Talent

Talent Accelerator Students

The 2025 Cyber Talent Accelerator Chort

Meet the 2025 SANCS Cyber Talent Accelerator cohort. The Talent Accelerator student-interns have completed a rigorous 6-month training and work readiness program. They are full of energy, new knowledge and ready to get going!
For potential employers and recruiters please note that our student interns are all on LinkedIn. Alternatively, contact CSI via telephone, email or WhatsApp.

Bridget
Radebe

Bridget Radebe is a passionate and driven recent graduate in Forensic Science and Technology (honours degree) from the University of South Africa (UNISA). Her studies sparked her interest in cybercrime investigation, digital forensics and the safeguarding of individuals and organisations from online threats. She joined the South African-Netherlands Cyber Security Program (SANCS25) where she gained hands on experience in cybersecurity principles, threat analysis, and defensive strategies. She previously worked as a maintenance technician in the Netherlands and now looking to pivot into the cyber world. She is currently enrolled at SANCS25 CSI Talent Accelerator Program. Beyond her technical pursuits, Bridget is a multilingual enthusiast with a love for languages, speaking intermediate Dutch, as well as basic Mandarin, Korean and German. Her ambition is to become a cybersecurity analyst or incident responder to combat cyber threats and contribute to a safer digital space.

Dane Govender

Dane Govender is a recent Bachelor of Computer Science graduate with a strong academic foundation and a passion for cybersecurity. He has a particular interest in penetration testing and has gained hands-on experience through real-world projects and competitions. Dane won the Microsoft Challenge at SANCS25 and was awarded a fully sponsored spot in the Cyber Security Talent Accelerator, provided by the Embassy of the Kingdom of the Netherlands in South Africa and presented by the Cyber Security Institute. With experience in full stack development, secure coding, cloud technologies, and AI-driven applications, he is committed to building secure, intelligent, and innovative solutions.

Darius
Honiball

Darius Honiball is an Information Technology graduate specialising in cybersecurity. During his Work Integrated Learning programme at Cross Technology, he took the initiative to lead a Proof of Concept (PoC) project, designing and implementing a Proxmox (QEMU) virtualisation infrastructure to migrate existing VMware servers, demonstrating his technical aptitude and problem-solving skills. Currently, he is honing his expertise as a participant in the SANCS25 Talent Accelerator Programme, where he is gaining hands-on experience in cybersecurity environments, cryptography, technical security and governance. Passionate about securing and hardening systems, he is dedicated to continuous learning and helping organisations defend their critical assets against evolving cyber threats.

Ryan
Blair

Hello, my name is Ryan Blair. I am a SANCS25 student and a CSI student. I have been involved in cybersecurity/ethical hacking since I was 13. It started with playing video games and jailbreaking those consoles, to learning how to ethically hack on a laptop/pc. I never knew there was an option to hack “legally” until I found cybersecurity. I fell inlove with it straight away and pursued it after school. Now I'm working hard on completing as many certificates as I can to enhance my knowledge of the cyber world. Now you may think i stay home all-day doing cybersecurity but actually i have a stable life with many supportive friends, and I'm able to hop on my motorbike every now and then and take a cruise with some bikers. I also enjoy playing video games, still, and working on small ethical hacking projects on the side.

Keorapetse Malgas

Keorapetse Malgas is an emerging penetration tester with a deep curiosity for how systems break -and how to build them back stronger. With a foundation in ethical hacking, vulnerability assessments, and secure code review, she specializes in penetration testing, vulnerability assessments and red teaming. Her approach blends technical precision with creative problem-solving, whether simulating cyberattacks or developing AI-powered security tools. Keorapetse has recently gained hands-on experience through labs and eJPT and ISC2 CC certifications. Currently she is developing AI applications, specifically early-stage apps focused on AI-driven education and professional growth, underscoring her mission to build solutions that matter. She believes in staying curious, leading with value, and helping others uncover hidden potential, whether through technology, storytelling, or security.

