Resource Fulfilment
Short & long-term staffing
Back-end staffing
Red teaming
Documentation
Security Consulting
Vulnerability Management & Assessment
PEN Management &Testing alt. PTaaS
Endpoint Detection & Response
Security Control Review
Certification Support/ Audits
Cyber Security Operation Centre
24/7 Surveillance
Analysis/ Remedy/Resolution
Security tools
Processes & Automation
AI & Automation Fulfilment
AI Development
Application development
Data modelling & Strategies
Documentation
Data & Network Security
Cryptographic Control
Data integrity monitoring
Data protection suite
Web & e-mail Security
Network threat protection
Firewall management
SIEM
Identity & Access Management
NIS 2.0 As a Service
Cyber Security Operations Centre
PEN Testing & Vulnerability Assessment
Full documentation (e-binder)
Periodic Audits
Training
Governance & Reporting
Probes & Agents
Regulatory support
SOC Analyst 2
Fortinet NSE 01
Fortinet NSE 02
Cisco Introduction to Cybersecurity
Qualys Vulnerability Management Foundation
Qualys PCI Compliance
NSE 03
Certificate in Risk Management
SC-900
Cyber Threat Intelligence 101
Elastic Security Fundamentals: SIEM
MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training
IT Master: Cryptography
Cybrary: MITRE ATT&CK Defender™ ATT&CK® Purple Teaming Fundamentals
Cybrary: Executive Vulnerability Management
Cybrary: Privileged Access Management
IT Master: Digital Forensics
Cybrary: MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training
Google: Foundation of Cybersecurity
Google: Play It Safe: Manage Security Risks
Google: Tools of the Trade: Linux and SQL
Google: Connect and Protect: Networks and Network Security
×