TRAINING SERVICES
Most successful cyberattacks exploit the weakest link in the chain: the human factor. Our specialized training is designed to empower your entire team, from operational staff to senior management. We cover essential topics such as identifying phishing emails, secure password management, and awareness of the latest cyber threats.
We offer customized training programs tailored to the specific needs of your company and each department. With our interactive and practical approach, we ensure that knowledge is not only imparted but also applied in everyday work. This helps create a proactive security culture, where every employee becomes a guardian of information.
By investing in training for your team, you not only reduce the risk of a security incident, but also foster trust and professionalism within your organization. It’s an investment that protects your digital assets and strengthens your business from the inside out.
| Tema | Curso | Duración |
|---|---|---|
| ITIL | ITIL® 4 Foundation | 3 |
| RESILIA | Resilia™ Foundation | 3 |
| Agile Shift | AgileSHIFT® | 2 |
| Lean IT | LITA Lean IT Foundation | 3 |
| Management 3.0 | Management 3.0 | 2 |
| Gestión de Proveedores | BCS SIAM® Foundation | 3 |
| Big Data | CCC Big Data Foundation | 3 |
| Cloud Computing | EXIN CCC Cloud Technology Associate | 3 |
| EXIN CCC Cloud Virtualization Essentials | 3 | |
| EXIN CCC Professional Cloud Administrator | 3 | |
| EXIN CCC Professional Cloud Service Manager | 3 | |
| EXIN CCC Professional Cloud Solution Architect | 3 | |
| EXIN Cloud Computing Foundation | 2 | |
| COBIT | COBIT® 2019 Foundation | 3 |
| COBIT® 5 Foundation | 3 | |
| COBIT® 5 Implementation | 3 | |
| COBIT® 5 Assessor | 3 | |
| PMI | PM Foundation | 3 |
| PMP® Exam Preparation (Curso + 1 examen) | 5 | |
| PMP® Exam Preparation (solo curso) | 5 | |
| SCRUM | Scrum Master Certified (SMC®) | 2 |
| Scrum Product Owner Certified (SPOC®) | 2 | |
| Agile SCRUM Foundation | 2 | |
| Scrum Master Certified (SMC®) (On-Line) | 2 | |
| Scrum Developer Certified (SDC®) (On-Line) | 2 | |
| SCRUMstudy Agile Master Certified (SAMC™) (On-Line) | 2 | |
| Scrum Product Owner Certified (SPOC®) (On-Line) | 2 | |
| JIRA | JIRA Foundation (e-learning) | 0.31 |
| ISO 20000 / 27001 | IT Service Management Foundation based on ISO/IEC 20000 | 3 |
| Specialist in IT Service Management based on ISO/IEC 20000 | 5 | |
| ISO/IEC 20000-1:2018 Implementation | 3 | |
| ISO/IEC 20000:2018 Lead Auditor | 5 | |
| Information Security Foundation based on ISO/IEC 27001 | 3 | |
| ISO/IEC 27001:2013 Implementation | 3 | |
| Information Security Risk Management based on ISO 27005 | 3 | |
| ISO/IEC 27001:2013 Internal Auditor | 3 | |
| ISO/IEC 27001:2013 Lead Auditor | 5 | |
| Seguridad de la Información | Cybersecurity Professional based on ISO/IEC 27032:2012 | 3 |
| Ethical Hacking Foundation | 2 | |
| Cyber and IT Security Foundation | 2 | |
| Certified Information Security Manager (CISM) | 5 | |
| CISSP (Certified Information Systems Security Professional) | 5 | |
| Information Security Awareness (e-learning) | 0.4 | |
| Auditoría de TI | Certified Information Systems Auditor (CISA) | 5 |
| IT Risk Management | 3 | |
| Gestión de Riesgos | Certified in Risk and Information Systems Control (CRISC) | 5 |
| Risk Management Foundation based on ISO 31000 | 3 | |
| Business Impact Analysis (BIA) | 2 | |
| Continuidad del Negocio | Business Continuity Management Foundation | 3 |
| ISO 22301:2019 Implementation | 5 | |
| ISO 22301:2019 Lead Auditor | 2.5 | |
| TOGAF | TOGAF® 9 Foundation | 2.5 |
| TOGAF® 9 Certified | 2.5 | |
| TOGAF® 9 Bundle | 5 | |
| Diseño e Implementación | Process Design and Implementation | 5 |
| Gobierno de TI | IT Governance Foundation based on ISO/IEC 38500 | 2 |
| Certified in the Governance of Enterprise IT (CGEIT) | 5 | |
| MAAGTICSI | MAAGTICSI Foundation | 3 |
| Combos | IT Security Risk and Continuity Week | 5 |
| DevOps Week | 5 | |
| Cybersecurity Week | 5 | |
| IT Agility Week | 5 | |
| Enterprise Agility Week | 5 | |
| Business Continuity Week | 5 | |
| Scrum Week | 5 |
Years of experience in cybersecurity
Security Projects
Vulnerabilities
Protected companies
What do we do?
We are a company specializing in cybersecurity. We offer services such as ethical hacking, red teaming, vulnerability analysis, code analysis, social engineering, and support for the implementation, evaluation, and auditing of standards, regulations, and best practices such as ISO 27001, PCI DSS, ISO 27032, NIST, CIS, FFIEC, SWIFT, and CMMI. We also provide general services in information security and cybersecurity.
Our team of professionals has worked for the following companies:















