Training services in the field of of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection; Conducting training events, namely, classes, seminars, conferences and workshops in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection | Software as a service (SAAS) services featuring software for training and skills assessment in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection; Evaluation to determine technical skills and qualifications in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection
Class 041: Training in the field of cyber readiness; educational services, namely, classes, seminars, training events, and workshops in the field of cyber readiness
Class 041: Training services in the field of cyber security; educational services, namely, classes, seminars, online classes and educational assessment in the field of cyber security
Workshops and seminars in the field of internet security, network security and computer security; educational services, namely, providing courses, workshops, seminars, classes, training programs, teleclasses, teleworkshops, seminars, conferences, webinars, on-line classes, on-line workshops, on-line seminars, on-line training programs, on-line seminars, on-line non-downloadable educational videos in the field of internet security, network security and computer security; teaching and training in internet security, network security and computer security; organizing live exhibitions and conferences in the field of internet security, network security and computer security for educational purposes; Computer hardware and computer software for training and skills assessment in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection; Providing marketing consulting in the field of internet security, network security and computer security; organizing live exhibitions and conferences in the field of internet security, network security and computer security for commercial purposes; "SECURITY"; Computer security consultancy in the field of scanning and penetration testing of computer hardware, software and networks to assess information security vulnerability; Computer security consultancy in the field of internet security, network security and computer security; development of software and hardware for secure network operations; technological services, namely, technological research and design in the field of internet security, network security and computer security
Workshops and seminars in the field of internet security, network security and computer security; educational services, namely, providing courses, workshops, seminars, classes, training programs, teleclasses, teleworkshops, seminars, conferences, webinars, on-line classes, on-line workshops, on-line seminars, on-line training programs, on-line seminars, on-line non-downloadable educational videos in the field of internet security, network security and computer security; teaching and training in internet security, network security and computer security; organizing live exhibitions and conferences in the field of internet security, network security and computer security for educational purposes; Computer hardware and computer software for training and skills assessment in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection; Providing marketing consulting in the field of internet security, network security and computer security; organizing live exhibitions and conferences in the field of internet security, network security and computer security for commercial purposes; "SECURITY"; Computer security consultancy in the field of scanning and penetration testing of computer hardware, software and networks to assess information security vulnerability; Computer security consultancy in the field of internet security, network security and computer security; development of software and hardware for secure network operations; technological services, namely, technological research and design in the field of internet security, network security and computer security
Computer hardware and computer software for training and skills assessment in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection | Training in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection; Conducting training events in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection; Evaluation to determine technical skills and qualifications in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection | Software as a service (SAAS) services featuring software for training and skills assessment in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection