View as Grid List

5 Items

Set Descending Direction
Blended Learning

Certified Ethical Hacker

  • Difficulty: Advanced
  • Type: Blended Learning
  • Course Information

What happens when the security of your information systems is vulnerable and being compromised? The best way to deal with on-going security threats in IT is to learn to hack. That’s right! This Certified Ethical Hacker cyber security training program is designed to help candidates learn better ways to deal with security breaches and to ensure a secure environment for the organization.

Blended Learning

Computer Hacking Forensic Investigator

  • Difficulty: Beginner
  • Type: Blended Learning
  • Course Information

Digital forensics is a key component in Cyber Security. Many people hear the term forensics, or computer forensics, or digital forensics and instantly think, that’s just for law enforcement, but the truth is, digital forensics has a key place on every cyber security team. In fact, without it, chances are your organizations Security posture and maturity will fail to see its full potential

Blended Learning

Certified SOC Analyst

  • Difficulty: Intermediate
  • Type: Blended Learning
  • Course Information

Certified SOC Analyst (CSA) is a comprehensive course that focuses on security operations center (SOC) operations and management, providing individuals with a strong foundation in monitoring, incident detection and response, security infrastructure maintenance, and other essential skills needed to effectively safeguard an organization's network and systems.

Blended Learning

Certified Chief Information Security Officer

  • Difficulty: Intermediate
  • Type: Blended Learning
  • Course Information

The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives.

Blended Learning

EC-Council Certified Incident Handler

  • Difficulty: Intermediate
  • Type: Blended Learning
  • Course Information

This course focuses on training professionals in effective incident handling and response techniques to mitigate cybersecurity threats. It covers incident detection, containment, mitigation, and recovery strategies, providing a strong foundation in incident response techniques and best practices through a combination of theoretical concepts and practical exercises.

per page
Filter By
Hit button to validate captcha