FORGOT YOUR DETAILS?

Calendar of Events

Please flip to the right month and then select those dates for showing the events by various types in detail. Click on the right month to have month view, the sort by list, week or day view.

Mon
Tue
Wed
Thu
Fri
Sat
Sun
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
June
June
June
June

Webinar Archive

Webinar: Tenable.ep Product Overview

This is a routine hour long technical overview, highly essential and recommended for existing customers who are now using any vulnerability assessment or new customer intent to make use of Tenable.ep as your vulnerability management solution. During this session, we will explore Tenable.ep through the introduction of the product and its two important key features;
Post event video summary, spread into three video Part 1 focus on app security testing market change and challenges, cloud migration and standard, specific controls requirements Part 2 focus on the Thunderscan SAST product update. Part 3 focus on the Webstrike DAST product update. For existing and new customers and partners, it is our pleasure

Webinar Veracode Static Analysis (SAST)

This is routine hour long technical overview, highly essential and recommends for existing customers who are intent to consider static analysis / secure code review or static application security testing (SAST) to Veracode Static Analysis, to know how it is workings and covers all the latest build release feature, as well as cover frequently asks
This is a routine hour long technical overview, highly essential and recommended for customers who are considering to running Penetration Security Testing with Core Impact. The session talked about Core Impact product overview and the features highlight. This session will cover all those usage cases and how it will help to uses the advanced Proof-Based
This is routine hour long technical overview, highly essential and recommends for existing customers who are intent to addon to Immunity Canvas & Exploitation Pack, to know how it is workings and covers all the latest build release feature, as well as cover frequently asks questions (FAQs), it need to be use with CANVAS Exploitation

Webinar Hex-Rays IDA Pro and Decompiler

This is a routine hour long technical overview, highly essential and recommended for customers,  who are considering to running Webinar Hex-Ray IDA Pro and Decompilers product. Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market and is independent of governmental agencies and stock market pressure.
This is a routine hour long technical overview, highly essential and recommended for customers,  who are considering to running Static Application Security Testing (SAST) with ThunderScan Desktop & Enterprise . The best way to ensure that your applications are free from critical vulnerabilities is to perform a comprehensive audit of application source code using ThunderScan.
This is a routine hour long technical overview, highly essential and recommended for customers,  who are considering to running (DAST) Dynamic Application Security Testing with Burp Suite product . It’s the best solution out there for many use cases and it includes the world’s most widely used web vulnerability scanner for both manual (Burp Suite
https://youtu.be/FT13yv34zWE

