Cybersecurity

CybersecurityIn the field of security training, we offer a wide range of courses, with a strong focus on cybersecurity and practical ethical hacking courses – from introductory topics to advanced penetration testing and real-world hacking. Participants will not only learn theoretical principles but also gain hands-on skills to detect and prevent threats in practice.

We also provide training on specialized security products such as Cisco, Juniper, and Fortinet (FortiGate). These technologies are widely used in enterprise environments, and our courses, led by experienced professionals, help participants master their deployment and security.

All our training is delivered by industry professionals who manage these systems on a daily basis. Courses are enriched with practical advice and real-world experience that you won’t find in standard documentation – and it is exactly this direct link between know-how and practice that makes our training unique.

Cybersecurity

ICT Security

ZKB1
Basics of Cybersecurity
HCK1
Penetration Testing and Ethical Hacking
HCK2
Penetration Testing and Ethical Hacking in WANs
AKB1
Cybersecurity Architect
PBV
Principles of Secure Development in Practice and Methods for Ensuring Information Security
VNP
Development for "Non-developers"
CHFIv11
EC-Council Computer Hacking Forensics Investigator
CISSP
Certified Information Systems Security Professional
PTEST
CompTia Penetration Tester+
PKI
Windows Server – Deployment and Management of PKI
CEH
EC-Council Certified Ethical Hacker v13 ELITE
HCKP1
Hacking in Practice
HCKP2
Practical Hacking II
HCK4
Web Application Security in Practice – OWASP Top 10 and APIs
BZP2
Windows Server – Practical Security Management
BZP5
Security in Web Application Environments (based on OWASP TOP10)
CLSH1
CLASHING: educational game platform for cyber and information security
SNIF
Troubleshooting and Network Analysis Using a Sniffer
T28
Security of iOS and Android Platforms in the Enterprise
LNX5
Linux – System and Network Security
OESA
OPEN Enterprise Security Architecture
OISM
OPEN Information Security Management Maturity Model 2.0

ISMS and GDPR

ISMS
ISMS Manager – ISO 27001
GDPR
General Data Protection Regulation (GDPR) 2016/679 (EU)
ISMS2
Manager ISMS – New challenges and opportunities
ISMS3
IT Security Management: ISO/IEC 27001 in 1 Day
ISMS4
Risk Management in ISMS according to ISO/IEC 27005
ISMS5
ISO/IEC 27001 Lead Implementer
ISMS6
ISO/IEC 27001 Lead Auditor
ISMS1
ISO/IEC 27001 LEAD AUDITOR
ISMS7
PECB Certified ISO/IEC 27001 Transition
NIS2C
PECB Certified NIS 2 Directive Lead Implementer
NIS2KB
Implementing the Cybersecurity Act Amendment and NIS 2: From Theory to Practice
NIS2
Cybersecurity in Practice: Implementing the Cybersecurity Act, NIS2 and DORA with MOYAKybeon
ISMS8
PECB ISO/IEC 42001 Foundation
ISMS9
PECB ISO/IEC 42001 Lead Implementer

Mile2

CISSO
Certified Information Systems Security Officer
CPTE
Certified Penetration Testing Engineer
CSLO
Certified Security Leadership Officer
CPEH
Certified Professional Ethical Hacker
CIHE
Certified Incident Handling Engineer
CPTC
Certified Penetration Testing Consultant
CSWAE
Certified Secure Web Application Engineer
CDRE
Certified Disaster Recovery Engineer
CDFE
Certified Digital Forensics Examiner

Check Point

CHP1
Check Point Security Administration
CHP2
Check Point Security Engineering