Project Management Information / Cyber Security
Cloud Security

Discover more about our extensive range of professional services. We constantly update this page, but if you still can’t find what you’re looking for, please feel free to get in touch with us – we will be more than happy to help.
  • Slide title

    Write your caption here
    Button
  • Slide title

    Write your caption here
    Button
  • Slide title

    Write your caption here
    Button
  • Slide title

    Write your caption here
    Button
  • Slide title

    Write your caption here
    Button
  • Slide title

    Write your caption here
    Button
  • Slide title

    Write your caption here
    Button
  • Slide title

    Write your caption here
    Button
  • Slide title

    Write your caption here
    Button
  • Slide title

    Write your caption here
    Button
  • Slide title

    Write your caption here
    Button
  • Slide title

    Write your caption here
    Button

Training and Consulting

  1. We regularly offer industry-relevant training programs and workshops. Our certified instructors have many years of experience in their specialist area and enjoy sharing their expert knowledge with their students.
  2. We always put our focus on our customers. We want you to find the product or service that perfectly suits your needs, which is why we offer comprehensive consulting services to help you make an informed decision.
  3. Our aim is that you are completely satisfied with our products and services. That’s why we not only provide professional advice before you order: We are also there to help you afterwards, serving as reliable support.
  4. Everything we do centers on providing services of the highest level of quality. We won’t stop until you’re 100% satisfied -that’s a guarantee.

Cyber Security Basics

  1. Attacks, Threats, and Vulnerabilities 
  2. Architecture and Design
  3. Implementation
  4. Operations and Incident Response 
  5. Governance, Risk, and Compliance
  6. Cryptography and PKI

Cyber Security Analyst

  1. Threat and Vulnerability Management 
  2. Software and Systems Security
  3. Security Operations and Monitoring 
  4. Incident Response
  5. Compliance and Assessment

Penetration Testing

  1. Planning and Scoping
  2. Information Gathering and Vulnerability Identification
  3. Attacks and Exploits
  4. Penetration Testing Tools
  5. Reporting and Communication

Project Management

  1. Project Basics
  2. Project Constraints
  3. Communication and Change Management 
  4. Project Tools and Documentation

Management Information Systems

  1. Digital Transformation
  2. Digital Marketing
  3. Biomedical Informatics
  4. Electronic Commerce
  5. Data Mining 
  6. Computer and Network Security
  7. Project Management
  8. Data Base Management
  9. System Analysis Design and Integration

Information Security Management

  1. Security and Risk Management
  2. Asset Security
  3. Security Engineering
  4. Communication and Network Security
  5. Identity and Access Management
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security

 Coding - Security and Machine Learning

  1. Python
  2. Java
  3. HTML, CSS
  4. PHP
  5. Web Development

Linux

  1. Hardware and System Configuration 
  2. Systems Operation and Maintenance 
  3. Security
  4. Linux Troubleshooting and Diagnostics 
  5. Automation and Scripting

 Cloud Computing

  1. Configuration and Deployment 
  2. Security
  3. Maintenance
  4. Management
  5. Troubleshooting
Share by: