Our trainings contain advanced and continuously evolving technical materials, delivered by domain experts with extensive practical experience, aimed to quickly bring your knowledge and skills up-to-date with the latest security attack and defense techniques.
We regularly conduct annual public training event, in-house training as part of a larger project, or on-demand training based on specific request. Please contact us if you need more information on any of our available courses below.
This 3-days course will educate participants the do's and don't of secure application development. Aimed specifically at web-based applications, the material and techniques described in this course are also applicable to non web-based applications. The course aims to be language-agnostic, and teaches principles, best practices, and security awareness aspects, that are necessary to produce and maintain secure web applications.
4-Day Course. The course will combine interactive classroom instruction, demonstrations and hand on lab activities. The objective of this course is to level the playing field between security professionals and the most competent cyber criminals and terrorists. These highly controversial skills and knowledge are offered to ensure that IT and security professionals have equivalent and better knowledge than the adversaries they face. This is coupled with professional training for conducting vulnerability assessments and penetration tests.
The Advanced Penetration Testing course is based on the Offensive Operations Model, which describes the process taken by the most professional criminals and cyber terrorists to compromise and exploit any type of network environment.
The Advanced Penetration Testing course will include the following sections:
The course is designed to bring to industry professionals the knowledge and techniques used by professional hackers and criminals to penetrate and compromise the integrity of corporate networks. This is coupled with a comprehensive methodology for conducting Vulnerability Assessments and Penetration Tests
This 5-days course attendees with the basic knowledge and skill necessary to begin a computer-based investigation using practical case scenarios and will be guided through the process of conducting a computer forensics investigation, and will learn the principles surrounding computer forensic methodologies, together with the open-source forensic tools associated with forensic analysis that are applicable to the real case.
This 4-days course will educate participants to enhance knowledge in security analysis and monitoring to identify known and emerging threats to critical infrastructure. The course also prepare the security analyst to respond, handle, and mitigate the security threats. Security monitoring helps the organization to reduce the overall security and business risk.
Security threat is evolving rapidly and each new technology represents a new avenue of attack. As threats become more sophisticated, improvement of knowledge is a must for security analyst identify, analyze, and respond quickly to the treats.
This course will help you to analyzes your server logs in real time to identify and alert you to compliance-relevant events.
Incident response is a key component of an enterprise business continuity program. Security threats have become not only more numerous and diverse but also more damaging and disruptive. Incident handling and response capability is very important for rapidly detecting incidents, minimizing loss and destruction, mitigating the security risk, and restoring computing services.
This 5-days course is designed to help Incident Handlers, CERT teams, and any Information Security Analysts to understand how to plan, create and utilize their systems for detecting and responding to current and emerging computer security threats and attacks that are targeted at a variety of operating systems and architectures.
This course is also provides a basic introduction to the main incident handling tasks and critical thinking skills that will help an incident handler perform their daily work. Course attendees will learn how to how to build an incident respond policy and procedure, how to gather the information required to handle an incident, a deep understanding in technical skills to address a security incident, how to handle and respond to various types of malicious activity or compromise system, and how to deal with aincident response report.
This 5-days course teaches how to begin wireless communication hacking specifically on 802.11 and GSM. The course will combine interactive classroom instruction, demonstrations, and hands on lab activities. We will provide labs that based on real world scenario and all required hardware tools necessary for the course will be provided.
© 2010 - 2021 PT Noosc Global. ALL Rights Reserved. Privacy Policy | Terms of Service