Ethical Hacking – Training Courses & Certification
What is Ethical Hacking? Ethical Hacking refers to the act of penetrating computer systems, networks or applications with the intention to exploit vulnerabilities that...
Cybersecurity – Training Courses & Certification
What is Cybersecurity? Cybersecurity or the Cyberspace Security refers to the protection of systems, programs, networks and devices from cyber-attacks in order to preserve...
Human Resources Security Trainings
What is Human Resources Security? The Human Resource Security discipline is designed to examine key controls applied before, during, and after the hiring of...
Digitalization and Electronic Archiving
What is Digitalization and Electronic Archiving? Any document management project, whether for a public or private archive, needs to incorporate digitalization as an essential...
Communications Security Trainings
What is Communications Security? Communications Security as a discipline, addresses the prevention of unauthorized access to telecommunications traffic or any information that is...
Secure Application Developer Trainings
What is Secure Application Development? Secure Application Development (SAD) is the process of writing secure code without errors and vulnerabilities that expose an application...
Cybersecurity Audit Trainings
What is Cybersecurity Audit? The digital evolution has brought immense benefits in innovation and growth, but the great dependence that many business models have...
Computer Forensics Trainings
What is Computer Forensics? Computer Forensics, also known as Cyber Forensics refers to the analysis of information in the computer systems, with the objective...
ISO 27799 Information Security Management in the Healthcare Industry Trainings
What is ISO 27799? ISO 27799 provides guidelines for organizational information security standards and Information Security Management practices which include but are not limited...
Penetration Testing Professional Trainings
What is Penetration Testing? A penetration test is a practice of assessing the security of an IT infrastructure by securely trying to exploit vulnerabilities...