Cyber Security Training. Protect Before You Connect. ENROLL NOW!
Come and join with our upcoming training for "Certified Digital Forensics Examiner, Certified Secure Web Application Engineer, Certified Disaster Recovery Engineer, Certified Virtual Machine Engineer, Certified Penetration Testing Engineer, Certified Information System Security Officer & Certified Security Sentinel"
When: May25-29, 2015 - Certified Professional Ethical Hacker
May 23-24, 2015- Certified Security Sentinel
May 24-29 2015- Certified Secure Web Application Engineer
June 1-5, 2015 - Certified Digital Forensics Examiner
June 6-10, 2015 – Certified Secure Web Application Engineer
JUNE 8-12, 2015 - Certified Disaster Recovery Engineer
JUNE 8-12, 2015 - Certified Virtual Machine Engineer
JUNE 15-19 – Certified Penetration Testing Engineer
JUNE 15-19 (weekdays) – Certified Information System Security Officer
JUNE 22-26 - Certified Professional Ethical Hacker
JULY 6-10 - Certified Information System Security Officer
JULY 13-17 - Certified Disaster Recovery Engineer
JULY 13-17 - Certified Professional Ethical Hacker
JULY 20-24 - Certified Virtual Machine Engineer
JULY 22-26 - Certified Penetration Testing Engineer
JULY 27-31 - Certified Digital Forensics Examiner
(Certified Professional Ethical Hacker) Overview:
The course training helps students gain a valuable skill-set in penetration testing by understanding the importance of vulnerability assessments and ethical hacking
(Certified Security Sentinel) Overview:
Intended for anyone that uses a computer on the internet. Attendees will fully understand the security threats that attack daily and countermeasures associated with these attacks. The weakest link in any companies' security program is a poorly trained employee. Don’t let this be you.
(Certified Secure Web Application Engineer) Overview:
Designed to equip students with the knowledge and tools needed to identify and defend against security vulnerabilities in software applications.
(Certified Digital Forensics Examiner)
The investigation and recovery of data contained in digital devices. This data is often the subject of investigations in litigation, proof of guilt, and corrective action in an organization. When the time comes that you need to investigate your organization, will you have the skill set necessary to gather the digital data that you need?
(Certified Disaster Recovery Engineer)
When a business is hit by a natural disaster, cybercrime or any other disruptive tragedy, how should it react? What if the office IT infrastructure is taken down? The answer lies in the training of the Certified Disaster Recovery Engineer course.
(Certified Virtual Machine Engineer)
The Certified Virtual Machine Engineer course is designed for those who need to understand virtualization and the impacts it can have on an organization.
(Certified Penetration Testing Engineer)
This course trains students on the 5 key elements of penetration testing: information gathering, scanning, enumeration, exploitation and reporting. Ethical hacking is the art of using these penetration testing techniques to identify and repair the latest vulnerabilities in a system to make sure it is secure.
==========================================
For more details & Clarifications, please contact Ms. Ivy Doquila/Mr. Stephen Goody
Email: worldtechconsultancy8@gmail.com @gmail.com
Like us FB: Worldtech Information Solutions Inc.
Add us FB: Worldtech Consultancy
Skype: worldtech.consultancy
Tel. no.: PLDT: (032) 266 -1744
Mobile nos.: Globe: 09771501186 | Smart: 09099644884 | Sun: 09325071398