishing attacks, practicing secure password management, and protecting sensitive organizational data. With a variety of dynamic and engaging content styles, the training ensures employees at all levels comprehend and adopt best practices for safeguarding organizational assets. The course can be tailored to address specific organizational needs and compliance requirements, building a culture of security awareness and responsibility across the workforce.

Who should attend
All Employees