Khayelihle Khumalo

Khayelihle Khumalo is a legal professional and a participant in the SANCS25 Cyber Talent Accelerator Programme. She holds an LLB from the University of Venda and has a growing passion for Cyber Security Law — a crucial and emerging field in South Africa since the introduction of the Cybercrimes Act in 2020. Her aim is to bridge the gap between law and technology by developing the legal expertise needed to investigate, prosecute, and adjudicate cybercrimes. Khayelihle plans to start her master's in cyber law in 2026 to expand her cyber law knowledge to contribute to a justice system that is equipped for the digital age and to help shape a safer, smarter legal landscape for South Africa.

Koketso Mothudi

Koketso Mothudi holds a Bachelor of Arts (Hons) in International Studies from Stellenbosch University. She is an aspiring Country Risk Analyst with a keen interest in cybersecurity and is currently enrolled as a student of the SANCS25 Talent Accelerator Programme to gain practical experience and knowledge in cybersecurity practices. Being an avid reader with a virtual book club and blog, Koketso is adaptable, eager, and armed with just the right amount of humour to keep things light. She is excited to contribute, grow and maybe even make the occasional spreadsheet look cool.

Kutlwano Lekaowa

Kutlwano Lekaowa is a qualified Audiologist from the University of Cape Town, with four years of experience in South Africa’s public and private healthcare sectors. The 2024 National Health Laboratory Service (NHLS) ransomware attack sparked her interest in protecting critical systems and patient data, leading her to transition into cybersecurity. She has since completed the Google Cybersecurity Professional Certificate and IBM’s Fundamentals of Cybersecurity. Currently focused on cloud security, Kutlwano holds Microsoft’s AZ-900 (Azure Fundamentals) and SC-900 (Security, Compliance, and Identity Fundamentals) certifications, with AZ-500 (Azure Security Technologies) underway. As a fellow of the MentorMeCollective Google Cloud Launchpad, she continues to build expertise in protecting critical infrastructure. Kutlwano is positioning herself to make a meaningful impact in defending the healthcare and other high-risk sectors, by combining her healthcare background with the technical proficiency and hands-on experience she is gaining through the SANCS25 Talent Accelerator Program.

'Mashai
Pelei

Mashai Pelei is a Bachelor of Science in Computer Science graduate with a strong interest in Cybersecurity, Digital Forensics, and AI and Data Governance. She is passionate about using technology to promote online safety, especially for vulnerable communities. She has been actively participating in the UN Internet Governance initiatives and currently serving as the National Coordinator of Youth Internet Governance Forum (IGF) Lesotho, striving to introduce the youth to matters that affect them as the main users of the internet. Mashai continues to champion digital literacy programs and is always eager to collaborate on solutions that promote ethical technology usage and believes that digital skills should be considered as human rights.

Moitheki Mfelang

Moitheki Mfelang is a Cyber Security Institute student eyeing a career in the IT industry, specifically in cybersecurity. Outside her academic journey and participating in the SANCS25 CSI Talent Accelerator Program, she is also a model and enjoys reading books. She has attained certificates in cybersecurity through Cisco and the Southern Africa-Netherlands Cyber Security program 2025 and is eager to develop her technical skills in cybersecurity, network defence, ethical hacking and penetration testing. By utilizing goal orientation and self-motivation as her key strengths, Moitheki aims to use this opportunity as a stepping stone to eventually become recognised as one of the best cybersecurity analysts in the industry.

Nokuthaba Siphambili

Nokuthaba Siphambili is an MIT ICT Information Science graduate at the University of Pretoria. Her main objective during research, was to investigate a South African SOE (state owned enterprise), in the hopes of encouraging the protection of its sensitive information. Nokuthaba was awarded a Golden Key award for finishing among the top 15% of students in the Faculty of Engineering, Built Environment and Information Technology at the University of Pretoria. She is passionate about cybersecurity and considers the SANSC25 Talent Accelerator Program as an opportunity to enhance her knowledge and skills in the different domains of cybersecurity, from governance, privacy and trust to scripting, which underscores her dedication to comprehensive cybersecurity solutions.

