Generix assists organizations in protecting the most important asset — people by providing Information Security Awareness through variety of methods and material:

  • Security Awareness Training (Online / Class Room Delivery)
  • Posters (Hand-Made Drawings / Photos)
  • Animations / Videos
  • Employee Security Orientation Sessions
  • Wall-papers / Screen Saver
  • Newsletter

Protecting The People !

  • Mandatory Requirements i.e. PCI-DSS,  ISO27001, HIPPA, e-Government Act etc.
  • Liability i.e. Consumer Protection
  • 95% Incidents occur because of People
  • Lack of in-house Knowledge and Capability

Security Awareness Lapses !

Awareness Laps


  • We developed an online user friendly portal to deliver variety of information security awareness material
  • We provide comprehensive reporting for management on current level of awareness
  • We serve you on the move (Providing Infosec awareness through Mobile Phone)


Underlying Magic !

  • Behavior driven Information Security Awareness
  • Continuous assessment of Level of Awareness of People
  • Comprehensive Reporting
  • User Friendly and Always On Portal

Trainings & Exams

We provide trainings with and without exams & certifications in the following areas:

  • Essentials of Information Security
  • Information Security Risk Management
  • Web Application Security for Managers
  • Writing and Developing Information Security Policies
  • SecurePeople (Corporate Awareness Campaigns)
  • ISO 27001:2013 Lead Implementation
  • ISO 22301 Business Continuity Management Lead Implementer
  • CoBIT foundation
  • CoBIT Implementation
  • ISO 27001:2013 Lead Auditor
  • ISO 22301 Business Continuity Management Lead Auditor
  • Exam preparation trainings of ISC2 Certifications
  • Exam preparation trainings of ISACA Certifications
  • Essentials of Information Security
  • Digital Forensics Essentials
  • Mobile Forensics
  • Social Media Forensics
  • Workshop on Penetration Testing Techniques
  • Workshop on Vulnerability Assessment
  • Workshop on Incident Handing and Response
  • Workshop on Malware Reverse Engineering
  • Hardening Network Infrastructure
  • Hacking and Auditing Web Applications
  • Hacking and Auditing Wireless LAN Security