BeyondCorp: Implementing Zero Trust Security

  14 hours

Certified Lead Ethical Hacker

  35 hours

Advanced PHP and Secure Coding Course

  35 hours

Ubuntu Security

  14 hours

Ethical Hacker

  35 hours

Understanding Modern Information Communication Technology

  7 hours

Cyber Crisis & Communications Planning

  7 hours

Operational Cloud Security

  14 hours

Cloud Security Seminar

  7 hours

Cyber Resilience RESILIA Foundation

  14 hours

Systems Security Certified Practitioner

  35 hours

Executive Cyber Security Awareness

  7 hours

PKI & TLS Security Implementation

  7 hours

Secure by Design

  7 hours

Data Protection Practitioner

  14 hours

PCI-DSS Practitioner

  14 hours

Cyber Emergency Response Team (CERT)

  7 hours

The Dark Web

  7 hours

Crypto Currencies and the Blockchain

  7 hours

End User Security: Protecting Your Online Footprint

  14 hours

Cyber Crime in Business

  7 hours

Mobile Forensic Security

  7 hours

Biometric Forensic Foundation

  7 hours

Digital Investigations - Introduction

  14 hours

Digital Investigations - Advanced

  21 hours

Capture the Flag (CTF)

  14 hours

MITRE ATT&CK

  7 hours

Social Engineering

  14 hours

Lead SCADA Security Manager

  35 hours

MasterClass Certified Ethical Hacker Program

  28 hours

Understanding and Managing the Threat of Malware

  7 hours

Certified Cloud Security Professional

  35 hours

ABAP Secure code

  14 hours

Cyber Security Awareness Training

  7 hours

Cybersecurity Fundamentals - A Practical Course

  14 hours

Cyber Security Body of Knowledge (CyBOK)

  35 hours

Governance, Risk Management & Compliance (GRC) Fundamentals

  21 hours

COBIT 2019 Foundation

  21 hours

Compliance and the Management of Compliance Risk

  21 hours

AML OFFICER MASTERCLASS

  21 hours

HiTrust Common Security Framework Compliance

  14 hours

Basel III – Certified Basel Professional

  21 hours

CGEIT – Certified in the Governance of Enterprise IT

  28 hours

Compliance for Payment Services in Japan

  7 hours

Welcome to the Boardroom!

  7 hours

Secrets of Boardroom Leadership

  7 hours

Certified Information System Security Professional (CISSP) CBK Review

  35 hours

CISSP - Certified Information Systems Security Professional

  35 hours

Information Systems Auditor

  35 hours

Fundamentals of Information Systems Security

  21 hours

CISA - Certified Information Systems Auditor - Exam Preparation

  28 hours

CISMP - Certificate in Information Security Management Principles

  21 hours

Public Key Infrastructure

  21 hours

Network Penetration Testing

  35 hours

CISM - Certified Information Security Manager

  28 hours

Cybersecurity Fundamentals

  28 hours

Computer Room Security and Maintenance

  14 hours

Security Policy Management

  35 hours

Open Authentication (OAuth)

  7 hours

Honeywell Security System

  14 hours

CISA - Certified Information Systems Auditor

  28 hours

Building up information security according to ISO 27005

  21 hours

Open Data Risk Analysis and Management

  21 hours

Business Continuity Management

  35 hours

Snyk

  14 hours

Introduction to ISO27001

  7 hours

ISO/IEC 27005 Introduction

  7 hours

ISO/IEC 27005 Foundation

  14 hours

ISO/IEC 27005 Risk Manager

  21 hours

ISO/IEC 27005 Lead Risk Manager

  35 hours

ISO/IEC 27035 Introduction

  7 hours

ISO/IEC 27035 Foundation

  14 hours

ISO/IEC 27035 Lead Incident Manager

  35 hours

Digital Identity for Telecom

  21 hours

BCS Foundation Certificate in Information Security Management Principles (CISMP) 4 day

  28 hours

BCS Foundation Certificate in Information Security Management Principles (CISMP)

  21 hours

BCS Practitioner Certificate in Information Assurance Architecture (CIAA)

