Secure D Logo
Home Services Products Advisories About

Our Service

All the IT security services for your specific needs

Not sure what to do?

List of services

Cybersecurity Training and Awareness

Secure Development Consultancy

Penetration Testing

Source Code Review

Digital Forensics

Compromise Assessment & Threat Hunting

prevent

Cybersecurity Training and Awareness

Our cybersecurity trainings and classes are designed to strengthen the core essentials and ultimately provide insights to advance techniques employed, methods and countermeasures through real-world scenarios and practical exercise.

Cyber Security Offensive and Intensive Penetration Testing Training

Intensive Offensive and Penetration Testing course provides you with advance set of skills that prepare you to understand and ready in advance offensive cyber security fields. The training courses teach the methodologies, techniques, and tactical tools of modern adversaries. Offensively-focused hands-on education is an essential foundation for all information security practitioners; knowing how to attack gives keen insight into proper defensive, vulnerability assessment, full stack of penetration testing.

Secured System and Software Development Training

The course covers the most prevalent software and web application security risk including those from the OWASP Top 10 risks, Secure Software Development Guideline and OWASP Application Security Verification Standard. Student will understand the System, Software and Web Application Penetration testing methodology and techniques and preventive measures for defending your organization's applications through various guideline and standard.

Basic Cyber Security Red Teaming Operation

The course covers the basic cyber security offensive techniques via target to Cyber, People and Physical Attack surfaces of the targets. The course utilizing strategies, systems, and methodology to simulate real-world scenarios so as to prepare and measure the security defenses of the organization. The objective of the Red Team is to simulate the real-world attacks in order to measure the organization's defenses and their incident response Team

Mobile Application Penetration Testing Training

This course covers the security and exploitation of the two dominant mobile platforms (Android and iOS). Providing an in-depth understanding on analyzing vulnerabilities and hands-on exploitation utilizing various tools and techniques. The course will be conducted within a customized and controlled environment. This course will provide the foundation to enable the participants to audit and review mobile applications.

Basic Incident Response Course for SOC Engineer

The course covers the most prevalent cybersecurity incident in real life. Student will understand the incident response methodology, flow of logging and analysis technique for finding the root cause of incident through various guideline, demo incident and standard.

Intensive Web Application Penetration Testing

The course covers the most prevalent software and web application vulnerability Assessment / Penetration Testing and security risk including those from the OWASP Web Top 10 risks, Secure Software Development Guideline and OWASP Application Security Verification Standard. Student will understand the System, Software and Web Application Penetration testing methodology and techniques and preventive measures for defending your organization's applications through various guideline and standard.

Secure Mobile Development

The course covers the most prevalent mobile app risks and security controls, including those from the OWASP Mobile Top 10 risks, Smartphone Secure Development Guideline and OWASP Mobile Application Security Verification Standard. Student will understand the mobile application risk and preventive measures for defending your organization’s mobile applications through various guideline and standard.

APT Analysis and Threat Hunting

The course focus and covers on incident analysis and Advanced Persistent Threat (APT) detection with in-depth log analysis and hands-on exploitation and analysis with variety of tools and technique. The entire class will learn about behavior of many APT and many tools that used by state sponsored hacker. The virtual environment of lab based on real world scenario. The training will take the attendees from zero knowledge to be able to identify suspicious behavior of real-world threats.

Copyright 2020. Secure D Center. All rights reserved.
info@secure-d.tech Secure D Global