Grand Hyatt Muscat
Testimonials (19)
Instructor delivery of information; At the end of the day it was Gaurav who pulled off this topic focusing on building strong fundamentals and devising a methodology to be retained with us
Raheal Akhtar - Dubai Government Human Resources Department
Course - Certified Ethical Hacker
The way to receive the information from the trainer
Mohamed Romdhani - Shams Power
Course - CISM - Certified Information Security Manager
I liked the pace and the way of presenting information. Also the structure and breaks was very clear. For me perfect!
Martin - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISM - Certified Information Security Manager
How he was interacting with us CISM training participants
Aleksandra - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISM - Certified Information Security Manager
Real life examples and videos supporting training.
Lukasz Matusz - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISM - Certified Information Security Manager
Going through the questions and explanation of ISACA logic
Joanna - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISM - Certified Information Security Manager
I enjoyed the whole training session, very handy for a potential new career option, which i have been considering.
Christopher - The Growth Company
Course - Cyber Security Awareness Training
I enjoyed the whole training session, very handy for a potential new career option, which i have been considering.
Christopher Crompton - The Growth Company
Course - Cyber Security Awareness Training
the live examples
Lee-Ann Cozyn - Vodacom
Course - Cybersecurity Fundamentals - A Practical Course
I enjoyed the hands on labs because they were engaging and very knowledge sharing
Sinoxolo - Vodacom
Course - Cyber Security Body of Knowledge (CyBOK)
The huge amount of new information/knowledge I gained from this training!
David - Vodacom
Course - Cyber Security Body of Knowledge (CyBOK)
I enjoyed refreshing my knowledge on the various subjects on cyber security. I was increasingly interested around cyber attacks, how they happen and what we (as an organisation) could potentially do to try and mitigate any risks. I did raise a question around AI in cyber attacks, and the answer was very in depth and interesting with a live example given on the spot.
Siobhan
Course - Executive Cyber Security Awareness
Very knowledgeable trainer, was able to adjust to audience knowledge, excellent industry experience and ability to relate to audience needs Excellent content preparation , tailored to needs discussed beforehand. Good supplement reading materials prepared by trainer
Oliver Steinig - Bosch
Course - IoT Security Architecture
Level of expertise from the trainer Use case examples
Pierre Maillot - Bosch
Course - IoT Security Architecture
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
- Understanding that ATT&CK creates a map that makes it easy to see, where an organization is protected and where the vulnerable areas are. Then to identify the security gaps that are most significant from a risk perspective. - Learn that each technique comes with a list of mitigations and detections that incident response teams can employ to detect and defend. - Learn about the various sources and communities for deriving Defensive Recommendations.
CHU YAN LEE - PacificLight Power Pte Ltd
Course - MITRE ATT&CK
All is excellent
Manar Abu Talib - Dubai Electronic Security Center
Course - MITRE ATT&CK
I found new things.
Cristian
Course - OpenStack Security
Depth of knowledge. A true SME in Openstack. Patient and very helpful. Explained complex topics in an understandable and digestible way.