  35 hours

BCS Practitioner Certificate in Business Continuity Management

  21 hours

BCS Practitioner Certificate in Information Risk Management (CIRM)

  35 hours

SC-200T00: Microsoft Security Operations Analyst

  28 hours

Network Security Administrator

  35 hours

NetNORAD

  7 hours

Standard Java Security

  14 hours

Java and Web Application Security

  21 hours

Advanced Java Security

  21 hours

Advanced Java, JEE and Web Application Security

  28 hours

Combined C/C++, JAVA and Web Application Security

  28 hours

Combined JAVA, PHP and Web Application Security

  28 hours

Apache Shiro: Securing Your Java Application

  7 hours

Secure Developer Java (Inc OWASP)

  21 hours

Secure coding in PHP

  21 hours

Web Security with the OWASP Testing Framework

  28 hours

Shadowsocks: Set Up a Proxy Server

  7 hours

HIPAA Compliance for Developers

  7 hours

OpenStack Security

  14 hours

CAS for Administrators

  7 hours

IoT Security Architecture

  14 hours

Business Continuity Practitioner

  14 hours

Automotive Cyber Security Fundamentals

  21 hours

Certified Ethical Hacker

  35 hours

Managing Cyber Risks in the Supply Chain

  7 hours

CompTIA Security+ | SY0-601 exam preparation (accredited training course with exam)

  35 hours

CompTIA Cybersecurity Analyst+ (CySA+) | CS0-002 exam preparation (accredited training course with exam)

  35 hours

CompTIA Pentest+ | PT0-002 egzam preparation (accredited training course with exam)

  35 hours

Securing Windows Server 2016 (authorized training course MS 20744)

  35 hours

NB-IoT for Developers

  7 hours

PKI: Implement and Manage

  21 hours

CHFI - Certified Digital Forensics Examiner

  35 hours

WEBAP - Web Application Security

  28 hours

Security Analyst

  35 hours

Ethical Hacking and Countermeasures

  35 hours

Securing Windows Using PowerShell Automation

  42 hours

Certificate of Cloud Security Knowledge

  14 hours

Cloud Computing Security Knowledge (CCSK) Preparation Course

  21 hours

Certificate of Cloud Security Knowledge (CCSK) Foundation (CSA authorized)

  14 hours

Certificate of Cloud Security Knowledge (CCSK) Plus (CSA authorized)

  21 hours

CRISC - Certified in Risk and Information Systems Control

  21 hours

Fundamentals of Corporate Cyber Warfare

  14 hours

IBM Qradar SIEM: Beginner to Advanced

  14 hours

Open Source Cyber Intelligence - Introduction

  7 hours

Open Source Intelligence (OSINT) Advanced

  21 hours

I liked the in-depth knowledge about the subject of the trainer, good explanation, highlighting important things!.

Andreas Rhein [Certified Information System Security Professional (CISSP) CBK Review]

I really liked the Crypto part

Carlos Ibarra [Avanzado Java, JEE y Seguridad de Aplicaciones Web]

I genuinely enjoyed the real examples of the trainer.

Joana Gomes [Compliance and the Management of Compliance Risk]

I genuinely was benefit from the communication skills of the trainer.

Flavio Guerrieri [CISM - Certified Information Security Manager]

I liked the trainer was passionate about the subject and very convincing too.

Diana Vladulescu [Secure Web Application Development and Testing]

Really liked the trainer's deep knowledge, real examples, the fact that he is also a practitioner.

18 Wojskowy Oddział Gospodarczy [CRISC - Certified in Risk and Information Systems Control]

I mostly liked the knowledge,.

18 Wojskowy Oddział Gospodarczy [CRISC - Certified in Risk and Information Systems Control]

I mostly was benefit from the hands-on examples.

Trading Point of Financial Instruments (XM [Secure coding in PHP]

The subject of the course was very interesting and gave us many ideas.

Anastasios Manios [Secure coding in PHP]

I generally enjoyed the interaction.

Andreas Hadjidemetris [Secure coding in PHP]

Most of the known subjects related with secure coding covered and explained well Nice presentations Easy to watch, not boring.

Trading Point of Financial Instruments (XM [Secure coding in PHP]

The way and its approach on each different section.

Trading Point of Financial Instruments (XM [Secure coding in PHP]

The trainer has very good communication skills and can easily get & hold audience's attention. He can explain the matter in a very easy and detailed way so that each person can understand it.

Trading Point of Financial Instruments (XM [Secure coding in PHP]

All topics were well covered and presented with a lot of examples. Ahmed was very efficient and managed to keep us focused and attracted at all times.

Kostas Bastas [Secure coding in PHP]

Everything! I didn't have any experience with Secure Coding and the whole training was interesting and helpful.

Trading Point of Financial Instruments (XM [Secure coding in PHP]

I genuinely enjoyed the real life examples.

Marios Prokopiou [Secure coding in PHP]

I loved the delivery from the trainer's side. Very enthusiastic and made the training really pleasant and interesting. Also, very clear about the content he was delivering.

Trading Point of Financial Instruments (XM [Secure coding in PHP]

I genuinely liked the real world scenarios.

Michail Alvanos [Java and Web Application Security]

I genuinely liked the organization.

Panagiotis Foutros [Java and Web Application Security]

Very good knowledge and character.

Constantinos Michael [Java and Web Application Security]

I was benefit from the exercises (SQL injection, XSS, CRSF. .).

David Lemoine - Statistical Solutions [.NET, C# and ASP.NET Security Development]

I liked the blend of theory/fundamentals/principles and activity/interactive-web-apps. Excellent mix.

Statistical Solutions [.NET, C# and ASP.NET Security Development]

Good pacing, by switching between lectures and activities the trainer was able to hold my attention, good variety of topics covered, trainer was very knowledgeable and able to adapt the subject matter to what was required.

Statistical Solutions [.NET, C# and ASP.NET Security Development]

I genuinely was benefit from the knowledge.

Luis Miguel Lara - Blue Indico Investments, S.L.U. [CCSK - Certificate of Cloud Security Knowledge - Plus]

The way in which he explained to us during the 2 days and his way of being, which makes learning enjoyable.

Víctor Miguel Prado Saster - Blue Indico Investments, S.L.U. [CCSK - Certificate of Cloud Security Knowledge - Plus]

I really liked the teacher's knowledge.

Ariany Auxiliadora Pulido Gonzalez - Blue Indico Investments, S.L.U. [CCSK - Certificate of Cloud Security Knowledge - Plus]

The trainer was very nice and available. I appreciated his knowledge, skills and preparation about the subject. Furthermore, he provided us extra content about IoT, very interesting.

Giuseppe Fiorita - Blue Indico Investments, S.L.U. [CCSK - Certificate of Cloud Security Knowledge - Plus]

Ahmed was always trying to keep attention of us.

Alberto Brezmes - Blue Indico Investments, S.L.U. [CCSK - Certificate of Cloud Security Knowledge - Plus]

I enjoyed the trainer methods to attract our attention.

Antonio Osuna Sánchez - Blue Indico Investments, S.L.U. [CCSK - Certificate of Cloud Security Knowledge - Plus]

Interactive demos

Juan Pablo Camps Gonzalez - Banco de Credito e Inversiones [(CCSK) Certificado de Conocimiento de Seguridad de la Nube - Plus]

Trainers command in his field

Adnan ul Husnain Hashmi - TDM GROUP [Web Application Security]

The hands-on labs were excellent.

Dr. Farhan Hassan Khan - TDM GROUP [Web Application Security]

The examples of real cases.

Jorge De la Cruz - BEEVA TEC OPERADORA S.A. de C.V. [(CCSK) Certificado de Conocimiento de Seguridad de la Nube - Plus]

The dynamics

Felipe Juarez Ramirez - BEEVA TEC OPERADORA S.A. de C.V. [(CCSK) Certificado de Conocimiento de Seguridad de la Nube - Plus]

The way to take the course because it lent itself to something tedious but he knew how to develop it in a good way

Williams Feliciano Dominguez Aries - BEEVA TEC OPERADORA S.A. de C.V. [(CCSK) Certificado de Conocimiento de Seguridad de la Nube - Plus]

The trainer always ensured me fully understand what he had taught and do not hesitate to repeat again if I am still not clear about it. He is committed to preparing more samples to show me to answer the extra questions from me.

