We have published the very first books on Cisco and Wireless penetration testing which were translated into five different languages, and continue to author books and present on latest security information matters at industry conferences, exhibitions, and other public events. Our pivotal work entitled "Assessing Information Security. Strategies. Tactics. Logic and Framework" has already undergone two editions, with the second edition released in 2015.
Security training courses we offer are carefully designed to provide practical hands-on skills that will allow the attendee to become quickly proficient at protecting data and systems. We have developed several “packaged” main specialist courses, but custom training courses can be designed as well to suit your requirements.
This course is designed to both counter real world security risks associated with modern malware infections and common hacking attempts (including phishing and other social engineering attacks), and to meet compliance demands on staff security awareness training.
It fills the gap that no technical controls can close, and is best undertaken after social engineering security assessment has been performed. In such a case, the course will be tailored to address risks specific for your business.
Than this course is for you. Our experts can train your technical team to perform a variety of hands-on security tests of systems, applications and (wired and wireless) networks using methodologies real world hackers employ. Upon completion of this course, your techs would also be able to thoroughly analyse the tests outcome, gauge actual risks, prioritise them, suggest appropriate countermeasures, and compile down-to-earth security assessment reports understandable by the management.
Heavily based upon our recent "Assessing Information Security. Strategies. Tactics. Logic and Framework" book, this course will resolve all governance troubles related to information security auditing and security risk management. You will learn how to select an internal auditing team (or chose the most appropriate third party), interact with it, make sense of the security assessment outcome, and react to it in a most effective way without overspending your resources.