Skip to content
home
About us
Cyber College
Services
Monitoring and listening
Eavesdropping detection
intelligence
investigations
surveillance
Combat Training
Infrastructure security
Counter-terrorism training
Operational drivers
Security of delegations
Personal security
Advanced Due Diligence
Cyber Security
Cyber
Cyber Intelligence
Penetration Testing
API Penetration Testing
Applicative Penetration Testing
Cloud Penetration Testing
IoT Penetration Testing
Mobile Penetration Testing
Network Penetration Testing
OT SCADA Penetration Testing
Physical Penetration Testing
Social Engineering Penetration Testing
Web Application Penetration Testing
Wireless Penetration Testing
Forensics and Investigation
Security Consulting
Ciso as a service
Insider Threat
360° Cyber Defense
Ransomware Protection
Email Protections
Firewalls & Malware Protection
GRC Compliance
Incident Response Proposal
SOC as a Service
GRC
Introduction to GRC Compliance Services
SOC 2 Compliance Trust Through Security and Privacy Controls
ISO 27001 International Standard for Information Security Management
GDPR Protecting Personal Data in the European Union
HIPAA Safeguarding Protected Health Information in the U.S.
Israel Privacy Protection Regulations Localized Data Privacy Compliance
ISO 27799 Health Informatics Information Security Management
ISO 27701 Privacy Information Management System
ISO 27017 Cloud Security Controls and Guidelines
ISO 27018 Privacy Protection in Public Cloud
ISSS Information Security Standards for Securities in Israel
ISSCM Information Security Standards for the Capital Market in Israel
NCSF National Cyber Security Framework in Israel
Additional Key Regulations We Support
Projects
Management
Certificates
Articles
מאמרים
Contact Us
home
About us
Cyber College
Services
Monitoring and listening
Eavesdropping detection
intelligence
investigations
surveillance
Combat Training
Infrastructure security
Counter-terrorism training
Operational drivers
Security of delegations
Personal security
Advanced Due Diligence
Cyber Security
Cyber
Cyber Intelligence
Penetration Testing
API Penetration Testing
Applicative Penetration Testing
Cloud Penetration Testing
IoT Penetration Testing
Mobile Penetration Testing
Network Penetration Testing
OT SCADA Penetration Testing
Physical Penetration Testing
Social Engineering Penetration Testing
Web Application Penetration Testing
Wireless Penetration Testing
Forensics and Investigation
Security Consulting
Ciso as a service
Insider Threat
360° Cyber Defense
Ransomware Protection
Email Protections
Firewalls & Malware Protection
GRC Compliance
Incident Response Proposal
SOC as a Service
GRC
Introduction to GRC Compliance Services
SOC 2 Compliance Trust Through Security and Privacy Controls
ISO 27001 International Standard for Information Security Management
GDPR Protecting Personal Data in the European Union
HIPAA Safeguarding Protected Health Information in the U.S.
Israel Privacy Protection Regulations Localized Data Privacy Compliance
ISO 27799 Health Informatics Information Security Management
ISO 27701 Privacy Information Management System
ISO 27017 Cloud Security Controls and Guidelines
ISO 27018 Privacy Protection in Public Cloud
ISSS Information Security Standards for Securities in Israel
ISSCM Information Security Standards for the Capital Market in Israel
NCSF National Cyber Security Framework in Israel
Additional Key Regulations We Support
Projects
Management
Certificates
Articles
מאמרים
Contact Us
Ministry of Defense
supplier: 11023925
+972-747-661-338
Ministry of Defense supplier: 11023925
Certificates
Home
»
Certificates
Homeland Security Certificates
Certified-Protection-Professional-(CPP)
Professional Certified Investigator (PCI)
PSP20241023-7-e01wst
תעודת-מדריך-ירי
WhatsApp-Image-2024-06-25-at-16.37
WhatsApp-Image-2024-06-25-at-16.37.39_db3bea97
מדריך-ירי-משטרתי
תעודת-מדריך-ירי---תז-מחוק
ניר-שביט---תעודת-מנהל-ביטחון
WhatsApp-Image-2024-06-25-at-16.37.39_cb829206
מפקח-מטווח---ניר-שביט
CYBER SECURITY
1 -ECC CISO CERTIFICATE , FINAL
2 - CERTIFIED INFORMATION SECURITY MANAGER
3 - CERTIFIED INFORMATION SYSTEMS AUDITOR
4 -ECC CEH CERTIFICATE FINAL
5 - ECC CHFI CERTIFICATE FINAL
6 - ECC ECSA CERTIFICATE
7 - CPEH CERTIFIED PENETRATION TESTER
8 - CERTIFIED PENETRATION TESTER
9 - ECC CND CERTIFICATE FINAL
10 - CISCO CERTIFIED NETWORK PROFESSIONAL ENTERPRISE
11 - HACKING DEFINED EXPERTS
12 -GAQM CERTIFIED PENETRATION TESTER
13 -CISCO CERTIFIED NETWORK ASSOCIATE
14 - CISCO CERTIFIED SPECIALIST - ENTERPRISE CORE
15 - CISCO CERTIFIED SPECIALIST - ENTERPRISE ADVANCED INFRASTRUCTURE IMPLEMENTATION
16 - CERTIFICATE OF ATTENDANCE CPE - CISA
17 - AWS CERTIFIED SOLUTIONS ARCHITECT
18 - COMPTIA SECURITY+ CE CERTIFICATE
19 - IT SERVICE MANAGEMENT
20 - OFFENSIVE SECURITY CERTIFIED PROFESSIONAL
21 - CERTIFICATE OF ATTENDANCE CPE - CISM
22 - COBIT 5 FOUNDATION
23 - ISO27001 information security standard certification
24 -ISO27001 information security standard certification
25 - ISO27001 information security standard certification
PROJECT MANAGEMENT AND MARKETING
1 -CERTIFICATE OF ATTENDANCE
2 - SCRUM MASTER CERTIFIED
3 - PROJECT MANAGEMENT PROFESSIONAL PMP
4 - CORPORATE SALES FUNDAMENTALS
5 - MARKETING RESEARCH FUNDAMENTALS
6 - DIGITAL MARKETING FUNDAMENTALS
7 - MARKETING STRATEGY FUNDAMENTALS
8 -CHIEF EXECUTIVE
9 - SIX SIGMA YELLOW BELT
10 - NEGOTIATION ASSOCIATE
11 - CORPORATE SALES FUNDAMENTALS
12 - PMI Certfication