Security and Academic Advisory Services
Cyber security services
- Security education: Learn how to protect coworkers, family, and friends with posters, newsletters, and in-house interactive sessions
- Policy development: Write master policy and specific policies for organisations

- Risk assessment: Conduct qualitative assessments identifying pertinent risk scenarios and proposing actionable mitigations
- Threat modelling: Provide threat models to identify threats to the software and weaknesses within designs and architectures
- Attacker modelling: Identify information security threat agents and most common attack scenarios
- Vulnerability management: Assess the security and safety of buildings, offices, and homes for the latest threats
- Penetration testing: Explore if vulnerabilities to resources can be exploited by malicious threat agents or prying eyes
- Security consultancy: Helping implement the best possible security solutions within a specified budget and requirements
Academic services
- Proofreading, editing, and rewriting of text for academic papers, research proposals, or technical reports
- Writing professional research-based cyber security blogs and articles covering topics such as the latest cyber threats, security best practices, or case studies
- Planning, organizing, and delivering training and education sessions on cyber security fundamentals, advanced concepts, or specialized topics like ethical hacking or digital forensics
- Designing, coordinating, and facilitating workshops and seminars on various cybersecurity topics, including hands-on sessions, expert-led discussions, and practical case studies to enhance learning and knowledge sharing.
- Coaching, mentoring, and providing academic support to students pursuing degrees or certifications in cybersecurity, helping with coursework, projects, and exam preparation
- Book writing services that focus on producing educational materials or textbooks related to cyber security, data privacy, responsible AI, and other topics
Schedule a Session
- Book your Academic Mentoring Session here.

Security education and training services
Televised sessions:

Recorded sessions:
Focused sessions:

In-class sessions:


Live & Recorded Lectures, Webinars and Seminars:




Animated presentations:
Poster presentations:
Lab session planning:

Online lab support:

Course management:


Sample lecture content:
- Topic: Access control fundamentals (redacted content based on Computer Security textbook and accompanying slides by Dieter Gollmann).
- Topic: Cryptography Primer (redacted content based on Computer Security: Principles and Practice textbook and accompanying slides by William Stallings and Lawrie Brown).
- Topic: Risk Analysis Foundations (redacted content based on CISSP All-in-One Exam Guide, by Shon Harris and Fernando Maymi).
- Topic: Software Development Lifecycle: Phases, Activities, and Security Considerations.


