
The path to long-lasting sustainable top individual and business results is gained through the continuous development of competencies.
Trainings by our experienced lecturers will enable you to develop your individual, team and organizational competencies to improve the knowledge and skills of your employees and/ or partners of your organization and enable them to achieve their full potential in the best way possible.
Training Portfolio
Our training portfolio has been developed to monitor the areas that are also the subject of our consulting services in the projects of establishing and implementing appropriate management systems and other solutions, which enables us to approach the training in view of current developments in the field of realistic implementation of standards.
It includes the following general areas:
Training for ISO/IEC standards relate to the following standards:
- ISO/IEC 27001
- ISO 22301
- ISO/IEC 27005
- ISO/IEC 20000-1
- ISO 31000
Depending on your needs, our trainings are adapted to different levels, which enable you to gradually and in the best way possible achieve the necessary competencies:
- GDPR Basics
- Implementator
- DPO- Data Protection Officer
Training courses and workshops will help you understand the PCI DSS scheme and its objectives. During course, our consultants will transfer their knowledge and expertise over to your team. Our practical workshops provide comprehensive and practical coverage of all aspects of implementing the PCI DSS in your environment and answer technical/business questions, offering industry-accepted practices or examples according to your requirements.
When to choose penetration test training?
If you want to gain penetration testing competencies of:
internal systems (including testing servers, workstations, network devices, mainframes, ATMs and ERP environments, etc.)
external systems (including testing all publicly available services with or without restrictions)
web applications and services (including testing all types of web applications and services according to the OWASP methodology)
desktop applications and service (including testing all types of desktop applications and services according to the WASC methodology and NIST recommendations)
mobile applications and services (including testing all types of mobile applications and services according to WASC methodology and NIST recommendations and reverse engineering issues)
wireless systems (including testing WiFi, Bluetooth and GSM wireless networks through the use of internally developed devices and applications)
human resources (including direct or indirect testing and the problems of PHISHING, SCAREWARE and HOAX)
Who is the training intended for?
Penetration testing training is aimed at:
• IT professionals whose scope of work includes penetration testing
• All other persons who, due to career guidance or other reasons, want to acquire competence in penetration testing