UTI Cybersecurity, Cloud and IT Services
UTI Cybersecurity, Cloud and IT Services
  • Home
  • Services
    • Services
    • Virtual Services
    • Data Center Services
    • IT Infrastructure Service
    • Project Management
    • VMWare Service
  • Cloud
    • Cloud Services
    • Azure Cloud Services
    • VMWare Cloud Services
    • Huawei Cloud Services
    • DevSecOps
    • SD-WAN and Cloud Access
    • Identify and Access Mgmt
  • Cybersecurity
    • Cybersecurity Services
    • Qatar Cybersecurity FW
    • Information Security
    • Cyber Risk Scorecard
    • Network Security Services
    • BCP and DRP Services
  • ISO
    • ISO 27001 ISMS Services
    • ISO 22301 BCMS Services
    • ISO 20000 ITSMS Services
  • Solutions
    • PAM Solution
    • DLP Solution
  • SOC
    • Cloud SOC
  • Training
    • Training Services
    • Cloud Training
    • Security Training
    • Register for Training
  • More
    • Home
    • Services
      • Services
      • Virtual Services
      • Data Center Services
      • IT Infrastructure Service
      • Project Management
      • VMWare Service
    • Cloud
      • Cloud Services
      • Azure Cloud Services
      • VMWare Cloud Services
      • Huawei Cloud Services
      • DevSecOps
      • SD-WAN and Cloud Access
      • Identify and Access Mgmt
    • Cybersecurity
      • Cybersecurity Services
      • Qatar Cybersecurity FW
      • Information Security
      • Cyber Risk Scorecard
      • Network Security Services
      • BCP and DRP Services
    • ISO
      • ISO 27001 ISMS Services
      • ISO 22301 BCMS Services
      • ISO 20000 ITSMS Services
    • Solutions
      • PAM Solution
      • DLP Solution
    • SOC
      • Cloud SOC
    • Training
      • Training Services
      • Cloud Training
      • Security Training
      • Register for Training

  • Home
  • Services
    • Services
    • Virtual Services
    • Data Center Services
    • IT Infrastructure Service
    • Project Management
    • VMWare Service
  • Cloud
    • Cloud Services
    • Azure Cloud Services
    • VMWare Cloud Services
    • Huawei Cloud Services
    • DevSecOps
    • SD-WAN and Cloud Access
    • Identify and Access Mgmt
  • Cybersecurity
    • Cybersecurity Services
    • Qatar Cybersecurity FW
    • Information Security
    • Cyber Risk Scorecard
    • Network Security Services
    • BCP and DRP Services
  • ISO
    • ISO 27001 ISMS Services
    • ISO 22301 BCMS Services
    • ISO 20000 ITSMS Services
  • Solutions
    • PAM Solution
    • DLP Solution
  • SOC
    • Cloud SOC
  • Training
    • Training Services
    • Cloud Training
    • Security Training
    • Register for Training

Security Training

Security Training

Certified Information Security Manager (CISM)

Certified Information Security Manager (CISM)

Certified Information Security Manager (CISM)

Certified Information Security Manager CISM

We cover CISM exam contents in our course:-

  • Information Security Governance
  • Information Risk Management
  • Information Security Program Management and Development
  • Information Security Incident Management

Certified Information Systems Auditor (CISA)

Certified Information Security Manager (CISM)

Certified Information Security Manager (CISM)

Certified Information Systems Auditor CISA

We cover CISA exam contents in our course:-

  • Information Systems Auditing Process
  • Governance and Management of IT
  • Information System Acquisition, Development and Implementation
  • Information Systems Operations and Business Resilience
  • Protection of Information Assets

ISO 27001 Lead Auditor

Certified Information Security Manager (CISM)

Certified Information System Security Professional (CISSP)

This five-day intensive course enables the participants to develop the expertise needed to audit an Information Security Management System (ISMS), and manage a team of auditors by applying widely recognized audit principles, procedures and techniques. During this training, the participants will acquire the knowledge and skills needed to proficiently plan and perform internal and external audits in compliance with certification process of the ISO 27001 standard. Based on practical exercises, the participants will develop the skills (mastering audit techniques) and competencies (managing audit teams and audit program, communicating with customers, conflict resolution, etc.) necessary to conduct an audit efficiently.

Certified Information System Security Professional (CISSP)

Certified Information System Security Professional (CISSP)

Certified Information System Security Professional (CISSP)

Certified Information Systems Security Professional CISSP

We cover CISSP exam contents in our course:- 

  • Domain 1: Security and Risk Management
  • Domain 2: Asset Security
  • Domain 3: Security Architecture and Engineering
  • Domain 4: Communication and Network Security
  • Domain 5: Identity and Access Management (IAM)
  • Domain 6: Security Assessment and Testing
  • Domain 7: Security Operations
  • Domain 8: Software Development Security

Certified Cloud Security Professional (CCSP)

Certified Information System Security Professional (CISSP)

Certified Cloud Security Professional (CCSP)

Certified Cloud Security Professional CCSP

We cover CCSP exam contents in our course:- 

  • Domain 1. Cloud Concepts, Architecture and Design
  • Domain 2. Cloud Data Security
  • Domain 3. Cloud Platform & Infrastructure Security
  • Domain 4. Cloud Application Security
  • Domain 5. Cloud Security Operations
  • Domain 6. Legal, Risk and Compliance

Certified Ethical Hacker (CEH)

Certified Information System Security Professional (CISSP)

Certified Cloud Security Professional (CCSP)

Certified Ethical Hacker CEH

We cover CEH exam contents in our course:-

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT and OT Hacking
  • Cloud Computing
  • Cryptography

Copyright © 2021 UTI Cybersecurity, Cloud and IT Services - All Rights Reserved.

Powered by GoDaddy

  • Contact Us
  • Company Profile
  • Careers

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept