Information Security is What We Do


We Consult

“Security Blanket”

is a customizable set of security solutions that allow you to pay only for the services that you need. The services consist of a mix of routine activities (e.g., simple best practices) that every company knows it should use regularly but too often is unable to perform, and others that require skills and tools that are seldom found in IT departments. These services are designed to minimize the burden placed on your staff.

Corporate Social Responsibility

Digital Forensics & Incident Response (DFIR) Meetup

Target Group

(Practitioners, Academia, Students, and Enthusiasts).

Requirements

  • Laptop (64Bit), 16GB, 100GB Free Hard Disk, 32GB Flash Drive, WIFI, USB, VirtualBox Installed with GuestAdditions, Cellphone, Extension Board

Steve Watson DFIR Foundation

We Remediate

We have extensive practical experience in digital forensics (triage, file system, memory, network, chip-off, and drone, network packet analysis, information hiding and covert channels communications, wireless), red teaming and training. We respond promptly to reduce your recovery time, costs and damage.

Call for our custom tailored managed service

Deciphering Codes


-.. . – . -.-. – .– .- .-. . / ..- .–. …. — .-.. -.. … / – …. . / …. .. –. …. . … – / — ..-. / . – …. .. -.-. .- .-.. / … – .- -. -.. .- .-. -.. … / .- -. -.. / -.. — . … / -. — – / -.-. — -. -.. — -. . / – …. . / .- .-. – / —… ..- – . / – — / — .- -.- .. -. –. / – …. . / — -. .-.. .. -. . / .– — .-. .-.. -.. / … .- ..-. . .-. –..– / -. — – / — — .-. . / -.. .- -. –. . .-. — ..- … / .– .. – ….

Encryption & Decryption


|>&|?c7w/\12£ |_|p)-(ol|]s 7#? hi6he$t f e7h][¢al s|a/|/|>qrÐ5 @(\)d doe? ro7 co2|>one ‘][‘he a2t on][/\/g a11d lab se$s1o2s a.-3 ƒ0r “?du<^t?0n@l |2u12|²*?£? n|_y”?du<^t?0n@l |2u12|²*??du<^t?0n@l |£? n|_y” ?pos+£& ?1vi§ ^|{w?-Bo?5|_|, Fu|Vde|?&]-[3a<|-!n†3lli93n[£

No Organization is Immune !!


Today’s business face diverse  IT security threats from different sources and for diverse purposes but partnering with Detectware Security Group protects your enterprise network, systems and data 24/7/365. Get i touch today and let our experts handle all potential IT threats.

What Services Do We Offer ?

Team Training

The single most important part of a company’s security architecture is the people that drive the technology. We provide custom training specialized to meet the needs of your organization. Our clients can attest to the advantages of training with our top rated instructors, all of whom have trained hundreds of security professionals through Detectware cyber defense initiative. Allow us to come and help you develop your company specific training.

other services

  • Digital Forensics & Incident Response

    • Triage (Live), File System (Disk), Network (PCAP), Memory (RAM), Mobile, Firmware, Drone, Damage Device)
    • Malware Analysis
    • Data Recovery & Secure Data Erasing
    • Information Hiding & Covert Channels Analysis & Research
  • Red Teaming & Social Engineering

    • Red Teaming & Penetration Test – Wired, Wireless, Cloud, Web-Based, IoT, Drone, and SAP
    • Social Engineering
    • Vulnerability Assessments
    • Physical Security Assessments
    • Technical Surveillance Counter Measure
  • Active Defense

    • Active Honeypot Implementation
    • Data Loss Prevention (DLP)
    • Insider Threat Management
    • Intrusion Detection and Prevention (IDS/IPS)
    • Network Security Monitoring
    • Network Traffic Analysis
    • Threat Hunting & Intelligence
  • Cyber Security Meetups

    • BankInfosec Meetup (Strictly for Bankers IT & Systems Audit)
    • NSM, Threat Hunting & Packet Analysis Meetup
    • Spintex Area Cyber Security Meetup
    • Tracer Fire Cyber Security Meetup (Academia)
  • General

    • Computer & Security Issues Magazine
    • Conferences
    • Workshops
    • Summits
    • Seminars
    • Cyber Safety for Children (Prim – SHS)
  • Projects

    • Systems Administration Day
    • Computer Security Day
    • Data Privacy Day
    • Business Continuity Week
    • Wardriving (Strictly Invitation)

upcoming programs & events

Training Requirements:

  • Laptop 64bit, 16GB, 100GB Hard Disk, 32GB Flash Drive, Working DVD, WIFI, USB, VirtualBox Installed with GuestAdditions, Power Plug
  • Basic Knowledge in Linux and TCP/IP (Optional)

Duration:

  • Four (4) Saturdays, 09:00AM – 05:00PM

Note:

  • All course comes with materials, tools, course VM, pen, notepad, mint, water, snacks, tea, coffee, and fruit juice
  • 90% Practical Session
  • Capture the flag contest
  • Experience and highly qualify trainers
  • Flexible Payment Assured
  • Money Back Guarantee Assured
  • Request a Demo
  • Maximum of 12 student per class

For Registration Call 0302418992, 0247196288

IT Security & Its Implications on Businesses


[/porto_testimonial]

Apostle Elvis Akwa-BonsuSpecial Activities - Detectware Security Group

[/ultimate_carousel][/vc_column]
[/vc_row]