• Vendors

  • Project Management Professional® (PMP) Certification Training

    5 Days
    The Project Management Professional (PMP) certification demonstrates that you have the knowledge, experience, and skills to successfully manage and complete projects. This PMP® Certification Training course will help you prepare for and successfully pass the PMP Certification exam while helping you sharpen your skills and knowledge to increase your competitive edge in the project management profession.
    Submit an Inquiry
  • Python Security

    3 Days
    The Python language is used in many different settings – from command-line tools to complex Web applications. Many of these Python programs are exposed to attack, either by being directly accessible through the Internet or by directly processing user-provided data in a server environment. Developers must therefore be extremely cautious in how to use different technologies securely, and should also have a deep understanding in secure coding techniques and potential pitfalls.
    Submit an Inquiry
  • Software Project Management Training

    3 Days
    In this Software Project Management course, you will learn the basics of software development project management under the Waterfall and Agile methodologies.
    Submit an Inquiry
  • Understanding Cybersecurity Operations Fundamentals (CBROPS)

    5 Days
    The Understanding Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. You will learn basic information about security concepts, common network application operations and attacks, the Windows and Linux operating systems, and the types of data used to investigate security incidents.
    Submit an Inquiry
  • Web Application Security

    3 Days
    As a developer, your duty is to write bulletproof code. However... What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? What if they could steal away your database and sell it on the black market?
    Submit an Inquiry

Subscribe to Newsletter

Enter your email address to register to our newsletter subscription delivered on regular basis! 

CONTACT US     ABOUT     PRIVACY   BLOG

© Copyright ICSI, Limited
(International CyberSecurity Institute) 2023