Panashe
Dinha

Panashe Dinha is currently pursuing a bachelor’s degree in Computer Information Systems at Africa University, where he combines his entrepreneurial drive with a passion for cybersecurity. As an active member of the ISACA Harare Chapter, he demonstrated outstanding team leadership and technical skill at the 5th Annual ISACA IT Bowl (Puerto Rico), where his team placed 2nd in Zimbabwe/Africa and 4th globally. This success reflects his dedication to mentorship, collaboration, and academic excellence. Beyond competitions, Panashe stays engaged in the cybersecurity community by frequently sharing insights and best practices. He aspires to build secure digital systems and shape the future of risk management in Africa, advocating for strong cyber hygiene and robust digital identities.

Precious Munzhedzi

Precious Munzhedzi is a seasoned professional with experience in banking, education, training, and field data collection, customer service, training facilitation, financial services, and administrative support. With her strong interpersonal communication skills and her passion for learning, she brings a dynamic and enthusiastic approach to every role she undertakes. I am a result-oriented and confident individual in engaging with people and communities to achieve shared goals.

Rethabile Moswane i

Rethabile Moswane is a Junior Engineer with a Bachelor of Engineering in Mechanical Engineering from the University of Pretoria. Passionate about continuous learning, sharing knowledge, and thrives in challenging situations that push her beyond her comfort zone. Her first exposure to cybersecurity was in 2022, during an exchange program at MIT, as a participant in the MIT Cybersecurity Clinic. As part of a multidisciplinary team, she helped cities and towns in New England reduce their cybersecurity vulnerabilities by collaborating directly with IT staff, cybersecurity specialists, and local officials. She worked both on-site and remotely, reviewing client policies and procedures—including cloud security, cyber insurance, and incident response plans—and provided actionable feedback to strengthen overall cybersecurity posture. Rethabile is beginning her next phase of growth through the SANCS Talent Accelerator Program. She is eager to further explore the intersection of cybersecurity, engineering, AI, and machine learning—particularly in securing critical infrastructure and advancing South Africa’s digital resilience.

Rose Zwelibanzi

Rose Zwelibanzi is an administrative assistant and database management specialist with a flair for event coordination. She handles various tasks from calendar and meeting management, data entry and ad hoc admin duties for executives and teams. Rose volunteers for an athletic foundation that works with young and upcoming athletes across South Africa. When she is not keeping things organized, you’ll find her listening to music, getting lost in a good book and trying out different cuisines. Having an eye for detail and analytical skills enables her to see patterns that others might miss. This motivated her to enter the cybersecurity world through the SANCS 2025 program, initially as a challenge to herself for continuous learning, but also to combine her current skillset with cybersecurity to help protect her clients and their interests. Rose is always up for a good challenge and loves sharing a good laugh with friends and colleagues.

Samkelo Makreqa

Samkelo Makreqa is an ambitious and practical individual with a growing passion for Cybersecurity. He recently completed the Google Cybersecurity Professional Certificate and is actively pursuing opportunities to sharpen his skills and stay ahead in the ever-evolving tech landscape. Having participated in SANCS25 was an experience that inspired him and strengthened his dedication to the cybersecurity field. Samkelo is continuously learning and believes in constantly upskilling oneself to stay ahead of the curve.

Siwaphiwe Hlazo

Siwaphiwe Hlazo holds a BA (Honors) in international business and Trade from the African Leadership University and has completed multiple certifications in the field of cybersecurity, with a focus on Governance, Risk and Compliance (GRC). She is an alumna of the South Africa–Netherlands Cyber Security School (SANCS25), where she participated in case-based learning and developed solutions around national cyber resilience. Her growing interest in digital risk and trust is reflected in her volunteer work promoting cybersecurity awareness in her hometown of Mthatha in the Eastern Cape, where many community members—including her mother—have been impacted by cybercrime due to limited digital literacy. Siwaphiwe has also completed a GRC Analyst job simulation through Forage and holds additional certifications in areas such as cloud fundamentals, risk management, and security awareness. Aspiring to become a cybersecurity consultant and ethical hacker, she is passionate about bridging the digital divide and applying her skills in emerging cybersecurity domains.

