Skip to content
Home
About us
Cyber College
Services
Monitoring and listening
Eavesdropping detection
intelligence
investigations
surveillance
Combat Training
Infrastructure security
Counter-terrorism training
Operational drivers
Security of delegations
Personal security
Advanced Due Diligence
Cyber Security
Cyber
Cyber Intelligence
Penetration Testing
API Penetration Testing
Applicative Penetration Testing
Cloud Penetration Testing
IoT Penetration Testing
Mobile Penetration Testing
Network Penetration Testing
OT SCADA Penetration Testing
Physical Penetration Testing
Social Engineering Penetration Testing
Web Application Penetration Testing
Wireless Penetration Testing
Forensics and Investigation
Security Consulting
Ciso as a service
Insider Threat
360° Cyber Defense
Ransomware Protection
Email Protections
Firewalls & Malware Protection
GRC Compliance
Incident Response Proposal
SOC as a Service
GRC
Introduction to GRC Compliance Services
SOC 2 Compliance Trust Through Security and Privacy Controls
ISO 27001 International Standard for Information Security Management
GDPR Protecting Personal Data in the European Union
HIPAA Safeguarding Protected Health Information in the U.S.
Israel Privacy Protection Regulations Localized Data Privacy Compliance
ISO 27799 Health Informatics Information Security Management
ISO 27701 Privacy Information Management System
ISO 27017 Cloud Security Controls and Guidelines
ISO 27018 Privacy Protection in Public Cloud
ISSS Information Security Standards for Securities in Israel
ISSCM Information Security Standards for the Capital Market in Israel
NCSF National Cyber Security Framework in Israel
Additional Key Regulations We Support
Projects
Management
Certificates
Articles
מאמרים
Contact Us
Home
About us
Cyber College
Services
Monitoring and listening
Eavesdropping detection
intelligence
investigations
surveillance
Combat Training
Infrastructure security
Counter-terrorism training
Operational drivers
Security of delegations
Personal security
Advanced Due Diligence
Cyber Security
Cyber
Cyber Intelligence
Penetration Testing
API Penetration Testing
Applicative Penetration Testing
Cloud Penetration Testing
IoT Penetration Testing
Mobile Penetration Testing
Network Penetration Testing
OT SCADA Penetration Testing
Physical Penetration Testing
Social Engineering Penetration Testing
Web Application Penetration Testing
Wireless Penetration Testing
Forensics and Investigation
Security Consulting
Ciso as a service
Insider Threat
360° Cyber Defense
Ransomware Protection
Email Protections
Firewalls & Malware Protection
GRC Compliance
Incident Response Proposal
SOC as a Service
GRC
Introduction to GRC Compliance Services
SOC 2 Compliance Trust Through Security and Privacy Controls
ISO 27001 International Standard for Information Security Management
GDPR Protecting Personal Data in the European Union
HIPAA Safeguarding Protected Health Information in the U.S.
Israel Privacy Protection Regulations Localized Data Privacy Compliance
ISO 27799 Health Informatics Information Security Management
ISO 27701 Privacy Information Management System
ISO 27017 Cloud Security Controls and Guidelines
ISO 27018 Privacy Protection in Public Cloud
ISSS Information Security Standards for Securities in Israel
ISSCM Information Security Standards for the Capital Market in Israel
NCSF National Cyber Security Framework in Israel
Additional Key Regulations We Support
Projects
Management
Certificates
Articles
מאמרים
Contact Us
Ministry of Defense
supplier: 11023925
+972-747-661-338
Ministry of Defense supplier: 11023925
Home
It seems we can't find what you're looking for.
Accessibility Toolbar
close
Toggle the visibility of the Accessibility Toolbar
keyboard
Keyboard Navigation
visibility_off
Disable Animations
nights_stay
Contrast
format_size
Increase Text
text_fields
Decrease Text
font_download
Readable Font
title
Mark Titles
link
Highlight Links & Buttons