WI, Milwaukee - Downtown Milwaukee
Explore Our Courses
Ethical Hacker
35 HoursCAS for Administrators
7 HoursIoT Security Architecture
14 HoursBusiness Continuity Practitioner
14 HoursCloud Security Seminar
7 HoursCyber Resilience RESILIA Foundation
14 HoursSecure by Design
7 HoursData Protection Practitioner
14 HoursPCI-DSS Practitioner
14 HoursThe Dark Web
7 HoursCyber Crime in Business
7 HoursMobile Forensic Security
7 HoursDigital Investigations - Advanced
21 HoursNetwork Security Administrator
35 HoursLast Updated:
Testimonials (25)
The fact that it was seen that he has vast knowledge about the field, he was open to communication with the students, he even took breaks in which we discussed certain topics in the group. It provided us with resources to continue our individual study. He always took breaks to answer questions.
David - Siemens
Course - Cybersecurity Fundamentals - A Practical Course
Machine Translated
Pushing changes on an ongoing basis, when on the 3rd day I started to get more lost than before and it was harder to spot the error quickly, I was quickly able to check out the latest changes and stay up to date with the material
Paulina
Course - Advanced Java Security
Machine Translated
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
I found new things.
Cristian
Course - OpenStack Security
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
I enjoyed the hands on labs because they were engaging and very knowledge sharing
Sinoxolo - Vodacom
Course - Cyber Security Body of Knowledge (CyBOK)
Pentester skills what demonstrate teacher
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Ethical Hacker
Examples from "life" are provided and I was very interested in the topic of personality types
Tomek - Amer Sports Poland
Course - Governance, Risk Management & Compliance (GRC) Fundamentals
Machine Translated
The oral skills and human side of the trainer (Augustin).
Jeremy Chicon - TE Connectivity
Course - NB-IoT for Developers
Very good to understand how a hacker would potentially analyse sites for weakness and tools they might employ .
Roger - OTT Mobile
Course - .NET, C# and ASP.NET Security Development
I extracted valuable information that I will be able to present in my company as a solution to one of the processes
Paweł - Santander
Course - Public Key Infrastructure
Machine Translated
The way to receive the information from the trainer
Mohamed Romdhani - Shams Power
Course - CISM - Certified Information Security Manager
I enjoyed refreshing my knowledge on the various subjects on cyber security. I was increasingly interested around cyber attacks, how they happen and what we (as an organisation) could potentially do to try and mitigate any risks. I did raise a question around AI in cyber attacks, and the answer was very in depth and interesting with a live example given on the spot.
Siobhan
Course - Executive Cyber Security Awareness
See live real-time implementation of activities using sample application investigation/cracking tools.
Paweł - Ośrodek Przetwarzania Informacji – Państwowy Instytut Badawczy
Machine Translated
I enjoyed the whole training session, very handy for a potential new career option, which i have been considering.
Christopher - The Growth Company
Course - Cyber Security Awareness Training
the balance between lectures and practice, the rhythm, the trainer knowledge and pedagogic skill
Armando Pinto - EID
Course - C/C++ Secure Coding
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Risk optimization is more clear than the other subjects
Munirah Alsahli - GOSI
Course - CGEIT – Certified in the Governance of Enterprise IT
conforme con la forma de explicar del instructor
Juan Carlos Barranco Camargo - GSE
Course - PKI: Implement and Manage
The instructor has a very wide range of knowledge and is committed to what he does. He is able to interest the listener with his course. The scope of the training fully met my expectations.
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - MasterClass Certified Ethical Hacker Program
- Understanding that ATT&CK creates a map that makes it easy to see, where an organization is protected and where the vulnerable areas are. Then to identify the security gaps that are most significant from a risk perspective. - Learn that each technique comes with a list of mitigations and detections that incident response teams can employ to detect and defend. - Learn about the various sources and communities for deriving Defensive Recommendations.
CHU YAN LEE - PacificLight Power Pte Ltd
Course - MITRE ATT&CK
Very knowledgeable trainer, was able to adjust to audience knowledge, excellent industry experience and ability to relate to audience needs Excellent content preparation , tailored to needs discussed beforehand. Good supplement reading materials prepared by trainer
Oliver Steinig - Bosch
Course - IoT Security Architecture
The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.
Marco van den Berg - ZiuZ Medical B.V.
Course - HIPAA Compliance for Developers
Very good knowledge and character.
Constantinos Michael
Course - Java and Web Application Security
I genuinely enjoyed the real examples of the trainer.