Thandolwethu Shisa

Thandolwethu Shisa is a research-driven scholar with a growing interest in cybersecurity, digital governance, and international cyber diplomacy. She holds an Honours Degree in International Relations from the University of the Witwatersrand and has recently completed a course with Howard University. Through her experiences at SAIIA, UNICEF, and the South Africa-Netherlands Cyber Security School, she has gained valuable insights into governance frameworks, policy research and emerging digital threats. Having a particular interest in the intersection of cybersecurity with policy, risk, and compliance, Thandolwethu is passionate about contributing to the protection of digital ecosystems. Currently she serves on the Y20 Meaningful Youth Engagement and Reforming Multilateralism for a Just Future Working Group under the G20, where she helps shape youth-led global policy.

Tshiamo Karadimos

Tshiamo Tiisetso Karadimos is a Social Science graduate, majoring in International Relations and Political Studies, having graduated with distinction. She has a keen interest in learning about the nuances of international relations and political influence. Having also obtained a Paralegal Practitioner Certificate at the University of Cape Town, strengthens her ability to comprehend the crossings of law, politics, and international relations. Besides her academic achievements, she served as a Stakeholder Relations Officer to the South African BRICS Youth Association (SABYA) where she collaborated with young leaders from BRICS nations to address global issues, youth empowerment and how they can play a role in the policymaking and transformation of society. Tshiamo also participated in the Southern Africa - Netherlands Cyber Security School (SANCS25) and is currently a student in the SANCS25 Cybersecurity Talent Accelerator Program. Her goal is to contribute to the broader sphere of international relations, cybersecurity and policymaking, as well as local politics and international affairs.

Tamaryn Le Chat

Tamaryn Le Chat is a Software Development student who is driven by her passion for technology and innovation, particularly software engineering and cyber security. She is thrilled to be selected for the SANCS25 Talent Accelerator Program and considers it a prestigious initiative by the Cyber Security Institute (CSI). Apart from her studies, Tamaryn is also a semi-professional soccer player, cricket player and is actively involved in sport coaching at schools, which has helped her gain skills such as leadership, teamwork, and communication. Although at just 23 years of age and the youngest of four siblings, she has travelled and experienced life in different parts of South Africa, including Worcester, Pretoria and most recently the coastal town of Knysna. Tamaryn believes in always giving you best. She is excited about her future and aims to build a career in IT abroad, in addition to making a positive impact in her community and for society and knows that through determination and perseverance, you can achieve your dreams.

Certificate in Cyber Security

Course Details

This practical, hands-on course focuses on establishing a foundation in Cyber Security by introducing candidates to cyber-crime, attack methods, and managing cyber risks.

Mode of Offering: The course is presented via facilitated    e-learning, utilising an e-learning platform and virtual classes.

Intended Audience:

This course is designed for individuals embarking on a career in Cyber Security or performing security functions.

Eligible for FUNDI Funding!

Requirements

Applicants should have a Matric certificate or equivalent qualification with suitable IT knowledge, Internet access, and a PC or laptop on which applications can be installed and services accessed.

Costs:

R10,500 all inclusive

Duration:

5-months

Intake:

We have two main intakes, one at the end of February and another at the end of June. Additional intakes may be scheduled depending on application volumes and requirements.

