ABAP Secure code

  14 hours

Advanced PHP and Secure Coding Course

  35 hours

BeyondCorp: Implementing Zero Trust Security

  14 hours

Biometric Forensic Foundation

  7 hours

Crypto Currencies and the Blockchain

  7 hours

Cyber Crisis & Communications Planning

  7 hours

Cyber Crime in Business

  7 hours

Certified Cloud Security Professional

  35 hours

Cloud Security Seminar

  7 hours

Capture the Flag (CTF)

  14 hours

Cyber Emergency Response Team (CERT)

  7 hours

Cybersecurity Fundamentals - A Practical Course

  14 hours

Cyber Security Body of Knowledge (CyBOK)

  35 hours

Cyber Resilience RESILIA Foundation

  14 hours

The Dark Web

  7 hours

Digital Investigations - Advanced

  21 hours

Digital Investigations - Introduction

  14 hours

Data Protection Practitioner

  14 hours

End User Security: Protecting Your Online Footprint

  14 hours

Ethical Hacker

  35 hours

Executive Cyber Security Awareness

  7 hours

Certified Lead Ethical Hacker

  35 hours

Understanding and Managing the Threat of Malware

  7 hours

MasterClass Certified Ethical Hacker Program

  28 hours

MITRE ATT&CK

  7 hours

Mobile Forensic Security

  7 hours

Operational Cloud Security

  14 hours

OpenStack Security

  14 hours

PCI-DSS Practitioner

  14 hours

PKI & TLS Security Implementation

  7 hours

Secure by Design

  7 hours

Social Engineering

  14 hours

Systems Security Certified Practitioner

  35 hours

Ubuntu Security

  14 hours

Understanding Modern Information Communication Technology

  7 hours

Automotive Cyber Security Fundamentals

  21 hours

Business Continuity Practitioner

  14 hours

CAS for Administrators

  7 hours

Certified Ethical Hacker

  35 hours

CompTIA Security+ | SY0-601 exam preparation (accredited training course)

  35 hours

Managing Cyber Risks in the Supply Chain

  7 hours

IoT Security Architecture

  14 hours

ISO 27002 Lead Manager

  35 hours

ISO/IEC 27001 Lead Implementer

  35 hours

NetNORAD

  7 hours

Network Security Administrator

  35 hours

Web Security with the OWASP Testing Framework

  28 hours

Business Continuity Management

  35 hours

Shadowsocks: Set Up a Proxy Server

  7 hours

Ann is very knowledgeable on the subject. She is constantly varying pace according to the feedback. There is a lot of room for discussing attendee's own experiences. It was a great joy !.

Sjoerd Hulzinga - KPN p/a Bloomville [IoT Security Architecture]

It was quite informal.

- Capita Business Services Ltd [Understanding Modern Information Communication Technology]

Trainer covered a lot of ground over a relatively short period.

- Capita Business Services Ltd [Understanding Modern Information Communication Technology]

I found it very interesting to learn all about what happens behind the scenes when it comes to IT systems. I also enjoyed learning about security and what hackers do as ethical hacking is an avenue I'm very keen in pursuing.

- Knowledge Pool/ DVLA [Understanding Modern Information Communication Technology]

Richard was very knowledgeable in his field.

- Knowledge Pool/ DVLA [Understanding Modern Information Communication Technology]

It was pitched at the right level - challenging but understandable & informative.

Louise Voisey - Capita Business Services Ltd [Understanding Modern Information Communication Technology]

Hacking

Mohalmald Salim - PSO [Ethical Hacker]

Level of expertise from the trainer Use case examples

Pierre Maillot - Bosch [IoT Security Architecture]

His deep knowledge of the IoT topic.

Bosch [IoT Security Architecture]

Ron's experience on how to successfully implement IoT projects and the deep technical subjects covered.

Bosch [IoT Security Architecture]

relevance of content to our I4.0 business environment

Bosch [IoT Security Architecture]

Very knowledgeable trainer, was able to adjust to audience knowledge, excellent industry experience and ability to relate to audience needs Excellent content preparation , tailored to needs discussed beforehand. Good supplement reading materials prepared by trainer

Oliver Steinig - Bosch [IoT Security Architecture]

Ron was very mindful of his audience and addressed everyone's questions. He checked his audience for clarity and was willing to spend the time to review a topic until everyone understood the topic. He gauged the audience for energy levels and suggested a break when he saw that the energy from the group was waning. This was much appreciated.

Bosch [IoT Security Architecture]

The pace of training delivery.

Ian McInally - KnowledgePool [Business Continuity Practitioner]

the exercises and group discussions.

KnowledgePool [Business Continuity Practitioner]

The trainer was very knowledgeable and was happy to go at the pace of the attendees. He was polite and respectful to all those in attendance. I felt I learnt a lot from the course as the trainer was very succinct in his delivery when going through the PP slides. A really good, worth while course from my personal point of view.

Julie Price - KnowledgePool [Business Continuity Practitioner]

The environment was really relaxed and open so everyone could ask questions or put across points of view or experience. David the trainer was a SME on the subject and his style was very good.

KnowledgePool [Business Continuity Practitioner]

Tutorials

ICAO [Web Security with the OWASP Testing Framework]

The example and exercise

ICAO [Web Security with the OWASP Testing Framework]

I got more information regarding the web applications' security issues, the different tools that could be used to cope with these issues, and more advice from the trainer to handle all these issues.

ICAO [Web Security with the OWASP Testing Framework]

the list of tools

ICAO [Web Security with the OWASP Testing Framework]

how it was broken into the technical and security mindset aspects.

ICAO [Web Security with the OWASP Testing Framework]

Excercises.

ICAO [Web Security with the OWASP Testing Framework]

he is very knowledgeable and comprehensive.

ICAO [Web Security with the OWASP Testing Framework]

Matthew was very knowledge and has lot experience to share with us. it was very pleasant, as he take the time to listen to us and answer to our questions. Thank you Matthew, it was awesome.

ICAO [Web Security with the OWASP Testing Framework]

The second day, scenarios exercises.

Christina Hutchings - KnowledgePool [Business Continuity Practitioner]

The real life examples Ron gave.

Bosch [IoT Security Architecture]

I liked the trainer's introduction and anecdotes to make the learning more real

KnowledgePool [Business Continuity Practitioner]

David's in depth knowledge. His relationship building skills with the audience. I really enjoyed the way he managed to make us (as a collective audience) enjoy the quite dry and uninteresing subject matter. He had anecdotes and knowledge of specific examples of security failings - hacker attacks - BCP 'breakdowns' etc which put flesh on the bones to the piece of legislation or 'best practice' for BCP that he was trying to teach us about. A really engaging, down to earth and personable man: A very good listener and a fabulous, charismatic trainer.

Cris Bollin - KnowledgePool [Business Continuity Practitioner]

All is excellent

Manar Abu Talib - Dubai Electronic Security Center [MITRE ATT&CK]

- Understanding that ATT&CK creates a map that makes it easy to see, where an organization is protected and where the vulnerable areas are. Then to identify the security gaps that are most significant from a risk perspective. - Learn that each technique comes with a list of mitigations and detections that incident response teams can employ to detect and defend. - Learn about the various sources and communities for deriving Defensive Recommendations.

CHU YAN LEE - PacificLight Power Pte Ltd [MITRE ATT&CK]

He took his time to make sure everyone understood and were on the same wave length

Tina Hopkins - Capita Business Services Ltd [Understanding Modern Information Communication Technology]

I found the training too in depth for IT beginners. There was too many high level subjects that i felt were too advanced for a beginner level.

Capita Business Services Ltd [Understanding Modern Information Communication Technology]





Other regions in the UAE