Choose Your Country
The Understanding Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. You will learn basic information about security concepts, common network application operations and attacks, the Windows and Linux operating systems, and the types of data used to investigate security incidents.
No technical knowledge or background is required for this course which is particularly recommended for companies and organizations. All staff members who use computers, mobile devices, networks and the internet will learn how to apply good technology practices and everyday habits that will maximize online security and minimize risks.
In this course, we will discuss what Incident Response and Digital Forensics are, the legal implications they have and how they are structured. We will also perform various exercises on digital forensics tools in order to get a clear understanding of the technicality that digital forensics assumes.
The Dark Web is a vast, well-travelled, and nearly ignored waypoint of exfiltrated corporate assets as well as discussions of network attacks and methodology. Information security regularly overlooks the significance of this largely untapped resource. This course covers tools, techniques, and tactics for leveraging the Dark Web as a means for defending organizational assets proactively and reactively.
This course is designed for practitioners who are seeking to demonstrate a vendor-neutral, cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem.
The ISO27001 is the most acknowledged and globally recognized standard for implementing an Information Security Management System (ISMS) within any organization.
Certified Information Security Auditor (CISA) is a globally acknowledged certification, which builds upon the previous experience of IS professionals, to produce valuable employees who possess exceptional knowledge of Information Systems Auditing, Control, and Security.
This Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations. Possession of this certification displays precise knowledge, practice, and copious amounts of experience in the realm of information security management. This CISM training course takes into account practical issues, like the creation of information security programs, and incident management, whilst promoting security practices used globally.
This course will expand upon your knowledge by addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process, while providing a framework to prepare for CISSP certification.
Given the increasing number of disruptions and the unpredictability of disasters of any kind (natural, occupational, information security), organizations nowadays are aiming at getting certified against ISO 22301 in order to show commitment toward business continuity and ensure that disruptive incidents are detected and properly addressed, thus the management system is continually improved.
During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process.
No two disasters in the world cause equal damage. Between the unpredictability of natural disasters, information security breaches, and incidents of different nature, preparedness can make you stand out in the crowd and predict the future of your business.
The CPSA course leads to the CREST Practitioner Security Analyst (CPSA) examination, which is an entry level qualification that tests a candidate’s knowledge in assessing operating systems and common network services at a basic level below that; of the main CRT and CCT qualifications.
This course teaches penetration testing and will illustrate how to think like an attacker and use industry standard tools to perform penetration testing. The course is aligned with the CREST CRT technical syllabus.
The Certified Risk Information Systems Control training course provides delegates with valuable technical skills, which ensure success and prosperity in the realm of IT security. The CRISC certification is a powerful manifestation of proficiency and expertise regarding various areas of risk.
The CREST Registered Penetration Tester examination is recognized by the NCSC as providing the minimum standard for CHECK Team Member status and is designed to assess a candidate’s ability to carry out basic vulnerability assessment and penetration testing tasks.
The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle.
This course teaches the basics regarding Information Security, including a holistic view of modern network security, operating system hardening, firewalls, Encryption, Application Security, Incident Response and Recovery.
The course teaches web penetration testing and illustrates how to think like an attacker and which tools are used in order to perform a web penetration testing. Students will also learn to report the results of the web penetration testing.
This course covers network defence and incident response methods, tactics, and procedures are taught in alignment with industry frameworks such as NIST 800-61 r.2 (Computer Security Incident Handling), US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy.