¨°°o°°¨]§[° الاكاديمية الامريكية للتدريب والاستشارات °]§[¨°°o°
هل تريد التفاعل مع هذه المساهمة؟ كل ما عليك هو إنشاء حساب جديد ببضع خطوات أو تسجيل الدخول للمتابعة.

¨°°o°°¨]§[° الاكاديمية الامريكية للتدريب والاستشارات °]§[¨°°o°


 
الرئيسيةالبوابةأحدث الصورالتسجيلدخول
يسرنا ويسعدنا  إدارة منتدى ( الحسن للتنمية البشرية ) أن نرحب بالاعضاء المنتسبين للمنتدى ونتمنى لهم إقامة طيبة بيننا ونرجوا من جميع الاعضاء التفاعل والمشاركة لنرتقي بالمنتدى الى اعلى المستويات باذن الله .. كما يسرنا ان نرحب بكل الزوار الكرام ونتمنى ان يحوز منتدانا على اعجابهم .. مع تحيات : أخوكم الحسن

 

 Malware and Reverse engineering course in London, Kuala Lumpur, Istanbul

اذهب الى الأسفل 
كاتب الموضوعرسالة
almjd training
عضو نشيط
عضو نشيط



ذكر عدد المساهمات : 3979
نقاط : 11924
العمر : 36
العمل : تسويق
الدولة : الاردن
تاريخ التسجيل : 25/03/2018

Malware and Reverse engineering course in London, Kuala Lumpur, Istanbul Empty
مُساهمةموضوع: Malware and Reverse engineering course in London, Kuala Lumpur, Istanbul   Malware and Reverse engineering course in London, Kuala Lumpur, Istanbul I_icon_minitimeالخميس نوفمبر 26, 2020 8:07 am





Almjd for Security Information invite you to participate in our training course:



Malware and Reverse engineering


Which will be held evry week in London, Kuala Lumpur, Istanbul, Barlen, Paris, Roma, Amsterdam, Stockholm and Dubai



To contact us

website: www.almjd-hr.com

Emile: info@almjd-hr.com

Mobile 00962795447255



Which Accredited by the University of Western America and Harvard, Cambridge, and Manchester International Training Collages



The following are Quality and Productivity courses:

Hardening the Gates

Security information and Event Mangment

Implementing Standards for Blue Team

Defending Against Advanced Threats

Protecting the Critical Infrastructure

Information Security Architecture Principles

Cybersecurity Fundamentals

Information Security Management Principles

Practical Risk Management

Cyber Security Standards

Information Risk Management

Business Continuity Management

Implementing Cyber Security Standards

Risk and Information Systems Control

Introduction to Information Security

Security fundamentals Bootcamp

Wireless ethical hacking and penetration testing.

Offensive security Operations

Introduction to Network Penetration Testing

Introduction to Web Penetration Testing

Introduction to Mobile Penetration Testing

Active defense and offensive countermeasures.

Advanced exploits development.

Advanced Web Penetration Testing

Exploits writing.

Automating InfoSec with Python.

Incident Response, and threat Hunting.

Network forensics analysis.

Windows based forensics analysis.

Unix based systems forensics analysis.

Threats intelligence Advanced smartphone forensics.

Threat Intelligence analysis.

Wireless Penetration Testing

Introduction to GSM security

Introduction to CDMA security

Analog Signal Descrambling

Detection of Modulation and Source Coding

Open-Source Intelligence (OSINT) Gathering and Analysis

Introduction to Wireless Communications

Introduction to Telephone Networks

SDR Signal Reception and Analysis

Signal Modulation and Source Coding

Malware and Reverse engineering

Advanced Network forensics analysis

RAM/Memory Forensics analysis and Threat Hunting

AM/Memory Forensics analysis and Threat HuntingUtilizing Powershell for offensive operations

Cyber Security Incident Responder

Cyber Threat Hunter

Advanced Smartphone Forensics

Exploit development

Advanced Web Penetration Testing

Strategic Security Planning

Introduction to Cryptography

Intermediate Cryptographic Algorithms and Cryptanalysis

Secure Protocol Design and Analysis

Public Key Infrastructure

Advanced Cryptography

Windows Forensics

Cyber Incident Investigation

Cyber Technical Investigation

Responding to the Incidents

Battlefield Forensics & Data Acquisition

Advanced Memory Forensics & Threat Detection

Mac and iOS Forensic Analysis and Incident Response

Forensic Investigation Specialist

Incident Response for Managers

Natural Language Processing

Introduction to Machine Learning

Data Science for Security Professionals

Threat Intelligence Analyst

Cyber Threat Intelligence

The Guardians

Introduction to Defensive Cyber Security



website :www.almjd-hr.com





الرجوع الى أعلى الصفحة اذهب الى الأسفل
 
Malware and Reverse engineering course in London, Kuala Lumpur, Istanbul
الرجوع الى أعلى الصفحة 
صفحة 1 من اصل 1
 مواضيع مماثلة
-
» Strategic Quality Management course in London, Kuala Lumpur, Istanbul
» Business Continuity Management course in London, Kuala Lumpur, Istanbul
» Understanding and Implementing Six Sigma course in London,Kuala Lumpur,Istanbul
» The Complete Course on Budgeting course in London, Kuala Lumpur, Istanbul, Barlen
» Strategic Quality Management course in London, Kuala Lumpur, Istanbul

صلاحيات هذا المنتدى:لاتستطيع الرد على المواضيع في هذا المنتدى
¨°°o°°¨]§[° الاكاديمية الامريكية للتدريب والاستشارات °]§[¨°°o° :: ~*¤ô§ô¤* منتديات التدريب *¤ô§ô¤*~ :: منتدي الاعلان عن الدورات التدريبة-
انتقل الى: