Courses

View our portfolio of courses below, LiquidNexxus is constantly expanding and enhancing the course offering to suit the particular needs of the industry. You can also view our external scheduled programmes or request an inhouse course.

EMV Workshops

EMV Workshops

The EMV training is designed for individuals working within banks and other key stakeholders involved in the implementation of EMV.

PCI DSS Implementation Training

PCI DSS Implementation Training

Everything you need to know about PCI DSS; both theory and practice

PA DSS Training

PA DSS Training

Everything you need to know about PA DSS; theory and practice...

Bank Card Foundation 101

Bank Card Foundation 101

An essential course for anyone in the card business...

Card Business Management & Marketing

Card Business Management & Marketing

Card business management, profitability, and risk management masterclass

Advanced Bank Card Marketing

Advanced Bank Card Marketing

How to make your brand stand out - How to increase card usage/spend

Card Operations Training

Card Operations Training

Excellence in card business operations and implementation

Card Fraud Prevention Training

Card Fraud Prevention Training

Introduction to Mobile Payments

Introduction to Mobile Payments

Introduction to Mobile Payments Understanding the mobile payments business

Mobile Financial Services: Entry Level

Mobile Financial Services: Entry Level

Mobile Financial Services: Defining Market Entry Strategy Mobile Network Operators and Financial Institutions worldwide are looking into Mobile Financial Services to remain competitive and add value for their customers. How to leverage the MNOs distribution network? This workshop delivers team members with the knowledge and insight to properly define a successful Mobile Financial Services offering.

Mobile Banking and Payment Application Security

Mobile Banking and Payment Application Security

A key challenge in the success of Mobile Banking and Mobile Payment solutions is the security of the services .... These new security risks must be identified and mitigated before deploying services to clients...

ATM Security Training

ATM Security Training

Covering all aspects of ATM Security from installation to decommisioning

ATM Service & Maintenance

ATM Service & Maintenance

ATM Network availability is a key differentiator...

ATM Management Professional

ATM Management Professional

An essential course for managing or implementing ATM networks...

(Online)Information Security Awareness

(Online)Information Security Awareness

(Online)Information Security Awareness Training Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.

ISO 22301 Lead Implementer

ISO 22301 Lead Implementer

Learn the essentials of managing, controlling and implementing a Business Continuity Management System

ISO/IEC 20000

ISO/IEC 20000

The latest in IT Service Management ISO/IEC 20000 is the first international standard for IT service management. It is based on and intended to supersede the earlier BS 15000. ISO/IEC 20000, was originally developed to reflect best practice guidance contained within th

ISO 27001 Lead Implementer

ISO 27001 Lead Implementer

ISO 27001 Standard Information Security Standard Implementation Guidelines and Certification

ISO 27005 Risk Manager

ISO 27005 Risk Manager

ISO 27005 Risk Manager Information Security Standard Implementation Guidelines and Certification

CISSP® Bootcamp - Exam Preparation Training

CISSP® Bootcamp - Exam Preparation Training

CISSP® - Certified Information Systems Security Professional - Globally Recognized Expertise in the Field of Information Security.

HISP

HISP

The Holistic Information Security Practitioner (HISP) Training and Certification program addresses the current shortage of information security and compliance professionals.

Security Development Training (.NET, C# and ASP.NET )

Security Development Training (.NET, C# and ASP.NET )

The environment provides powerful means for security development, but developers should know how to apply the architecture and coding level programming techniques in order to implement the desired security functionality and avoid vulnerabilities or limit their exploitation

Digital Forensics & Investigations Training

Digital Forensics & Investigations Training

Electronic evidence gathering, investigations and more

AML/CFT Awareness Program – Basic Level

AML/CFT Awareness Program – Basic Level

AML/CFT Awareness Program – Basic Level This training will provide employees with an insight into the world of Anti-money laundering, how issues arise and the policies and procedures that should be in place.

Acquiring Online Information Training

Acquiring Online Information Training

This course is designed to provide an investigator with the knowledge and skills to effectively locate, acquire and use online information as part of a criminal or civil investigation.

Web Application Security and Testing Masterclass

Web Application Security and Testing Masterclass

Web Application Security and Testing Masterclass This unique course is ideal for professionals looking to develop secure web applications and testing procedures, as well as benchmark existing techniques and keep up to date with the latest exploits.

Banking Cyber Security

Banking Cyber Security

Banking Cyber Security This course is targeted at IT professionals who wish to delve deeply into the latest security threats and most advanced techniques used by malicious hackers and cyber criminals today.

Ethical Hacking for Developers

Ethical Hacking for Developers

Ethical Hacking for Developers This course is targeted at IT professionals who wish to delve deeply into the latest security threats and most advanced techniques used by malicious hackers and cyber criminals.

Hands on Hacking Unlimited

Hands on Hacking Unlimited

Hands on Hacking Unlimited This course is targeted at IT professionals who wish to learn the various hacking and defensive techniques used by hackers to compromise an organization’s IT infrastructure.

Web Application Hacking

Web Application Hacking

Web Application Hacking This course is targeted at IT professionals who wish to delve deeply into the latest security threats and most advanced techniques used by malicious hackers today to compromise web-based architectures.

Wireless Hacking

Wireless Hacking

Wireless Hacking The Wireless Hacking course is a new and unique course that will help IT professionals develop and implement secure networks.

OPSE Certification

OPSE Certification

OPSE Certification The OPSE certification is our official OSSTMM certification based on the Open Source Security Testing Methodology Manual (OSSTMM).

OPST Certification

OPST Certification

OPST Certification The OPST is a certification of applied knowledge designed to improve the work done as a professional security tester.

Certified Trust Analyst

Certified Trust Analyst

Certified Trust Analyst The CTA is a person who can apply the proper techniques to make accurate, snap decisions on what to trust and how far that trust extends.

OPSA Certification

OPSA Certification

OPSA Certification The OPSA is a certification of applied knowledge designed to improve the work done as a professional security analyst.

Covert Internet Operations

Covert Internet Operations

Covert Internet Operations Course designed to provide delegates with a good working knowledge of how Covert Internet Investigations are carried out by law enforcements units and more importantly how this practice can be adapted to enhance their own investigations whilst adopting existing good practice.

Recognising and Dealing with Electronic Evidence

Recognising and Dealing with Electronic Evidence

Recognising and Dealing with Electronic Evidence This course is designed to provide an investigator with the knowledge and skills to effectively recognise and deal with electronic evidence sources to support their responsibilities as part of a criminal or civil investigation and how to ensure the evidence is admissible in court or internal proceedings.

Core Investigation Skills Training

Core Investigation Skills Training

This course is designed to provide investigators with knowledge of the key principles of conducting an investigation, irrespective of its nature or complexity. The course will include topics on every single phase of an investigation, focus on the obstacles that may arise, and will put forward suitable approaches.

Introductory IT Forensics

Introductory IT Forensics

It is an entry level course for new practitioners and will allow them to begin their career with knowledge and skills in dealing with electronic evidence.

Advanced Interview Techniques

Advanced Interview Techniques

The module will cover how professional interviews can be conducted, during the course of an investigation, with potential suspects, witnesses or informants.

Conducting Fraud Investigations Training

Conducting Fraud Investigations Training

This course is designed to provide an investigator with the knowledge and skills to understand the core elements of economic crimes.

Complex Fraud Investigation

Complex Fraud Investigation

This course will cover how to manage a major investigation into Fraud and Corruption, and how to plan and execute a pre-emptive action.

SCADA & NCI Security

SCADA & NCI Security

UNICRI’s SCADA and NCI Security 101 seeks to fill the “information gap” by empowering participants with a realistic and comprehensive assessment of the threats and impediments in these infrastructures.

Intensive SCADA & NCI Security

Intensive SCADA & NCI Security

This training course showcases state of the art offensive and defensive techniques geared to the intricacies of the SCADA environment.

Knowledge Centre

Knowledge

Schedule

Connect

Courses