Cybersecurity Solutions

We can offer:

1. Penetration testing (IT Security Checks).
2. Penetration testing process implementation and management in a company or organization.
3. Comprehensive penetration testing trainings for companies that would like to start offering professional penetration testing services to their clients.
4. Consulting on all cyber space issues.
5. Forensics / Malware Protection / Rapid Reaction Team
6. Cyber Security Management
7. Penetration Testing / IT Security Courses
8. Critical Infrastructure Protection, Espionage, information leaks / sabotage prevention
9. Increasing protection against the external threats
10. Cyber Protection for Government


Competences:

Cyber Security Checks / Penetration Testing

- IT / Web / Mobile / Application Penetrations tests.
- Automated penetration testing
- Manual penetration testing (human expertise)
- Penetration testing process implementation and management.
- Vulnerability scans / Vulnerability management.
- Penetration testing laboratory.
- Penetration testing tools development.
- Penetration testing projects.
- Security Scanning  (IT-Infrastructure / Web)
- Source Code Review
- Firewall / Wireless / OS
- Mobile Devices / Software Penetrations tests (iOS , Android, Blackberry, Win, etc.)
- Reverse Engineering / Software Reversing
- Post Exploitations
- Social Engineering
- Exploits / SQL-Injections, Cross-site-scripting / XSS, etc.,
- Exploiting / “Live Hacking”, Sniffing, Denial of Service Tests, Password Cracking


IT-Security

- Web Application security
- OS System Hardening – Unix and Windows Systems
- Threat Modelling
- Application Security Testing
- Secure Software Development / Training
- Embedded Device Security Testing
- Vulnerability Research
- Exploit and Shell code Development
- Forensic Analysis and Malware Analysis
- System Security Design Reviews

 
Cyber Protection for Government.

- Creation of possible systems and methods for total control.
- Espionage, information leaks / sabotage prevention.
- Increasing protection against the external threats.
- Protecting against Cyber-Terrorism.
- Cyber-Propaganda protection.
- Consulting on cyber attack prevention.
- Creation of Cyber security methods.
- Critical Infrastructure Protection.
- Consulting on various cyber crimes.
 
Malware Protection / Forensics / Rapid Reaction Team

- Analysis of the newest and most dangerous viruses/ malware
- Rapid Reaction Team immediately reacts to all incidents
- Malware, viruses, spyware identification / search
- Protection from viruses and malware
- Post-Incident analysis
- Malware laboratory
- Cyber Security learning
- Cyber security projects

Penetration Testing Standards

- OSSTMM (Open Source Security Testing Methodology Manual)
- OWASP Code Review Project (Code Review Analyse)
- OWASP Mobile Security Project
- OWASP Open Web Application Security Project
- German  BSI
- www.pentest-standard.org