Course Overview:
Cyber-crime‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎
  • Introduction to cyber-crime
  • Cyber-attack methods (e.g., ransomware, sextortion, email fraud)
  • Cyber criminology (actors behind the attacks, criminal networks, state-sponsored entities, etc.)
  • Tracing the online trail
  • Dark web (criminal forums)
  • Case studies of attacks in SA & Global.
  • Crime-as-a-Service
  • Internet of (Criminal) Things.
Practical Cryptography
  • Introduction to cryptography.
  • Encryption and Decryption.
  • Hash functions
  • Blockchain
  • Virtual Currencies
  • Digital signatures
  • Digital certificates
  • Cryptographic Protocols (SSL, SSH, etc.)
Course Overview:
Cyber Governance, Risk & Compliance
  • Overview of cyber governance, risk, and compliance
  • POPIA & GDPR
  • Data Privacy
  • Policies in action
  • NIST, ISO27001
  • Controls
  • Planning for contingencies
  • Developing the security program
  • Risk analysis and management
Cyber Intelligence‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎
  • Introduction to Cyber Intelligence
  • Attack Tools
  • Attack process
  • Reconnaissance and Footprinting
  • OSINT services and tools
  • Threat and vulnerability feeds and assessments

Cyber Investigations

Course Details

This course is suitable for investigators and investigation teams within the corporate environment and public sectors who are required to track online trails or utilise tools to solve online crimes. It is also intended for professionals and investigative journalists involved in investigations such as fraud, espionage, data theft, and cyber vetting.

Mode of Offering: The course is presented via facilitated    e-learning, utilising an e-learning platform and virtual classes.

Intended Audience:

This course is designed for investigation officers, cyber-crime investigators, investigative journalists, etc.

Eligible for FUNDI Funding!

Requirements

Applicants should have a Matric certificate or equivalent qualification. Although a formal IT qualification or certification is not required, some knowledge of computer systems would be beneficial. Internet access and a PC or laptop on which applications can be installed and services accessed are required.

Costs:

R10,500 all inclusive

Duration:

4-months

Intake:

Applications are accepted throughout the year, with course starting dates in February, May, and August.

Course Overview:
  • Reconnaissance
  • Online services and tools
  • Metadata Encryption & Decryption
  • Digital signatures
  • Online investigations
  • Crime Scene Management
  • Documenting evidence
  • Investigation Process
  • Chain of Evidence
  • Protocols and emails
  • URLs & DNS information
  • Timelines
  • Decryption and deciphering
  • Virtual Currencies
  • Cyber criminology
  • Introduction to the attack process
  • Introduction to attack vectors
  • Social networks (i.e., attacks via Facebook, Twitter, etc.)
  • Dark and hidden web
  • Threat actors
  • Data Collection
  • Social Media
  • OSINT
  • HUMINT
  • SOCMINT

Cyber Intelligence

Course Details

The main objective is to equip delegates with the necessary competencies and practical skills to assist in compiling an intelligence-driven cyber security strategy to provide proactive solutions to a plethora of cyber threats.

Mode of Offering: The course is presented via facilitated        e-learning, utilising an e-learning platform and virtual classes.

Intended Audience:

This course is designed for persons responsible for the security function, CISOs, as well as Data Protection Officers.

Requirements

Applicants should have a Matric certificate or equivalent qualification. Although a formal IT qualification or certification is not required, some knowledge of computer systems would be beneficial. Internet access and a PC or laptop on which applications can be installed and services accessed are required.

Costs:

R10,500 all inclusive

Duration:

4-months

Intake:

Applications are accepted throughout the year, with course starting dates in February, May, and August.

Course Overview:
  • Cyber Security Environment
  • Cyber Landscape
  • Cyber Threats and Exploits
  • Cyber Actors and Criminology Aspects
  • Obtaining Data
  • Sources of Data
  • Collection Operations
  • Applications, Tools, and Services
  • Analysis of Cybercriminals’ Modus Operandi
  • Analysis Techniques (Data to Information)
  • Indicators of Compromise
  • Cyber Intelligence
  • Intelligence Platforms, Applications, and Services
  • Data – Information – Intelligence
  • Intelligence Strategy
  • Incident Management
  • Cyber Warfare
  • Political and Commercial
  • Developing an Intelligence-Driven Strategy
  • Strategic and Tactical Intelligence Function
  • Risk Management

Cyber Governance

Course Details

Establishing a security strategy and defining a suitable implementation plan focused on managing cyber risks in a volatile and dynamic environment requires a solid understanding of the threat space and frameworks. This course unpacks cyber governance and approaches to manage risk and adhere to compliance regulations.

