Consulting and Educational Services
ISS’ SAFEsuite delivers years of network security experience in astructured, easily understood format. ISS increases the value of these
award-winning applications with a full range of professional
consulting services to help each enterprise customer with an
individualized level of care. From overburdened IT staff with limited
network security resources to organizations needing immediate
assistance with a serious breach in security, ISS has experienced
network security professionals ready to assist.
ISS SecureU provides targeted educational programs to meet the needs
of IT security professionals. These programs include courses in the
fundamentals of security and networking, vulnerability management,
threat management and intrusion detection, public key infrastructures,
firewalls, and others. Each course offers the option of certification via
standardized examinations.
Building on the X-Force’s extensive security knowledge, Knowledge
Services offers a range of additional security research and advisory
services. Knowledge Services is a critical element of Internet Security
Systems’ total solution to e-business security.
Security Assessment Services (SAS)
The SAS team provides a comprehensive range of Security Assessmentstailored to fit the requirements of each client. Services range from
secure network architecture and application reviews, through to
penetration testing and Ethical Hacking programs. SAS continues to
prove that the combination of top security consultants, structured
assessment methodologies and utilization of leading edge hacking
developments provide the most detailed security assessment and best
value service currently available on the market.
The SAS consultants are responsible for providing all the information
contained within this Ethical Hacking course and for consistently
keeping it up to date with the leading edge of hacking developments.
Exploit techniques used during our assessments are based on
vulnerability research performed by our renowned X-Force team, and
draw upon extensive security knowledge gathered by our Knowledge
Services.
No comments:
Post a Comment