Toggle navigation
About Us
Consulting Services
Strategic Security Consultation
Business Continuity Management
Compliance
Data Classification & Protection
Information Security Management
Third Party Risk Management (TPRM)
Technical Security Consultation
Infrastructure Security
Compromise Assessments
Firewall Rules Review
High-Level Secure Architecture Review
Infrastructure Penetration Testing
Low-Level Secure Configuration Review
Minimum Baseline Security Standard Development
Vulnerability Assessment
Red Teaming
Applications Security
Mobile Application Penetration Testing
Software Source Code Review
Web Application Vulnerability Assessment & Penetration Testing
Security Operations
SOC – Framework Development
SOC – Security Operations Assessment
Solutions
Network Detection and Response (NDR)
Data Classification
GRC Platform
Network Broker
Vulnerability Management
Web Application Assessment
SIEM
MSS
Advanced Threat Hunting
Cybersecurity Professionals as a Service
Incident Response Retainer
Proactive Compromise Assessment
Reactive Compromise Assessment
Security Monitoring
Academy
About Academy
Training Schedule
Training Courses
Training Tracks
Contact us
Blogs
About Us
Consulting Services
Strategic Security Consultation
Business Continuity Management
Compliance
Data Classification & Protection
Information Security Management
Third Party Risk Management (TPRM)
Technical Security Consultation
Infrastructure Security
Compromise Assessments
Firewall Rules Review
High-Level Secure Architecture Review
Infrastructure Penetration Testing
Low-Level Secure Configuration Review
Minimum Baseline Security Standard Development
Vulnerability Assessment
Red Teaming
Applications Security
Mobile Application Penetration Testing
Software Source Code Review
Web Application Vulnerability Assessment & Penetration Testing
Security Operations
SOC – Framework Development
SOC – Security Operations Assessment
Solutions
Network Detection and Response (NDR)
Data Classification
GRC Platform
Network Broker
Vulnerability Management
Web Application Assessment
SIEM
MSS
Advanced Threat Hunting
Cybersecurity Professionals as a Service
Incident Response Retainer
Proactive Compromise Assessment
Reactive Compromise Assessment
Security Monitoring
Academy
About Academy
Training Schedule
Training Courses
Training Tracks
Contact us
Blogs
Info
IT Security Blog
Security Tips & Articals
Cybersecurity & Compliance: What to Expect in 2025
Read More
Cybersecurity & Compliance: What to Expect in 2025
Digital Transformation & Cybersecurity: Finding the Balance
PDPL Compliance: Turning Regulation into Opportunity
No posts found
Latest News
Company Corner
Cybersecurity Bootcamp 2025 with the Central Bank of Jordan
IT Security C&T Job Fair 2025
Delivering Multiple Cybersecurity Training Programs Across Jordan
Academy Blog
Training Corner
Delivering Multiple Cybersecurity Training Programs Across Jordan
At IT Security C&T, we are proud to be delivering several cybersecurity training programs simultaneously,...
Read More
Graduation Ceremony of Nashama 7 Cybersecurity Bootcamp
Under the National Cyber Security Center (NCSCJO) sponsorship and delivered by IT Security C&T, we are...
Read More
IT Security C&T Collaborates with the Central Bank of Jordan in Cybersecurity Bootcamp 2025
our CEO, Muntaser (Monte) Bdair, is delivering the official CISM training by ISACA to a select group...
Read More
Cybersecurity Training Program Successfully Completed
As part of our social responsibility initiatives, we delivered a 16-week practical cybersecurity training...
Read More
IT Security C&T Welcomes University Students to Internship Program
As part of our ongoing commitment to social responsibility and talent development, we were delighted...
Read More
Nashama 7 Bootcamp Participants Conclude Their Journey at IT Security C&T
Students of the Nashama 7 Bootcamp gathered in person at IT Security C&T to complete their training...
Read More
BSI – ISO 22301 (BCMC) Lead Implementer Training Achieves a Success Rate
IT Security C&T successfully delivered the BSI – ISO 22301 (Business Continuity Management Certification)...
Read More
Successful Launch of Nashama 7 Bootcamp at Mutah University
the successful launch of the Nashama 7 Bootcamp, a collaborative initiative between the National Cyber...
Read More
IT Security C&T Silver Sponsor of “Cyber Warriors” School Competition
Silver Sponsor of the محاربي_السايبر (Cyber Warriors) school competition, organized by the National Cybersecurity...
Read More
Completion of CIHE Training with Central Bank of Jordan
successful completion of the Certified Information Handling Essentials (CIHE) Training, delivered to...
Read More