Mode of Offering: The course is presented via facilitated    e-learning, utilising an e-learning platform and virtual classes.

Intended Audience:

This course is designed for Managers and C-Suites responsible for security, Board members, as well as prospective leaders in the Cyber Security space.

Eligible for FUNDI Funding!

Requirements

Applicants should have a Matric certificate or equivalent qualification. Although a formal IT qualification or certification is not required, some knowledge of computer systems would be beneficial. Internet access and a PC or laptop on which applications can be installed and services accessed are required.

Costs:

R10,500 all inclusive

Duration:

4-months

Intake:

Applications are accepted throughout the year, with course starting dates in February, May, and August.

Course Overview:
  • Security Management Program
  • Cyber-crime
  • Threat Environment
  • Cyber Criminology
  • Regulations – GDPR, POPI, Electronic Act, PCI-DSS
  • Skills Frameworks
  • Cyber Awareness Programs
  • Risk management
  • Controls – Choice, Implementation, and Management
  • Security Frameworks and Models
  • Policies and Procedures
  • Data Protection
  • The road to ISO 27001 Compliance and Certification

IT and Cyber Security Program

Course Details

Our courses combine essentials from both industry and academia to provide valid, unique, practical content that is innovatively presented via facilitated e-learning.

The IT and Cyber Security Program is a practical course consisting of coursework, virtual classes, and practical cyber range exercises.

Mode of Offering: Learning will be conducted through a facilitated online format, utilising an e-learning platform to provide an interactive and engaging educational experience. Additionally, hands-on practical sessions and virtual labs will be conducted every Friday from 9:00 AM to 12:00 PM, offering participants the opportunity to apply theoretical knowledge in a real-world context. This blend of online facilitated learning and scheduled virtual sessions aims to create a comprehensive and dynamic learning environment, ensuring a well-rounded educational experience for participants.

Intended Audience:

This course is designed for school leavers, those on a gap year, graduates looking to add industry credentials, and individuals looking to make a career change.

Eligible for FUNDI Funding!

Requirements

Applicants should have a Matric certificate or equivalent qualification. Internet access and a PC or laptop on which applications can be installed and services accessed are required.

Costs:

R 31,350 all inclusive

Duration:

12-months

Intake:

25 February 2025

Course Overview:
IT Foundation for Cyber Security
  • IT Hardware Fundamentals
  • Network Fundamentals
  • Introduction to Operating Systems (Windows and Linux) 
  • Introduction to Cloud Computing (Office 365 and MS Azure) 
  • Protocols 
  • Technical Research and Writing
  • Algorithms and Problem Solving
  • File and Database Systems
  • Scripting
  • New Technologies: AI and Quantum Computing
  • Soft Skills
Certificate in Cyber Security
  • Cyber Security Fundamentals 
  • The Cybercrime Eco-System
  • Actors in Cyber Space – State and Non-State Actors
  • Cyber Incidents: Attacks, Breaches, and Espionage
  • Understanding Tactics, Techniques, and Procedures (TTPs) using the Mitre Attack Framework
  • Cryptography (Symmetric/Asymmetric/Hashes)
  • Secure Protocols
  • Reconnaissance and OSINT (Open-Source Intelligence)
  • Cyber Security Frameworks and Standards: Introduction to the NIST CS Framework and ISO 27000 Series
  • Cyber Risk Management, Cyber Governance, and the Implementation of Security Controls
Facilitated online course with virtual classes, and practical training and skills development on the cyber range platform.