TRAINING SERVICES

Most successful cyberattacks exploit the weakest link in the chain: the human factor. Our specialized training is designed to empower your entire team, from operational staff to senior management. We cover essential topics such as identifying phishing emails, secure password management, and awareness of the latest cyber threats.

We offer customized training programs tailored to the specific needs of your company and each department. With our interactive and practical approach, we ensure that knowledge is not only imparted but also applied in everyday work. This helps create a proactive security culture, where every employee becomes a guardian of information.

By investing in training for your team, you not only reduce the risk of a security incident, but also foster trust and professionalism within your organization. It’s an investment that protects your digital assets and strengthens your business from the inside out.

Tabla de Capacitaciones
Tema Curso Duración
ITIL ITIL® 4 Foundation 3
RESILIA Resilia™ Foundation 3
Agile Shift AgileSHIFT® 2
Lean IT LITA Lean IT Foundation 3
Management 3.0 Management 3.0 2
Gestión de Proveedores BCS SIAM® Foundation 3
Big Data CCC Big Data Foundation 3
Cloud Computing EXIN CCC Cloud Technology Associate 3
EXIN CCC Cloud Virtualization Essentials 3
EXIN CCC Professional Cloud Administrator 3
EXIN CCC Professional Cloud Service Manager 3
EXIN CCC Professional Cloud Solution Architect 3
EXIN Cloud Computing Foundation 2
COBIT COBIT® 2019 Foundation 3
COBIT® 5 Foundation 3
COBIT® 5 Implementation 3
COBIT® 5 Assessor 3
PMI PM Foundation 3
PMP® Exam Preparation (Curso + 1 examen) 5
PMP® Exam Preparation (solo curso) 5
SCRUM Scrum Master Certified (SMC®) 2
Scrum Product Owner Certified (SPOC®) 2
Agile SCRUM Foundation 2
Scrum Master Certified (SMC®) (On-Line) 2
Scrum Developer Certified (SDC®) (On-Line) 2
SCRUMstudy Agile Master Certified (SAMC™) (On-Line) 2
Scrum Product Owner Certified (SPOC®) (On-Line) 2
JIRA JIRA Foundation (e-learning) 0.31
ISO 20000 / 27001 IT Service Management Foundation based on ISO/IEC 20000 3
Specialist in IT Service Management based on ISO/IEC 20000 5
ISO/IEC 20000-1:2018 Implementation 3
ISO/IEC 20000:2018 Lead Auditor 5
Information Security Foundation based on ISO/IEC 27001 3
ISO/IEC 27001:2013 Implementation 3
Information Security Risk Management based on ISO 27005 3
ISO/IEC 27001:2013 Internal Auditor 3
ISO/IEC 27001:2013 Lead Auditor 5
Seguridad de la Información Cybersecurity Professional based on ISO/IEC 27032:2012 3
Ethical Hacking Foundation 2
Cyber and IT Security Foundation 2
Certified Information Security Manager (CISM) 5
CISSP (Certified Information Systems Security Professional) 5
Information Security Awareness (e-learning) 0.4
Auditoría de TI Certified Information Systems Auditor (CISA) 5
IT Risk Management 3
Gestión de Riesgos Certified in Risk and Information Systems Control (CRISC) 5
Risk Management Foundation based on ISO 31000 3
Business Impact Analysis (BIA) 2
Continuidad del Negocio Business Continuity Management Foundation 3
ISO 22301:2019 Implementation 5
ISO 22301:2019 Lead Auditor 2.5
TOGAF TOGAF® 9 Foundation 2.5
TOGAF® 9 Certified 2.5
TOGAF® 9 Bundle 5
Diseño e Implementación Process Design and Implementation 5
Gobierno de TI IT Governance Foundation based on ISO/IEC 38500 2
Certified in the Governance of Enterprise IT (CGEIT) 5
MAAGTICSI MAAGTICSI Foundation 3
Combos IT Security Risk and Continuity Week 5
DevOps Week 5
Cybersecurity Week 5
IT Agility Week 5
Enterprise Agility Week 5
Business Continuity Week 5
Scrum Week 5
15

Years of experience in cybersecurity

80

Security Projects

5000

Vulnerabilities

90

Protected companies

What do we do?

We are a company specializing in cybersecurity. We offer services such as ethical hacking, red teaming, vulnerability analysis, code analysis, social engineering, and support for the implementation, evaluation, and auditing of standards, regulations, and best practices such as ISO 27001, PCI DSS, ISO 27032, NIST, CIS, FFIEC, SWIFT, and CMMI. We also provide general services in information security and cybersecurity.

Our team of professionals has worked for the following companies: