Certified Lead Ethical Hacker
Ubuntu Security
Ethical Hacker
Formation Cybersécurité et BPM
Operational Cloud Security
Cloud Security Seminar
Cyber Resilience RESILIA Foundation
Secure by Design
Data Protection Practitioner
PCI-DSS Practitioner
The Dark Web
Cyber Crime in Business
Mobile Forensic Security
Biometric Forensic Foundation
Digital Investigations - Advanced
Capture the Flag (CTF)
MITRE ATT&CK
Social Engineering
Lead SCADA Security Manager
ABAP Secure code
Malware Analysis (PCAP)
Certified Ethical Hacker
Incident Response
Threat Hunting
COBIT 2019 Foundation
AML OFFICER MASTERCLASS
Welcome to the Boardroom!
Secrets of Boardroom Leadership
Information Systems Auditor
Public Key Infrastructure
Network Penetration Testing
Cybersecurity Fundamentals
Security Policy Management
Open Authentication (OAuth)
Honeywell Security System
Security Management
Business Continuity Management
Snyk
Introduction to ISO27001
ISO/IEC 27005 Introduction
ISO/IEC 27005 Foundation
ISO/IEC 27005 Risk Manager
ISO/IEC 27005 Lead Risk Manager
ISO/IEC 27035 Introduction
ISO/IEC 27035 Foundation
ISO/IEC 27035 Lead Incident Manager
ISO/IEC 27701 Foundation
ISO/IEC 27701 Lead Implementer
ISO/IEC 27701 Lead Auditor
ISO/IEC 27001 Foundation
ISO/IEC 27002 Introduction
ISO/IEC 27001 Lead Auditor
ISO 27002 Lead Manager
ISO 27799 Foundation
ISO 27799 Lead Manager
ISO/IEC 27001 Lead Implementer
Digital Identity for Telecom
Network Security Administrator
NetNORAD
Standard Java Security
Java and Web Application Security
Advanced Java Security
Secure Developer Java (Inc OWASP)
Secure coding in PHP
C/C++ Secure Coding
Node.JS and Web Application Security
Embedded Systems Security
Secure Developer .NET (Inc OWASP)
Microsoft SDL Core
Web Application Security
Security Testing
Android Security
Application Security in the Cloud
The Secure Coding Landscape
How to Write Secure Code
Application Security for Developers
HIPAA Compliance for Developers
OpenStack Security
CAS for Administrators
IoT Security Architecture
Business Continuity Practitioner
NB-IoT for Developers
PKI: Implement and Manage
WEBAP - Web Application Security
Security Analyst
Ethical Hacking and Countermeasures
I liked the in-depth knowledge about the subject of the trainer, good explanation, highlighting important things!.
Andreas Rhein [Certified Information System Security Professional (CISSP) CBK Review]I really liked the Crypto part
Carlos Ibarra [Avanzado Java, JEE y Seguridad de Aplicaciones Web]I genuinely enjoyed the real examples of the trainer.
Joana Gomes [Compliance and the Management of Compliance Risk]I genuinely was benefit from the communication skills of the trainer.
Flavio Guerrieri [CISM - Certified Information Security Manager]I liked the trainer was passionate about the subject and very convincing too.
Diana Vladulescu [Secure Web Application Development and Testing]Really liked the trainer's deep knowledge, real examples, the fact that he is also a practitioner.
18 Wojskowy Oddział Gospodarczy [CRISC - Certified in Risk and Information Systems Control]I mostly liked the knowledge,.
18 Wojskowy Oddział Gospodarczy [CRISC - Certified in Risk and Information Systems Control]I mostly was benefit from the hands-on examples.
Trading Point of Financial Instruments (XM [Secure coding in PHP]The subject of the course was very interesting and gave us many ideas.
Anastasios Manios [Secure coding in PHP]I generally enjoyed the interaction.
Andreas Hadjidemetris [Secure coding in PHP]Most of the known subjects related with secure coding covered and explained well Nice presentations Easy to watch, not boring.
Trading Point of Financial Instruments (XM [Secure coding in PHP]The way and its approach on each different section.
Trading Point of Financial Instruments (XM [Secure coding in PHP]The trainer has very good communication skills and can easily get & hold audience's attention. He can explain the matter in a very easy and detailed way so that each person can understand it.
Trading Point of Financial Instruments (XM [Secure coding in PHP]All topics were well covered and presented with a lot of examples. Ahmed was very efficient and managed to keep us focused and attracted at all times.
Kostas Bastas [Secure coding in PHP]Everything! I didn't have any experience with Secure Coding and the whole training was interesting and helpful.
Trading Point of Financial Instruments (XM [Secure coding in PHP]I genuinely enjoyed the real life examples.
Marios Prokopiou [Secure coding in PHP]I loved the delivery from the trainer's side. Very enthusiastic and made the training really pleasant and interesting. Also, very clear about the content he was delivering.