Kenny, Jiun Ming Wee [PKI: Implement and Manage]

The instructor prepared the material for his course.

- Instituto nacional de astrofísica, óptica y electrónica [Microsoft SDL Core]

Very knowledgeable and approachable trainer.

- Trainocate (S) Pte. Ltd. [PKI: Implement and Manage]

Information about the cold boot attack and how to protect against this attack.

Marcin Piliszczuk - Diebold Nixdorf [Application Security in the Cloud]

Loose way of driving

  [NB-IoT for Developers]

Dynamic; exactly the right level of info.

- ZiuZ Medical B.V. [HIPAA Compliance for Developers]

Ann is very knowledgeable on the subject. She is constantly varying pace according to the feedback. There is a lot of room for discussing attendee's own experiences. It was a great joy !.

Sjoerd Hulzinga - KPN p/a Bloomville [IoT Security Architecture]

clear voice of the trainer.

- ZiuZ Medical B.V. [HIPAA Compliance for Developers]

The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.

Marco van den Berg - ZiuZ Medical B.V. [HIPAA Compliance for Developers]

It was quite informal.

- Capita Business Services Ltd [Understanding Modern Information Communication Technology]

Trainer covered a lot of ground over a relatively short period.

- Capita Business Services Ltd [Understanding Modern Information Communication Technology]

I enjoyed the practical exercises. Hands-on is the best way to learn.

- W L Gore & Associates (UK) Ltd [PKI: Implement and Manage]

I found it very interesting to learn all about what happens behind the scenes when it comes to IT systems. I also enjoyed learning about security and what hackers do as ethical hacking is an avenue I'm very keen in pursuing.

- Knowledge Pool/ DVLA [Understanding Modern Information Communication Technology]

Richard was very knowledgeable in his field.

- Knowledge Pool/ DVLA [Understanding Modern Information Communication Technology]

The practical exercises

- Corvil [C/C++ Secure Coding]

The hands-on approach to explain the concepts.

- Corvil [C/C++ Secure Coding]

It was pitched at the right level - challenging but understandable & informative.

Louise Voisey - Capita Business Services Ltd [Understanding Modern Information Communication Technology]

Exercise and be able to experiment.

- Corvil [C/C++ Secure Coding]

Also provided a lot of curiously related interesting in some way with the subject

- EduBroker Sp. z o.o. [Embedded Systems Security]

Security models, discussion of good programming practices, various types of attacks.

Piotr Piątek - EduBroker Sp. z o.o. [Embedded Systems Security]

The trainer was extremely clear and concise. Very easy to understand and absorb the information.

Paul Clancy - Rowan Dartington [CGEIT – Certified in the Governance of Enterprise IT]

a lot of good documents provided. It helps us building up our knowledge.

- MOL Information Technology Asia Ltd. [CGEIT – Certified in the Governance of Enterprise IT]

The delivery

- Department for Communities [CISMP - Certificate in Information Security Management Principles]

Depth and breadth of the course. Trainer was excellent also.

- Department for Communities [CISMP - Certificate in Information Security Management Principles]

Examples provided

- Department for Communities [CISMP - Certificate in Information Security Management Principles]

The OWASP overview, especially slides with the specific examples of attacks. OWASP Zap tool.

- Corvil [Secure Developer Java (Inc OWASP)]

I saw some security risk being easier to use than I expected It helped us to find some security holes in our Product

- Corvil [Secure Developer Java (Inc OWASP)]

TRW Polska sp. z o.o. []

BBVA Next Technologies S.L.U. []

BBVA Next Technologies S.L.U. []

BBVA Next Technologies S.L.U. []

Hacking

Mohalmald Salim - PSO [Ethical Hacker]

Concise

  [CCSK - Certificate of Cloud Security Knowledge - Plus]

Level of expertise from the trainer Use case examples

Pierre Maillot - Bosch [IoT Security Architecture]

His deep knowledge of the IoT topic.

