Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CISO as a Service
CISO as a Service (Chief Information Security Officer as a Service) provides organisations with access to high-level IT security expertise without the need to hire a full-time CISO. This service is particularly useful for small- and medium-sized enterprises that may...
SOC as a Service
SOC as a Service (Security Operations Centre as a Service) is an outsourcing model of IT security management, in which an organisation entrusts an external provider with the responsibility of monitoring, detecting and responding to security incidents. This approach allows...
Smishing simulation & awareness
The Smishing Simulation & Awareness service is a crucial component of IT security strategies, focusing on raising awareness and training employees on the risks associated with ‘smishing’ (phishing via SMS). This service helps organisations protect themselves against social engineering attacks...
Phishing simulation & awareness
The Phishing Simulation & Awareness service is designed to help organisations raise awareness and train their employees on the risks associated with phishing attacks. This service involves simulating phishing attacks to assess the vulnerability of employees and provide them with...
Cyber Threat Intelligence (CTI)
The Cyber Threat Intelligence service is a crucial component of cyber security that focuses on the collection, analysis and utilisation of information on cyber threat intelligence. This service provides organisations with an in-depth understanding of current and potential threats, helping...
Domain Threat Intelligence (DTI)
Domain Threat Intelligence is a crucial component of information security, focused on collecting, analysing and utilising information about threats associated with Internet domains. This service helps organisations identify, monitor and mitigate threats that exploit domains for malicious activities such as...
Penetration Testing (PT)
Penetration Testing, often abbreviated to Pen Test, is a computer security service that simulates real attacks on an organisation's computer systems to identify and assess vulnerabilities that can be exploited by ill-intentioned attackers. This type of testing is essential to...
Vulnerability Assessment (VA)
Vulnerability Assessment is an information security service aimed at identifying, classifying and assessing vulnerabilities in a computer system. This process is essential for understanding and mitigating information security risks within an organisation. Objectives of Vulnerability Assessment Vulnerability Identification: Discover all...
Smartphone and Tablet electronic countermeasures
Scope of the service: The Electronic Countermeasure, defined by the US Federal Government as TSCM (Technical Surveillance Counter-Measures), includes a series of activities designed to detect, in a given environment, any type of device capable of fraudently capturing information (audio,...
Electronic surveillance countermeasures – TSCM
Scope of the service: The Electronic Countermeasure, defined by the US Federal Government as TSCM (Technical Surveillance Counter-Measures), includes a series of activities designed to detect, in a given environment, any type of device capable of fraudently capturing information (audio,...