المجد للتدريب -----------
نشاط العضو : تاريخ التسجيل : 17/09/2015 عــدد المـشاركات : 4845 الـــعــــمــــر : 36 الـجــنـــــس : الـــدولـــــة : مكان الإقــامه : الاردن نقاط : 13732 الـتـقـيـيم : 0
| موضوع: Capturing the Intrusion course in jordan , dubai, londonAzerbaijan, Georgia and Spain الجمعة أبريل 09, 2021 7:19 am | |
|
Almjd for Quality and Human Resource Development invite you to participate in our training course:
Capturing the Intrusion
Which will be held evry week in London, Kuala Lumpur, Istanbul, Barlen, Paris, Roma, Amsterdam, Stockholm and Dubai
To contact us website: www.almjd-hr.com Emile: info@almjd-hr.com Mobile 00962795447255
Which Accredited by the University of Western America and Harvard, Cambridge, and Manchester International Training Collages
The following are Security Information courses: Capturing the Intrusion Hardening the Gates Security information and Event Mangment Implementing Standards for Blue Team Defending Against Advanced Threats Protecting the Critical Infrastructure Information Security Architecture Principles Cybersecurity Fundamentals Information Security Management Principles Practical Risk Management Cyber Security Standards Information Risk Management Business Continuity Management Implementing Cyber Security Standards Risk and Information Systems Control Introduction to Information Security Security fundamentals Bootcamp Wireless ethical hacking and penetration testing. Offensive security Operations Introduction to Network Penetration Testing Introduction to Web Penetration Testing Introduction to Mobile Penetration Testing Active defense and offensive countermeasures. Advanced exploits development. Advanced Web Penetration Testing Exploits writing. Automating InfoSec with Python. Digital forensics analysis Incident Response, and threat Hunting. Network forensics analysis. Windows based forensics analysis. Unix based systems forensics analysis. Threats intelligence Advanced smartphone forensics. Threat Intelligence analysis. Wireless Penetration Testing Introduction to GSM security Introduction to CDMA security Analog Signal Descrambling Detection of Modulation and Source Coding Open-Source Intelligence (OSINT) Gathering and Analysis Introduction to Wireless Communications Introduction to Telephone Networks SDR Signal Reception and Analysis Signal Modulation and Source Coding Malware and Reverse engineering Advanced Network forensics analysis RAM/Memory Forensics analysis and Threat Hunting RAM/Memory Forensics analysis and Threat Hunting Utilizing Powershell for offensive operations Cyber Security Incident Responder Cyber Threat Hunter Advanced Smartphone Forensics Exploit development Advanced Web Penetration Testing Strategic Security Planning Introduction to Cryptography Intermediate Cryptographic Algorithms and Cryptanalysis Secure Protocol Design and Analysis Public Key Infrastructure Advanced Cryptography Windows Forensics Cyber Incident Investigation Cyber Technical Investigation Responding to the Incidents Battlefield Forensics & Data Acquisition Advanced Memory Forensics & Threat Detection Mac and iOS Forensic Analysis and Incident Response Forensic Investigation Specialist Incident Response for Managers Natural Language Processing Introduction to Machine Learning Data Science for Security Professionals Threat Intelligence Analyst Cyber Threat Intelligence The Guardians Introduction to Defensive Cyber Security
website :www.almjd-hr.com
| |
|