In this section

Share this page

Threat Management

Threat ManagementWhat’s coming at you?

Assess your vulnerabilities, threats and risks. Work to mitigate this risk and use auditing and analysis to confirm your efforts. Humans can be your weakest link. Ensure they have received adequate training to stay one step ahead of the attack.

Threat Management Training

Below is a sample of courses offered per competency and does not represent all courses available.

Audit & Analysis

  • Troubleshooting TCP/IP Networks with Wireshark
  • CISA Prep Course
  • CISM Prep Course
  • Information Systems Security Engineering Professional
  • Visualise, Prioritise and Secure your Network
  • Cybersecurity Investigations and Network Forensics Analysis: Practical Techniques for Analysing Suspicious Network Traffic
  • ITIL Service Capability: Operational Support and Analysis

Risk Assessment and Mitigation

  • Certified Authorization Professional
  • Information Systems Security Engineering Professional
  • Information Systems Security Architecture Professional
  • RSA Archer Administration

Risk Management

  • Deploying Cisco ASA Firewall Solutions
  • Implementing Cisco Intrusion Prevention System
  • Cyber Security Compliance & Mobility
  • Foundstone Risk Assessment Principles and Practices

Social Engineering

  • Social Media Security Professional
  • Social Media Engineering & Forensics Professional
  • Social Media Management & Governance Professional
  • Security+ Prep Course
  • Cybersecurity Foundations
  • Cybersecurity Compliance & Mobility

Threat Assessment

  • CEH - Certified Ethical Hacker
  • CHFI - Computer Hacking Forensic Investigator
  • CSFI: Introduction to Cyber Warfare
  • CSFI: Defensive Cyber Operations Engineer
  • Cybersecurity Investigations and Network Forensics Analysis:
  • Practical Techniques for Analysing Suspicious Network Traffic
  • Practical Techniques for Analysing VoIP Traffic
  • Practical Techniques for Analysing Wi-Fi Traffic
  • Data Modeling

Vulnerability Assessment

  • CSFI: Introduction to Cyber Warfare
  • CSFI: Defensive Cyber Operations Engineer
  • Wireless LAN Security and Analysis
  • Advanced VoIP: Securing UC Networks
  • Foundstone Building Secure Software
  • Foundstone Writing Secure Code

To access our full list of Security courses please visit our Security Training Courses page here


For more information on Contingency Planning please contact us on +971 4 4464 987