The Hsinchu Wishun centre
子目錄 (1)
探索我們的課程
Last Updated:
客戶評論 (22)
風險主題概述和考試準備
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
機器翻譯
培訓師在該領域的知識和經驗
Marcin - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
機器翻譯
Hazem 最近有通過考試的經驗,並且知道陷阱以及 ISC 如何構建問題的方式。
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
機器翻譯
從培訓師那裡接收資訊的方式
Mohamed Romdhani - Shams Power
Course - CISM - Certified Information Security Manager
機器翻譯
我喜歡呈現資訊的速度和方式。此外,結構和斷裂非常清晰。對我來說完美!
Martin - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISM - Certified Information Security Manager
機器翻譯
他如何與我們CISM培訓參與者互動
Aleksandra - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISM - Certified Information Security Manager
機器翻譯
支持培訓的真實示例和視頻。
Lukasz Matusz - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISM - Certified Information Security Manager
機器翻譯
通過ISACA邏輯的問題和解釋
Joanna - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISM - Certified Information Security Manager
機器翻譯
滲透測試員的技能是什麼證明老師
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Ethical Hacker
機器翻譯
Very knowledgeable trainer, was able to adjust to audience knowledge, excellent industry experience and ability to relate to audience needs Excellent content preparation , tailored to needs discussed beforehand. Good supplement reading materials prepared by trainer
Oliver Steinig - Bosch
Course - IoT Security Architecture
Level of expertise from the trainer Use case examples
Pierre Maillot - Bosch
Course - IoT Security Architecture
我喜歡更新有關網路安全的各種主題的知識。我對網路攻擊、它們是如何發生的以及我們(作為一個組織)可以做些什麼來嘗試減輕任何風險越來越感興趣。 我確實提出了一個關於網路攻擊中的人工智慧的問題,答案非常深入和有趣,現場給出了一個活生生的例子。
Siobhan
Course - Executive Cyber Security Awareness
機器翻譯
- Understanding that ATT&CK creates a map that makes it easy to see, where an organization is protected and where the vulnerable areas are. Then to identify the security gaps that are most significant from a risk perspective. - Learn that each technique comes with a list of mitigations and detections that incident response teams can employ to detect and defend. - Learn about the various sources and communities for deriving Defensive Recommendations.
CHU YAN LEE - PacificLight Power Pte Ltd
Course - MITRE ATT&CK
All is excellent
Manar Abu Talib - Dubai Electronic Security Center
Course - MITRE ATT&CK
我發現了新的東西。
Cristian
Course - OpenStack Security
機器翻譯
Depth of knowledge. A true SME in Openstack. Patient and very helpful. Explained complex topics in an understandable and digestible way.
Jake McIlwaine - Gamma
Course - OpenStack Security
講師擁有非常廣泛的知識,並致力於他的工作。他能夠讓聽眾對他的課程感興趣。培訓範圍完全符合我的期望。
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - MasterClass Certified Ethical Hacker Program
機器翻譯
我很享受整個培訓課程,對於我一直在考慮的潛在新職業選擇非常方便。
Christopher - The Growth Company
Course - Cyber Security Awareness Training
機器翻譯
I enjoyed the whole training session, very handy for a potential new career option, which i have been considering.
Christopher Crompton - The Growth Company
Course - Cyber Security Awareness Training
the live examples
Lee-Ann Cozyn - Vodacom
Course - Cybersecurity Fundamentals - A Practical Course
我喜歡動手實驗,因為它們很有吸引力,而且非常有知識共用
Sinoxolo - Vodacom
Course - Cyber Security Body of Knowledge (CyBOK)
機器翻譯
我從這次培訓中獲得了大量的新資訊/知識!
David - Vodacom
Course - Cyber Security Body of Knowledge (CyBOK)
機器翻譯