Services
▼
PENETRATION TESTS
▼
Web Application Penetration Testing
Mobile Application Penetration Testing
IoT Penetration Testing
Network Infrastructure Penetration Testing
Vulnerability Scanning
Source Code Vulnerability Review
RED TEAMING & SOCIAL ENGINEERING
▼
Blue Team – Incident Response Processes
Social Engineering
Threat-Led Penetration Testing (TLPT)
OSINT – Open Source Intelligence
CyberAwareness Employee Training
CYBERSECURITY, ISO & COMPLIANCE
▼
ISO Standards Implementation
Ensuring Regulatory Compliance
vCISO
Trainings
Products
EU Projects
Case studies
Blog
About us
Contact
Services
PENETRATION TESTS
Web Application Penetration Testing
Mobile Application Penetration Testing
IoT Penetration Testing
Network Infrastructure Penetration Testing
Vulnerability Scanning
Source Code Vulnerability Review
RED TEAMING AND SOCIAL ENGINEERING
Red Teaming
Blue Team – Incident Response Processes
Social Engineering
phishing, smishing, vishing, physical entry (infiltration)
Threat-Led Penetration Testing (TLPT)
OSINT – Open Source Intelligence
CyberAwareness Employee Training
CYBERSECURITY, ISO AND COMPLIANCE
ISO Standards Implementation
ISO 27001, ISO 22301, ISO 9001, ISO 42001, ISO 31000, ISO 27017
Ensuring Regulatory Compliance
NIS2, ISO /SOC2, PCI DSS, BAFA
vCISO
Trainings
Products
EU Projects
Case studies
Blog
About us
Contact
Select Page
Knowledge
Categories
Case Study
Completed trainings
Guide
News
Security
Services
Training
Archiwum
June 2025
May 2025
March 2020
February 2020
January 2020
December 2019
July 2019
June 2019
May 2019
April 2019
March 2019
December 2018