The course aims to train IT administrators to the protect the corporate IT security from an offensive attack point of view.
More information
The course offers a defensive attack point of view and is based on 3 key concepts: protection, detection, and response after a security incident.
More information
This course is the first step in joining a Security Operations Center (SOC).
More information
The course offers the certification that completes the Ethical Hacker journey after taking the CEH exam.
More information