pexels-rodolfo-clix-1036936.jpg

WELCOME TO

BOSOKA ACADEMY

Your Trusted Training Partner

OUR TRAINING PROGRAM

Boost your skills. Grow your knowledge. Learn from the experts.

Office Desk

Information Security Training

Modern Office

Project Management Training & Certifications

New Laptop

Insurance & Investment Training & Certifications

Office Desk

GAFM

Certifications Training

Laptop

Finance Management 

Training & Certifications

Mountain Drone

In-Person Training Programs

 

INFORMATION SECURITY TRAINING SERVICE

Our approach to Cybersecurity training is unique............

​Our tailored cybersecurity awareness training program is focused to protect both the organization and individuals from cyber-related risk. We deliver in-house training for every need in  Information Security management and secured project management process best practices.

REAL-WORLD, ON-DEMAND, IN-PERSON INFORMATION SECURITY & IN-HOUSE CYBERSECURITY EVENTS

Repairs

Info Security Governance

This course will provide participants with the knowledge and tools needed to ensure proper control and compliance over confidentiality, availability and information.

Security Surveillance

Access Control Management

We introduce the framework of IAM and its evolution in the workplace & how to manage the digital identities of employees, contractors, and partners in a more secure manner.

webcams

Vulnerability Management

Vulnerability mgmt. is a continuous information security risk mgmt. process that requires the oversight of management. The course covers the process from discovery thru  remediation based on cybersecurity risk.

portable charger

Risk Management Framework

The ability to perform risk management is crucial for organizations hoping to defend their systems. In this course  the practical skills & Risk Mgmt. framework to perform regular risk assessments is presented.

Work Desk

Phishing Awareness Training

Phishing awareness training educates how to spot and report suspected phishing attempts, to protect themselves and the company from cybercriminals, hackers, and other bad actors 

Laptop

Cybersecurity on-demand events

We offer  customized cybersecurity awareness on-site events tailored to organization's needs. Each session is delivered onsite by our senior InfoSec experts.

We assess the existing training program, develop and implement customized training program. We also offer continuous training services which includes web based training programs and simulated phishing campaign with phishing emails for customizable teaching moments and "just-in-time teaching" messages to individuals who fall for a mock attack.​

Project Management Training & Certifications

Bosoka secure SDLC framework involves integrating security into all phases defining security requirements alongside functional requirements and performing an information security risk analysis during the design, development and implementation phases

The most cost-effective way to minimize information security risk is to infuse a trusted best practices and solid security design principles into the organization SDLC practice.

Cogs Illustration

Secure SDLC Framework

Bosoka SDLC Model (ADDIS)

In this course we provide an overview of the Bosoka SDLC model, ADDIS with focus on implementing the tailored best practice process, as well as tools, techniques, and mechanisms that can be integrated and used with the organization SDLC practices. For example, one organization might automate a particular step, while another might use manual processes instead. Advantages of specifying the practices at a high level include the following. The topic learned 

  • Can be integrated into any existing software development workflow and automated toolchain

  • Makes the practices broadly applicable, not specific to particular technologies, platforms, programming languages, SDLC models, development environments, operating environments, tools, etc.

  • Can help an organization document its secure software development practices today and define its future target practices as part of its continuous improvement process

Road and Bridge Network

Project Risks & issue Management Practices

In this course we cover Risk Management & Issue Management best practices. Risk management, is an essential part of the IT Project Management Lifecycle. Managing risks appropriately ensures that your project will stay on track and on budget. In the Planning phase, a Risk Management Plan was developed. This phase focuses on executing the resolution and mitigation strategies planned, monitoring the project for the occurrences of risks, and to keep updating the Risk Register by including any newly identified risks.

For issue management log is used to track, document, and report issues that are identified during project execution. It consists of the elements below:

  • Affected Work Package(s), which are work packages affected by the issue, or the source of issue.

  • Urgency: The urgency of getting the issue resolved.

  • Resolution: The action taken to address and resolve the issue.

  • Status: The status of issue. Typical status include New, Open, In Progress, Fixed, Resolved and Won't Fix.

  • Reported Date: The date the issue was reported.

  • Close Date: The date the issue was closed.

 

Insurance & Investment Training & Certifications

Customer experience training is crucial to any organization that works with people. Not only does each interaction between employee and customer affect the number of customers retained, but employees with effective customer service skills feel a greater sense of value and commitment to their job. These skills make a positive impression in the minds of current and future customers, as well as the employees who utilize them.

 

We have extensive training program tailored to each organization need including the following:

Young Family

In this course, students learn about the many different types of life insurance, such as term life, whole life and universal life. Financial topics, like estate planning and the tax implications of life insurance, are also covered. Some life insurance courses also help students earn licenses to sell variable annuities, which are investment products that pay out as the purchaser reaches retirement age.

Medical Consultation

A health insurance license course covers health insurance principles and regulations, sales techniques and state insurance law. The course also provides an overview of the managed care insurance system as well as the role of the health insurance agent before, during and after the sale. Because health insurance is often sold to customers through their employers, health insurance courses are often bundled with life insurance courses so that agents can work in fields outside of health insurance.

Collision Coverage

This course covers auto, homeowner's and renter's insurance, in addition to any other type of insurance that protects possessions. Course topics include liability and negligence as they apply to state law. The typical property and casualty insurance course takes 30-40 total hours to complete, with online courses available in some states.

Insurance Agent

An overview of the ideas, methods, and institutions that permit human society to manage risks and foster enterprise. Emphasis on financially-savvy leadership skills. Description of practices today and analysis of prospects for the future. Introduction to risk management and behavioral finance principles to understand the real-world functioning of securities, insurance, and banking industries. The ultimate goal of this course is using such industries effectively and towards a better society.

Freight Insurance

Managing time effectively is fundamental to success. It also factors into achieving balance in our lives. Today, we're busier than ever--at work and at home. Having enough time for things that are important, things we want or need to do, or even to have enough time to devote to a special project, there just isn't enough time to go around.

 

This course is a practical "how to" that will guide you through the maze of conflicting priorities, self-doubts, disorganization, over-commitments, and limitations that in the past have kept you from successfully managing time. It offers a step-by-step format for achieving balance between your personal and professional lives.

Customer Service

Just about every company seems to understand just how important customer service is and many have started to find ways to improve and measure customer service. Many businesses want to achieve "good customer service". Right now that's the brass ring of business training and vision-casting and many companies are analyzing their current mission and realigning it to be increasingly customer-focused.

 

In this course we are going to look at what customer service is and isn't and identify how you can understand and provide good customer service.

 
 

The GAFM Global Academy of Finance and Management ® is known for its world-class certification and designation programs for working professionals. We now offer these programs in-house – dedicated to your organization, your people and your products.

GAFM.png

INFORMATION SECURITY

CERTIFICATION

Mobile 2.png

The Certified in Info Technology Service Management ™ (CITSM) 

FINANCE & INVESTMENT

CERTIFICATION

Seminar 3.jpg

The Accredited INVESTMENT

MANAGER

INSURANCE & INVESTMENT

CERTIFICATION

Office Desk

The Chartered Certified

INSURANCE PROFESSIONAL

PROJECT MANAGEMENT

CERTIFICATION

Business Process 8.jpg

The Certified International Project Manager (CIPM) 

The Certified International info Security Manager

The Master FINANCIAL 

PLANNER

Chartered Certified Insurance Professional  ™  (CCIP) 

Chartered Accredited Project Manager ®  (ChPM)

The Accredited FINANCIAL

 ANALYST

The Chartered Financial Director ™ (ChFD) 

The Master Financial Planner ® MFP 

The Accredited Investment Manager ™ (AIM) credential

The Chartered Agile Project Manager ™ (CAPM)

The Master Project Manager ® (MPM®) 

The Accredited Agile Project Manager (AAPM

Bosoka  has a number of educational resources available for Cyber Security Awareness Campaign program including annual month awareness and annual certification. The Cyber Security Awareness Campaign Resources include cyber security themed posters, calendars, bookmarks, guides, brochures and other content

Discover More

®American Academy of Financial Management (AAFM) and Global Academy of Financial Management (GAFM)  training and board certified internationally credentialed certification training are provided: .

 

IN-PERSON & TAILORED

TRAINING PROGRAM

Our live, in-person training with a subject matter expert has significant advantages over more passive, online training. The presentations and discussions are more relevant and engaging than static training programs accessed online. Our expert instructors provide face-to-face instruction and interactivity. You'll benefit from a proven curriculum and collaboration between others in the class.

These courses are offered in-person to give you the individual attention and flexibility you need to succeed.

Modern Office

In-Person Training Programs

Customized training program tailored to each organization need, but with the advantage of in person training experts with recognized global qualification. 

 

Learn alongside fellow professionals and interact directly with the expert instructor that includes formal lecture, hands-on training and discussion in a collaborative setting.

Customized training tailored to companies need, but with the advantage of in person training by experts with recognized global qualification.  Learn alongside fellow professionals interacting directly with the expert instructors that includes formal lecture, hands-on training and discussion in a collaborative setting.

Man at his Desk

Tailored & Relevant Trainings by World-Class Experts

The GAFM Global Academy of Finance and Management ® is known for its world-class certification and designation programs for working professionals. We now offer these programs in-house – dedicated to your organization, your people and your products.

BOSOKA ACADEMY

TEAM

​Our team have a deep level of understanding of technology & business operation, oversight controls process including Cyber security audit and compliance frameworks with several years of experience in information security practices. 

Your Trusted Partner

Our team have a deep level of understanding of technology & business operation, oversight controls process including Cyber security audit and compliance frameworks with several years of experience in information security practices. 

Post-Training Reinforrcement 

Post-training reinforcement is a crucial part of ensuring training is applied on the job. Training reinforcement is a series of small lessons or learning activities that support a core concept or skill. By continuing to teach what was learned at a seminar , employees will not only remember more, but they will also be more likely to apply it to their everyday work.

Relevant Training Content 

Our training content are applicable and timely to help learners with their daily duties, expand their mind, and provide them with quick takeaways that can immediately be applied to their jobs. Providing relevant training content is key to a good training program, to ensure learners are engaged and continue to look for more.

Accredited Professional Certifications

We provide American Academy of Financial Management (AAFM) and Global Academy of Financial Management (GAFM)  training and board certified internationally credentialed training & certification in Finance, Tax, Insurance, Project Management Information security