Redefining Cybersecurity Education
COHORT BASED COURSES
![](https://mca.ac.ug/wp-content/uploads/2022/11/ceh.jpg)
Certified Ethical Hacking
The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH, is the first part of a 3 part EC-Council Information Security Track which helps you master hacking technologies. You will become a hacker, but an ethical one!
![](https://mca.ac.ug/wp-content/uploads/2022/11/comptia.jpg)
CompTIA Security+
MCA partners with CompTIA to provide this course. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs.
![](https://mca.ac.ug/wp-content/uploads/2023/01/CySA-1.jpg)
CompTIA CySA+
MCA partners with CompTIA to provide this course. MCA partners with CompTIA to provide this course. CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioral analytics to networks and devices to prevent, detect and combat cybersecurity threats through continuous security monitoring.
![](https://mca.ac.ug/wp-content/uploads/2024/07/final-edit.png)
ISO 27001 & Cyberdefense Bootcamp
ISO/IEC 27001 provides requirements for organizations and individuals seeking to
establish, implement, maintain, and continually improve an information security
management system.
The Cyberdefense training program is a unique cybersecurity training designed to
introduce participants to critical concepts of attacks and defense of the IT
infrastructure.
against a wide variety of modern IT attacks.
CORPORATE TRAININGS
![](https://mca.ac.ug/wp-content/uploads/2022/11/Cybersecurity-Training-e1669732162125.jpg)
Cyber Awareness Training
Our awareness training is designed to expose both the non-technical and technical users to latest Cyber threats, techniques hackers use to penetrate systems and how unsuspecting users are often used to complete the job easily. Through this training therefore users are then trained on how to detect threats, respond to threats and stay clear of common attack vectors used by attackers.
![](https://mca.ac.ug/wp-content/uploads/2022/12/pexels-fauxels-3183150-scaled.jpg)
Cybersecurity for Executives
MCA supports organisational cyber-maturity through the delivery of information security audit services, an exercise aimed at discovering system weaknesses that could otherwise be exploited by hackers and bad actors. Through this exercise, an organisation is able to gain better insights into their security posture and make necessary improvements to avoid attacks, improve on compliance and present themselves to clients as a cyber-mature entity.
VIRTUAL REALITY POWERED CYBERSECURITY TRAINING
![](https://mca.ac.ug/wp-content/uploads/2023/01/0X4A5850-removebg-preview.png)
OUR PARTNERS
![partn 1](https://mca.ac.ug/wp-content/uploads/2022/12/partn-1.jpg)
![partn 2](https://mca.ac.ug/wp-content/uploads/2022/12/partn-2.jpg)
![partn 4](https://mca.ac.ug/wp-content/uploads/2022/12/partn-4.jpg)
![partn 5](https://mca.ac.ug/wp-content/uploads/2022/12/partn-5.jpg)
![partn 8](https://mca.ac.ug/wp-content/uploads/2022/12/partn-8.jpg)
![partn 9](https://mca.ac.ug/wp-content/uploads/2022/12/partn-9.jpg)
![msecURITY logo](https://mca.ac.ug/wp-content/uploads/2022/12/msecURITY-logo--300x141.png)
WHAT OUR ALUMNI SAY..
![](https://mca.ac.ug/wp-content/uploads/2023/01/emma.jpg)
OUR STUDENTS COME FROM...
![proj stud 1](https://mca.ac.ug/wp-content/uploads/2022/12/proj-stud-1.jpg)
![mofed](https://mca.ac.ug/wp-content/uploads/2023/01/mofed.jpg)
![upf](https://mca.ac.ug/wp-content/uploads/2023/01/upf.jpg)
![mtn 2](https://mca.ac.ug/wp-content/uploads/2023/01/mtn-2.jpg)
![proj stud 2](https://mca.ac.ug/wp-content/uploads/2022/12/proj-stud-2.jpg)
![nwsc 4](https://mca.ac.ug/wp-content/uploads/2023/01/nwsc-4.jpg)
![proj stud 3](https://mca.ac.ug/wp-content/uploads/2022/12/proj-stud-3.jpg)
![proj stud 11](https://mca.ac.ug/wp-content/uploads/2022/12/proj-stud-11.jpg)
![proj stud 6](https://mca.ac.ug/wp-content/uploads/2022/12/proj-stud-6.jpg)
![proj stud 12](https://mca.ac.ug/wp-content/uploads/2022/12/proj-stud-12.jpg)
![uncst 3](https://mca.ac.ug/wp-content/uploads/2023/01/uncst-3.jpg)
![proj stud 4](https://mca.ac.ug/wp-content/uploads/2022/12/proj-stud-4.jpg)
![proj stud 5](https://mca.ac.ug/wp-content/uploads/2022/12/proj-stud-5.jpg)
![proj stud 7](https://mca.ac.ug/wp-content/uploads/2022/12/proj-stud-7.jpg)
NEWS AND PUBLICATIONS
ISO 27001 & CYBERDEFENSE BOOTCAMP
Milima Cyber Academy: ISO27001 Certification & Cyberdefense BootcampISO27001 Certification: Enhancing Information SecurityISO27001 is the global standard for Information Security Management Systems (ISMS), providing:Risk …
DECODING PAYLOADS
What is a Payload?Payload Primer: In cybersecurity, a payload is the malicious part of an attack, executing harmful actions like data theft or system …
PRESS RELEASE
MILIMA TECHNOLOGIES LTD SIGNS A PARTNERSHIP AGREEMENT WITH PECB February 22nd, 2024 – We are pleased to announce that we have recently …
ABOUT MCA
![](https://mca.ac.ug/wp-content/uploads/2022/11/mca-logo-1-536x268-1.png)
We are Uganda’s top-tier cyber-security and digital forensics academy supporting young professionals to gain practical and hands-on skills.
PAGES
- Home
- About Us
- Cyber Defense Training
- Cyber Awareness Training
- Publications
- FAQs