Toggle navigation
About Us
Consulting Services
Strategic Security Consultation
Business Continuity Management
Compliance
Data Classification & Protection
Information Security Management
Third Party Risk Management (TPRM)
Technical Security Consultation
Infrastructure Security
Compromise Assessments
Firewall Rules Review
High-Level Secure Architecture Review
Infrastructure Penetration Testing
Low-Level Secure Configuration Review
Minimum Baseline Security Standard Development
Vulnerability Assessment
Red Teaming
Applications Security
Mobile Application Penetration Testing
Software Source Code Review
Web Application Vulnerability Assessment & Penetration Testing
Security Operations
SOC – Framework Development
SOC – Security Operations Assessment
Solutions
Network Detection and Response (NDR)
Data Classification
GRC Platform
Network Broker
Vulnerability Management
Web Application Assessment
SIEM
MSS
Advanced Threat Hunting
Cybersecurity Professionals as a Service
Incident Response Retainer
Proactive Compromise Assessment
Reactive Compromise Assessment
Security Monitoring
Academy
About Academy
Training Schedule
Training Courses
Training Tracks
Contact us
About Us
Consulting Services
Strategic Security Consultation
Business Continuity Management
Compliance
Data Classification & Protection
Information Security Management
Third Party Risk Management (TPRM)
Technical Security Consultation
Infrastructure Security
Compromise Assessments
Firewall Rules Review
High-Level Secure Architecture Review
Infrastructure Penetration Testing
Low-Level Secure Configuration Review
Minimum Baseline Security Standard Development
Vulnerability Assessment
Red Teaming
Applications Security
Mobile Application Penetration Testing
Software Source Code Review
Web Application Vulnerability Assessment & Penetration Testing
Security Operations
SOC – Framework Development
SOC – Security Operations Assessment
Solutions
Network Detection and Response (NDR)
Data Classification
GRC Platform
Network Broker
Vulnerability Management
Web Application Assessment
SIEM
MSS
Advanced Threat Hunting
Cybersecurity Professionals as a Service
Incident Response Retainer
Proactive Compromise Assessment
Reactive Compromise Assessment
Security Monitoring
Academy
About Academy
Training Schedule
Training Courses
Training Tracks
Contact us
Info
Training Schedule
Get More Information
Give us some details below and we’ll be in touch to discuss your needs.
ISO 22301:2019 (BCMS) Lead Implementer
5 Days
Full Day
Amman, Jordan + Online Course
Read Course Outlines
14
Apr
CISSP - Certified Information Systems Security Professional
10 Days
Evening 6 PM - 9 PM
Online Course
Read Course Outlines
28
Apr
CISM - Certified Information Security Manager
10 Days
Evening 6 PM - 9 PM
Online Course
Read Course Outlines
12
May
ISO/IEC 27001:2022 Lead Implementer
5 Days
Full Day
Amman, Jordan + Online Course
Read Course Outlines
26
May
ECIH - EC-Council Certified Incident Handler
10 Days
Evening 6 PM - 9 PM
Online Course
Read Course Outlines
23
Jun
CISSP - Certified Information Systems Security Professional
10 Days
Evening 6 PM - 9 PM
Online Course
Read Course Outlines
18
Aug
ISO/IEC 27001:2022 Lead Auditor
5 Days
Full Day
Amman, Jordan + Online Course
Read Course Outlines
22
Sep
CSA - Certified SOC Analyst
6 Days
Evening 6 PM - 9 PM
Online Course
Read Course Outlines
6
Oct
CISM - Certified Information Security Manager
10 Days
Evening 6 PM - 9 PM
Online Course
Read Course Outlines
20
Oct
CDPSE - Certified Data Privacy Solutions Engineer
10 Days
Evening 6 PM - 9 PM
Online Course
Read Course Outlines
17
Nov
Contact Us Academy
Name
*
Name
First
First
Last
Last
Organization
*
Select Course
CompTIA Security+
CompTIA Network+
CompTIA Linux+
CompTIA CySA+
ISO 27001 Lead Implementer
ISO 22301 Lead Implementer
ISO 27005 Risk Management
ISO 22301 Lead Auditor
ISO 31000 Advanced Lead Risk Manager
ISO 27001 Lead Auditor
SSCP - Systems Security Certified Practitioner
CISSP - Certified Information System Security Professional
CCSP - Certified Cloud Security Professional
CAP - Certified Cloud Security Professional
ISO/IEC 27001 Lead Implementer
ISO/IEC 27001 Lead Auditor
ISO 22301 Lead Implementer
ISO 22301 Lead Auditor
CEH - Certified Ethical Hacker
CHFI - Computer Hacking Forensic Investigator
CND - Certified Network Defender
CPENT - Certified Penetration Testing Professional
CTIA - Certified Threat Intelligence Analyst
ECIH - Certified Incident Handler
ECSA - Certified Security Analyst
ECSP - Certified Secure Programmer
EDRP - EC Council Disaster Recovery Professional
CPENT - Penetration Testing Professional
CISM - Certified Information Security Manager
CRISC - Certified in Risk and Information Systems Control
CISA - Certified Information System Auditor
Cyber Secure Coder
Cybersec first responder
Email
*
Phone
*
Paragraph
Captcha
If you are human, leave this field blank.
Submit
Δ