Netsparker Enterprise video walkthroughs

https://youtu.be/FT13yv34zWE This post documents down the recent webinar series E-SPIN provides to the customers and partners.  For the portion of the typical being ask questions and turn into Netsparker Enterprise video walkthroughs that capture the essential for the websinars and make it replay-able for the rest of the audience who found it helpful. Invicti acquired
This is a routine hour long technical overview, highly essential and recommended for customers who are considering to running automated Web Application Security Testing with Netsparker Enterprise. The session talked about Netsparker Enterprise product overview and the features highlight. This session will cover all those usage cases and how it will help to uses the
This post documents down the recent webinar series E-SPIN provides to the customers and partners.  For the portion of the typical being ask questions and turn into Netsparker scanning overview video walkthroughs that capture the essential for the websinars and make it replay-able for the rest of the audience who found it helpful. Invicti acquired
This post documents down the recent webinar series E-SPIN provides to the customers and partners.  For the portion of the typical being ask questions and turn into Netsparker reporting overview video walkthroughs that capture the essential for the websinars and make it replay-able for the rest of the audience who found it helpful. Invicti acquired
This post documents down the recent webinar series E-SPIN provides to the customers and partners.  For the portion of the typical being ask questions and turn into Netsparker feature overview video walkthroughs that capture the essential for the websinars and make it replay-able for the rest of the audience who found it helpful. Invicti acquired
This is a routine hour long technical overview, highly essential and recommended for customers who are  considering to running Web Application Security Scanner with Netsparker Desktop Scanner. You can not manage something you can not measure, so this session will cover all those usage cases and how it will help to uses the advanced Proof-Based
This is archived of the webinar conducted on 2020-Jun-18 2 pm – 3 pm for registered participants. For those who missed it, feel free replay from the record of the session below. This is a routine hour long technical overview, highly essential and recommended for customers who are  considering making use of LiveNX Enterprise Network
This is archived of the webinar conducted on 2020-Jun-18 3 pm – 4 pm for registered participants. For those who missed it, feel from the record of the session below. This is a routine hour long technical overview, highly essential and recommended for existing customers who are now using any vulnerability assessment and intent to
This is archived of the webinar conducted on 2020-Jun-18 10 am – 11 am for registered participants. For those who missed it, feel from the record of the session below. This is routine hour long technical overview, highly essential and recommends for existing customers who are intent to addon to Immunity CANVAS SCADA+ Exploitation Pack,
This is archived of the webinar conducted on 2020-Jun-18 10 – 11am for registered participants. For those who missed it, feel from the record of the session below. This is a routine hour long technical overview, highly essential and recommended for existing customers who are  considering making use of gray box testing to enrich or
This is archived of the webinar conducted on 2020-Jun-16 11 am – 12 noon for registered participants. For those who missed it, feel from the record of the session below. This is a routine hour long technical overview, highly essential and recommended for existing customers who are  considering making use of Tenable.io cloud based vulnerability
This is archived of the webinar conducted on 2020-Jun-11 11 am – 12 noon for registered participants. For those who missed it, feel from the record of the session below. This is a routine hour long technical overview, highly essential and recommended for existing customers who are considering making use of Paws Studio for network
Tagged under:
This is a routine hour long technical overview, highly essential and recommended for existing customers who are now using any application security testing (AST) and considering and want to have a refresh for modern application security testing (AST) landscape. The session is called to address more and more customers who previously invested in the AST,
This is archived of the webinar conducted on 2020-Jun-9 11 am – 12 noon for registered participants. For those who missed it, feel from the record of the session below. This is routine hour long technical overview, highly essential and recommends for existing customers who are using Nessus Professional vulnerability scanner,  a deployed vulnerability assessment
Tagged under:
This is archived of the webinar conducted on 2020-Jun-11 10am – 11am for registered participants. For those who missed it, feel from the record of the session below. This is a routine hour long technical overview, highly essential and recommended for existing customers who are  considering making use of Application Performance Monitoring (APM) or attempting
This is archived of the webinar conducted on 2020-Jun-4 3 pm – 4 pm for registered participants. For those who missed it, feel from the record of the session below. This is a routine hour long technical overview, highly essential and recommended for existing customers who are considering making use of PRTG Network Monitoring for
This is archived of the webinar conducted on 2020-Jun-4 10am – 11am for registered participants. For those who missed it, feel from the record of the session below. This is routine hour long technical overview, highly essential and recommends for existing customers who are upgraded to v13, to know how it is workings and covers

CONTINUING PROFESSIONAL DEVELOPMENT (CPD)

In the changing world in the speed of light, we either adopt continuing professional development (CPD) as an approach to learn and master the emerging technology and know how to use them, or acquired new competency skills for changing nature of the profession requirements, prepared for the future of the workplace requirement.

Below are some of the features, latest, popular online courses dynamically pool from course section to cater for the CPD. It is for professionals who are on top of traditional physical or web live instructor training classes we offer, to cater for busy professionals who need flexibility to study at their own pace, but eventually complete the learning objectives they are set for themselves.

Discussion Forums

To facilitate the learning, we cater a forum that is used for discussion, to clarify or to ask questions, specifically for courses or for trainees, to tap the collective working knowledge for the rest of the peer in the same class or industry existing practitioner field knowledge and experience.

TOP