Toggle navigation
About Us
Consulting Services
Strategic Security Consultation
Business Continuity Management
Compliance
Data Classification & Protection
Information Security Management
Third Party Risk Management (TPRM)
Technical Security Consultation
Infrastructure Security
Compromise Assessments
Firewall Rules Review
High-Level Secure Architecture Review
Infrastructure Penetration Testing
Low-Level Secure Configuration Review
Minimum Baseline Security Standard Development
Vulnerability Assessment
Red Teaming
Applications Security
Mobile Application Penetration Testing
Software Source Code Review
Web Application Vulnerability Assessment & Penetration Testing
Security Operations
SOC – Framework Development
SOC – Security Operations Assessment
Solutions
Network Detection and Response (NDR)
Data Classification
GRC Platform
Network Broker
Vulnerability Management
Web Application Assessment
SIEM
MSS
Advanced Threat Hunting
Cybersecurity Professionals as a Service
Incident Response Retainer
Proactive Compromise Assessment
Reactive Compromise Assessment
Security Monitoring
Academy
About Academy
Training Schedule
Training Courses
Training Tracks
Contact us
Blogs
About Us
Consulting Services
Strategic Security Consultation
Business Continuity Management
Compliance
Data Classification & Protection
Information Security Management
Third Party Risk Management (TPRM)
Technical Security Consultation
Infrastructure Security
Compromise Assessments
Firewall Rules Review
High-Level Secure Architecture Review
Infrastructure Penetration Testing
Low-Level Secure Configuration Review
Minimum Baseline Security Standard Development
Vulnerability Assessment
Red Teaming
Applications Security
Mobile Application Penetration Testing
Software Source Code Review
Web Application Vulnerability Assessment & Penetration Testing
Security Operations
SOC – Framework Development
SOC – Security Operations Assessment
Solutions
Network Detection and Response (NDR)
Data Classification
GRC Platform
Network Broker
Vulnerability Management
Web Application Assessment
SIEM
MSS
Advanced Threat Hunting
Cybersecurity Professionals as a Service
Incident Response Retainer
Proactive Compromise Assessment
Reactive Compromise Assessment
Security Monitoring
Academy
About Academy
Training Schedule
Training Courses
Training Tracks
Contact us
Blogs
Info
IT Security Blog
Security Tips & Articals
Cybersecurity & Compliance: What to Expect in 2025
Read More
Cybersecurity & Compliance: What to Expect in 2025
Digital Transformation & Cybersecurity: Finding the Balance
PDPL Compliance: Turning Regulation into Opportunity
No posts found
Latest News
Company Corner
IT Security C&T Shines as Gold Sponsor atthe C8 Conference – Dead Sea, Jordan
IT Security C&T Participates in theAndersen Global Partner Eventin Las Vegas
First Cohort of 40 Participants Completes CBJ CybersecurityBootcamp 2025
Academy Blog
Training Corner
First Cohort of 40 Participants Completes CBJ CybersecurityBootcamp 2025
The first batch of 40 participants has successfully completed the Cybersecurity Bootcamp 2025 for the...
Read More
Cyber Nashama 9
The Cyber Nashama 9 cohort has completed their mid-program exams in Cybersecurity and English. Witnessing...
Read More
Cybersecurity Training Program Successfully Completed
At IT Security C&T, we believe that giving back to the community is not just a responsibility, but a...
Read More
Successful Completion of CHFI Training Program
We are proud to announce the successful completion of the Computer Hacking Forensic Investigator (CHFI)...
Read More
Delivering Multiple Cybersecurity Training Programs Across Jordan
At IT Security C&T, we are proud to be delivering several cybersecurity training programs simultaneously,...
Read More
Graduation Ceremony of Nashama 7 Cybersecurity Bootcamp
Under the National Cyber Security Center (NCSCJO) sponsorship and delivered by IT Security C&T, we are...
Read More
IT Security C&T Collaborates with the Central Bank of Jordan in Cybersecurity Bootcamp 2025
our CEO, Muntaser (Monte) Bdair, is delivering the official CISM training by ISACA to a select group...
Read More
Cybersecurity Training Program Successfully Completed
As part of our social responsibility initiatives, we delivered a 16-week practical cybersecurity training...
Read More
IT Security C&T Welcomes University Students to Internship Program
As part of our ongoing commitment to social responsibility and talent development, we were delighted...
Read More
Nashama 7 Bootcamp Participants Conclude Their Journey at IT Security C&T
Students of the Nashama 7 Bootcamp gathered in person at IT Security C&T to complete their training...
Read More