Trading Point of Financial Instruments (XM [Secure coding in PHP]I genuinely liked the real world scenarios.
Michail Alvanos [Java and Web Application Security]I genuinely liked the organization.
Panagiotis Foutros [Java and Web Application Security]Very good knowledge and character.
Constantinos Michael [Java and Web Application Security]I was benefit from the exercises (SQL injection, XSS, CRSF. .).
David Lemoine - Statistical Solutions [.NET, C# and ASP.NET Security Development]I liked the blend of theory/fundamentals/principles and activity/interactive-web-apps. Excellent mix.
Statistical Solutions [.NET, C# and ASP.NET Security Development]Good pacing, by switching between lectures and activities the trainer was able to hold my attention, good variety of topics covered, trainer was very knowledgeable and able to adapt the subject matter to what was required.
Statistical Solutions [.NET, C# and ASP.NET Security Development]I genuinely was benefit from the knowledge.
Luis Miguel Lara - Blue Indico Investments, S.L.U. [CCSK - Certificate of Cloud Security Knowledge - Plus]The way in which he explained to us during the 2 days and his way of being, which makes learning enjoyable.
Víctor Miguel Prado Saster - Blue Indico Investments, S.L.U. [CCSK - Certificate of Cloud Security Knowledge - Plus]I really liked the teacher's knowledge.
Ariany Auxiliadora Pulido Gonzalez - Blue Indico Investments, S.L.U. [CCSK - Certificate of Cloud Security Knowledge - Plus]The trainer was very nice and available. I appreciated his knowledge, skills and preparation about the subject. Furthermore, he provided us extra content about IoT, very interesting.
Giuseppe Fiorita - Blue Indico Investments, S.L.U. [CCSK - Certificate of Cloud Security Knowledge - Plus]Ahmed was always trying to keep attention of us.
Alberto Brezmes - Blue Indico Investments, S.L.U. [CCSK - Certificate of Cloud Security Knowledge - Plus]I enjoyed the trainer methods to attract our attention.
Antonio Osuna Sánchez - Blue Indico Investments, S.L.U. [CCSK - Certificate of Cloud Security Knowledge - Plus]Trainers command in his field
Adnan ul Husnain Hashmi - TDM GROUP [Web Application Security]The hands-on labs were excellent.
Dr. Farhan Hassan Khan - TDM GROUP [Web Application Security]The trainer always ensured me fully understand what he had taught and do not hesitate to repeat again if I am still not clear about it. He is committed to preparing more samples to show me to answer the extra questions from me.
Kenny, Jiun Ming Wee [PKI: Implement and Manage]Very knowledgeable and approachable trainer.
- Trainocate (S) Pte. Ltd. [PKI: Implement and Manage]Dynamic; exactly the right level of info.
- ZiuZ Medical B.V. [HIPAA Compliance for Developers]Ann is very knowledgeable on the subject. She is constantly varying pace according to the feedback. There is a lot of room for discussing attendee's own experiences. It was a great joy !.
Sjoerd Hulzinga - KPN p/a Bloomville [IoT Security Architecture]clear voice of the trainer.
- ZiuZ Medical B.V. [HIPAA Compliance for Developers]The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.
Marco van den Berg - ZiuZ Medical B.V. [HIPAA Compliance for Developers]It was quite informal.
- Capita Business Services Ltd [Understanding Modern Information Communication Technology]Trainer covered a lot of ground over a relatively short period.
- Capita Business Services Ltd [Understanding Modern Information Communication Technology]I enjoyed the practical exercises. Hands-on is the best way to learn.
- W L Gore & Associates (UK) Ltd [PKI: Implement and Manage]I found it very interesting to learn all about what happens behind the scenes when it comes to IT systems. I also enjoyed learning about security and what hackers do as ethical hacking is an avenue I'm very keen in pursuing.
- Knowledge Pool/ DVLA [Understanding Modern Information Communication Technology]Richard was very knowledgeable in his field.
- Knowledge Pool/ DVLA [Understanding Modern Information Communication Technology]The practical exercises
- Corvil [C/C++ Secure Coding]The hands-on approach to explain the concepts.
- Corvil [C/C++ Secure Coding]It was pitched at the right level - challenging but understandable & informative.
Louise Voisey - Capita Business Services Ltd [Understanding Modern Information Communication Technology]Exercise and be able to experiment.
- Corvil [C/C++ Secure Coding]The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington [CGEIT – Certified in the Governance of Enterprise IT]a lot of good documents provided. It helps us building up our knowledge.
- MOL Information Technology Asia Ltd. [CGEIT – Certified in the Governance of Enterprise IT]The delivery
- Department for Communities [CISMP - Certificate in Information Security Management Principles]Depth and breadth of the course. Trainer was excellent also.
- Department for Communities [CISMP - Certificate in Information Security Management Principles]