Phillips Consulting runs a robust and comprehensive range of technology programmes; seminars, workshops and conferences, aimed at assessing individuals and organizations to effectively develop and manage their technology skills, competencies and capabilities. As leading professionals in educational practices, our technology experts’ offer structured trainings to meet the ever changing needs of our clients. We cover a full spectrum of specialized programmes in:


Click on the tabs below to view content in each category

Course Overview
(ISC) ² CISSP CBK Training at Phillips Consulting Limited is the most comprehensive review of information security concepts and industry best practices which covers the 8 refreshed domains of the CISSP CBK (Common Body of Knowledge).

The Certified Information Security Professional is a comprehensive, up-to-date, global common body of knowledge that ensures information security professionals have deep knowledge and understanding of new threats, technologies, regulations, standards, and practices.
This training course, led by (ISC) ² authorized instructors, who are experts in information security, will help candidates review and refresh their information security knowledge and help identify areas they need to study for the CISSP exam.

Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, group activities, open/closed questions, and group discussions. This interactive learning technique is based on sound adult learning theories to aid understanding.

Audience
Chief Information Officer (CIO), Chief Information Security Officer (CISO), IT Manager, IT Consultant, IT Security Professionals, IT Auditors, Cyber Architects, Information Assurance Engineer, Security Analyst, Network Architect, Security Analyst, Security Manager.

Duration: - 5 days

Course Overview

CEHv8 is a comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on latest security threats, advanced attack vectors, and practical real time demonstration of the latest hacking techniques, methodologies, tools, tricks, and security measures. Unlike other strictly theoretical trainings, participants will be immersed in interactive sessions with hands-on labs after each topic. You can explore your newly gained knowledge right away in your classroom by pen-testing, hacking and securing your own systems.

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation and also use the knowledge gained to authenticate the information security posture of their organization. Participants walk out the door with hacking skills that are highly in demand, as well as the internationally recognized certified ethical hacker certification.

This course provides you with hands on understanding and experience in Ethical Hacking and prepares you for EC-Council Certified Ethical Hacker exam 312-50.

Audience
Security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure

Duration: - 5 days

Course Overview

EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.

Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in everyday life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in the present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you.

This course helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.

Audience
The CHFI program is designed for all IT professionals involved with Information system security, computer forensics and incident response.

Duration: - 5 days

Course Overview

PCL Awareness training provides basic knowledge of PCI DSS for individuals working for organizations that must meet compliance requirements and offers companies an opportunity to provide general PCI training across multiple functional areas to ensure a universal understanding of PCI compliance.
With data breaches capturing top news headlines, it is more important than ever for your organization to enhance its data security and compliance protocols. Developing security awareness for all employees who handle cardholder data is a cornerstone of the PCI Data Security Standard and helps to improve security, reduce the risk of data loss, and simplify meeting PCI requirements.
This course will provide you with the tools to build a secure payments environment and achieve PCI compliance.

Target Audience
PCI Awareness Training is perfectly suited for anyone interested in learning more about PCI, with a focus on those individuals working for organizations that must meet compliance with PCI DSS. Anyone can benefit – no previous PCI knowledge is required.
Training is especially appropriate for: Audit Managers, Business Analysts, Compliance Officers, Credit Analysts, Finance Managers, IS Managers, IT Specialists, Project/Program Managers, Risk Management Analysts, Security Analysts, Senior Developers, Software Engineers, System Administrators, Web Masters.

Duration: - 2 days

Course Overview

The Course is based on the BCM life cycle set out in BCI’s Good Practice Guidelines, BS 25999 standard and the EC Council Disaster recovery techniques-set. As such, the course provides a comprehensive understanding of both the framework and practical issues surrounding the different stages of the BCM life cycle. The course will also enable delegates to confidently sit the BCI Certificate Examination and the EC Council Disaster recovery professional examination.

Target Audience:

Any individual who would like to gain a comprehensive understanding of the BCM life cycle from both a principle and ‘good practice’ perspective.

Duration: - 5 days

Contact Information

 This email address is being protected from spambots. You need JavaScript enabled to view it.
 4th Floor, UBA House, Marina, Lagos
  +234 (1) 01-2703667
2nd Floor, NEXIM House Plot 975, Cadastral Zone A0 Central Business district Abuja.
  +234 (09)-2904738 , 09-2904748.