The trainings addressed by the following topics that SOME teams need:
ISO / IEC 27001 Information Security Management System Application Training
Cyber Incidents Response Team Installation and Management Training
Penetration Tests Training
Safe Configuration Audit Training
Information Systems Forensic Analysis Training
Computer Forensic Analysis - In-depth Windows Training
Network Forensic Analysis Training
Attack Techniques Training
Intrusion Detection and Records Management Training
Central Security Monitoring and Incident Management Training
Malware Analysis Methods Training
DDoS Attacks and Protection Methods Training
IT Law Education
Participants must have ample knowledge of basic network and application technologies.
Penetration testing experts, information security and information technology auditors, information technologies risk and accord experts, system and network executives can participate.