Results 1 to 4 of 4
  1. #1

    Default Cyber Security Training. Protect Before You Connect


    Cyber Security Training. Protect Before You Connect. ENROLL NOW!

    Come and join with our upcoming training for "Certified Digital Forensics Examiner, Certified Secure Web Application Engineer, Certified Disaster Recovery Engineer, Certified Virtual Machine Engineer, Certified Penetration Testing Engineer, Certified Information System Security Officer & Certified Security Sentinel"

    When: May25-29, 2015 - Certified Professional Ethical Hacker
    May 23-24, 2015- Certified Security Sentinel
    May 24-29 2015- Certified Secure Web Application Engineer

    June 1-5, 2015 - Certified Digital Forensics Examiner
    June 6-10, 2015 – Certified Secure Web Application Engineer
    JUNE 8-12, 2015 - Certified Disaster Recovery Engineer
    JUNE 8-12, 2015 - Certified Virtual Machine Engineer
    JUNE 15-19 – Certified Penetration Testing Engineer
    JUNE 15-19 (weekdays) – Certified Information System Security Officer
    JUNE 22-26 - Certified Professional Ethical Hacker

    JULY 6-10 - Certified Information System Security Officer
    JULY 13-17 - Certified Disaster Recovery Engineer
    JULY 13-17 - Certified Professional Ethical Hacker
    JULY 20-24 - Certified Virtual Machine Engineer
    JULY 22-26 - Certified Penetration Testing Engineer
    JULY 27-31 - Certified Digital Forensics Examiner



    (Certified Professional Ethical Hacker) Overview:
    The course training helps students gain a valuable skill-set in penetration testing by understanding the importance of vulnerability assessments and ethical hacking
    (Certified Security Sentinel) Overview:
    Intended for anyone that uses a computer on the internet. Attendees will fully understand the security threats that attack daily and countermeasures associated with these attacks. The weakest link in any companies' security program is a poorly trained employee. Don’t let this be you.


    (Certified Secure Web Application Engineer) Overview:
    Designed to equip students with the knowledge and tools needed to identify and defend against security vulnerabilities in software applications.
    (Certified Digital Forensics Examiner)
    The investigation and recovery of data contained in digital devices. This data is often the subject of investigations in litigation, proof of guilt, and corrective action in an organization. When the time comes that you need to investigate your organization, will you have the skill set necessary to gather the digital data that you need?

    (Certified Disaster Recovery Engineer)
    When a business is hit by a natural disaster, cybercrime or any other disruptive tragedy, how should it react? What if the office IT infrastructure is taken down? The answer lies in the training of the Certified Disaster Recovery Engineer course.
    (Certified Virtual Machine Engineer)
    The Certified Virtual Machine Engineer course is designed for those who need to understand virtualization and the impacts it can have on an organization.
    (Certified Penetration Testing Engineer)
    This course trains students on the 5 key elements of penetration testing: information gathering, scanning, enumeration, exploitation and reporting. Ethical hacking is the art of using these penetration testing techniques to identify and repair the latest vulnerabilities in a system to make sure it is secure.

    ==========================================

    For more details & Clarifications, please contact Ms. Ivy Doquila/Mr. Stephen Goody
    Email: worldtechconsultancy8@gmail.com @gmail.com

    Like us FB: Worldtech Information Solutions Inc.
    Add us FB: Worldtech Consultancy
    Skype: worldtech.consultancy
    Tel. no.: PLDT: (032) 266 -1744
    Mobile nos.: Globe: 09771501186 | Smart: 09099644884 | Sun: 09325071398

  2. #2

  3. #3
    avail pa ni?

  4. #4
    Junior Member
    Join Date
    Feb 2013
    Gender
    Male
    Posts
    182
    wow join ta guys

  5.    Advertisement

Similar Threads

 
  1. Before you take my heart reconsider...
    By P-Chan in forum "Love is..."
    Replies: 28
    Last Post: 08-30-2007, 06:15 PM
  2. Photography R US! (Read the 1st page before you post!)
    By Señor Joze in forum Photography
    Replies: 217
    Last Post: 07-03-2006, 06:54 AM
  3. THIS IS NOT CLASSIFIED ADS! READ THE RULES BEFORE YOU POST!
    By automatic_revolver in forum Business, Finance & Economics Discussions
    Replies: 33
    Last Post: 02-23-2006, 10:14 PM
  4. THIS IS NOT CLASSIFIED ADS! READ THE RULES BEFORE YOU POST!
    By ebsray in forum Business, Finance & Economics Discussions
    Replies: 1
    Last Post: 01-25-2006, 08:07 PM
  5. THIS IS NOT CLASSIFIED ADS! READ THE RULES BEFORE YOU POST!
    By sargeforce2 in forum Business, Finance & Economics Discussions
    Replies: 3
    Last Post: 01-21-2006, 11:22 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
about us
We are the first Cebu Online Media.

iSTORYA.NET is Cebu's Biggest, Southern Philippines' Most Active, and the Philippines' Strongest Online Community!
follow us
#top