Bosch [IoT Security Architecture]

Ron's experience on how to successfully implement IoT projects and the deep technical subjects covered.

Bosch [IoT Security Architecture]

relevance of content to our I4.0 business environment

Bosch [IoT Security Architecture]

Very knowledgeable trainer, was able to adjust to audience knowledge, excellent industry experience and ability to relate to audience needs Excellent content preparation , tailored to needs discussed beforehand. Good supplement reading materials prepared by trainer

Oliver Steinig - Bosch [IoT Security Architecture]

Ron was very mindful of his audience and addressed everyone's questions. He checked his audience for clarity and was willing to spend the time to review a topic until everyone understood the topic. He gauged the audience for energy levels and suggested a break when he saw that the energy from the group was waning. This was much appreciated.

Bosch [IoT Security Architecture]

The pace of training delivery.

Ian McInally - KnowledgePool [Business Continuity Practitioner]

the exercises and group discussions.

KnowledgePool [Business Continuity Practitioner]

The trainer was very knowledgeable and was happy to go at the pace of the attendees. He was polite and respectful to all those in attendance. I felt I learnt a lot from the course as the trainer was very succinct in his delivery when going through the PP slides. A really good, worth while course from my personal point of view.

Julie Price - KnowledgePool [Business Continuity Practitioner]

The environment was really relaxed and open so everyone could ask questions or put across points of view or experience. David the trainer was a SME on the subject and his style was very good.

KnowledgePool [Business Continuity Practitioner]

Tutorials

ICAO [Web Security with the OWASP Testing Framework]

The example and exercise

ICAO [Web Security with the OWASP Testing Framework]

I got more information regarding the web applications' security issues, the different tools that could be used to cope with these issues, and more advice from the trainer to handle all these issues.

ICAO [Web Security with the OWASP Testing Framework]

the list of tools

ICAO [Web Security with the OWASP Testing Framework]

how it was broken into the technical and security mindset aspects.

ICAO [Web Security with the OWASP Testing Framework]

Excercises.

ICAO [Web Security with the OWASP Testing Framework]

he is very knowledgeable and comprehensive.

ICAO [Web Security with the OWASP Testing Framework]

Matthew was very knowledge and has lot experience to share with us. it was very pleasant, as he take the time to listen to us and answer to our questions. Thank you Matthew, it was awesome.

ICAO [Web Security with the OWASP Testing Framework]

The second day, scenarios exercises.

Christina Hutchings - KnowledgePool [Business Continuity Practitioner]

The real life examples Ron gave.

Bosch [IoT Security Architecture]

I liked the trainer's introduction and anecdotes to make the learning more real

KnowledgePool [Business Continuity Practitioner]

David's in depth knowledge. His relationship building skills with the audience. I really enjoyed the way he managed to make us (as a collective audience) enjoy the quite dry and uninteresing subject matter. He had anecdotes and knowledge of specific examples of security failings - hacker attacks - BCP 'breakdowns' etc which put flesh on the bones to the piece of legislation or 'best practice' for BCP that he was trying to teach us about. A really engaging, down to earth and personable man: A very good listener and a fabulous, charismatic trainer.

Cris Bollin - KnowledgePool [Business Continuity Practitioner]

Trainer's vast knowledge

FUJITSU TECHNOLOGY SOLUTIONS SP. Z O.O. [CISMP - Certificate in Information Security Management Principles]

Subject content and instructor

Jas Paul Farmahan - Capita Business Services Ltd [ISO27001: 2013 Lead Auditor (certification course)]

All is excellent

Manar Abu Talib - Dubai Electronic Security Center [MITRE ATT&CK]

卢 永辉 - 上海腾程医学科技信息有限公司 []

Lynn Shen - 上海腾程医学科技信息有限公司 []

胡 志江 - 上海腾程医学科技信息有限公司 []

郭 国 - 上海腾程医学科技信息有限公司 []

上海腾程医学科技信息有限公司 []

上海腾程医学科技信息有限公司 []

上海腾程医学科技信息有限公司 []

Loose way of driving

  [NB-IoT for Developers]

Concise

  [CCSK - Certificate of Cloud Security Knowledge - Plus]





Other regions in Slovakia