Security Training

Certified Information Security Manager (CISM)

We cover CISM exam contents in our course:-
• Information Security Governance
• Information Risk Management
• Information Security Program Management and Development
• Information Security Incident Management

Certified Information Systems Auditor (CISA)

We cover CISA exam contents in our course:-
• Information Systems Auditing Process
• Governance and Management of IT
• Information System Acquisition, Development and Implementation
• Information Systems Operations and Business Resilience
• Protection of Information Assets

ISO 27001 Lead Auditor

This five-day intensive course enables the participants to develop the expertise needed to audit an Information Security Management System (ISMS), and manage a team of auditors by applying widely recognized audit principles, procedures and techniques. During this training, the participants will acquire the knowledge and skills needed to proficiently plan and perform internal and external audits in compliance with certification process of the ISO 27001 standard. Based on practical exercises, the participants will develop the skills (mastering audit techniques) and competencies (managing audit teams and audit program, communicating with customers, conflict resolution, etc.) necessary to conduct an audit efficiently.

Certified Information System Security Professional (CISSP)

We cover CISSP exam contents in our course:- • Domain 1: Security and Risk Management • Domain 2: Asset Security • Domain 3: Security Architecture and Engineering • Domain 4: Communication and Network Security • Domain 5: Identity and Access Management (IAM) • Domain 6: Security Assessment and Testing • Domain 7: Security Operations • Domain 8: Software Development Security

Certified Cloud Security Professional (CCSP)

We cover CCSP exam contents in our course:-
• Domain 1. Cloud Concepts, Architecture and Design
• Domain 2. Cloud Data Security
• Domain 3. Cloud Platform & Infrastructure Security
• Domain 4. Cloud Application Security
• Domain 5. Cloud Security Operations
• Domain 6. Legal, Risk and Compliance

Certified Ethical Hacker (CEH)

We cover CEH exam contents in our course:-
• Introduction to Ethical Hacking
• Footprinting and Reconnaissance
• Scanning Networks
• Enumeration
• Vulnerability Analysis
• System Hacking
• Malware Threats
• Sniffing
• Social Engineering
• Denial-of-Service
• Session Hijacking
• Evading IDS, Firewalls, and Honeypots
• Hacking Web Servers
• Hacking Web Applications
• SQL Injection
• Hacking Wireless Networks
• Hacking Mobile Platforms
• IoT and OT Hacking
• Cloud Computing
• Cryptography