CyberTED

Instructor | Stephne

POPI Act (POPIA) Compliance for South African Businesses

COURSE OBJECTIVE  By the end of this course, learners will be able to understand and apply the core principles of the Protection of Personal Information Act (POPIA), identify compliance risks within their organisation, implement practical…
20h
1

IT Security Vulnerability in 5 days

COURSE OVERVIEW Course Duration: 5 Days (±3–4 hours per day) Target Audience: Junior to mid-level IT professionals System administrators Developers and testers Project managers and business analysts Non-technical professionals working with IT systems Course Description…
20h
8

How to create a Project Charter in 30 minutes (30 min short course)

Every successful project starts with clarity — clarity about why the project exists, what it needs to achieve, and who is accountable. That clarity is captured in one powerful document: the Project Charter. The project…
30m
4
Scroll to Top