Consulting services in the field of computer cyber security; Providing online non-downloadable training software for Information Technology computer, Network and security Certification Training and practice test in the fields of computer cybersecurity, computer education, information technology, computer cybersecurity legal compliance, computer ethics, business computer information security, computer technology for performing background investigations, information technology skills, and information technology certification; Consulting services in the fields of Information Technology design, installation and security, Policy, procedure, Laws, Regulations implementation and compliance procedures; Computer security consultancy in the nature of advanced cybersecurity to detect and remediate advanced persistent threats and insider threats and include offensive cyber capabilities; Computer security threat analysis for protecting data; Computer security services in the nature of administering digital certificates; Encryption and decryption of data; Authentication of data, namely, of digital certificates; Scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security consultancy in the fields of identity and access management software solutions; Electronic signature verification services using technology to authenticate user identity through multi-factor authentication, issuance and validation of digital certificates, public key infrastructure (PKI), and security operating center tools; Computer server hosting services, namely, hosting online virtual desktop environments through use of hosted computer hardware and computer software resources for secure remote encrypted access to mission applications and information; Data migration services; Installation and maintenance of computer software; Information technology consulting services; Computer network security, information technology systems security, and mobile device software security consultancy
Computer and ScientificConsulting services in the field of computer privacy laws; Consulting services in the field of regulatory development, namely, reviewing standards and practices to assure compliance with NIST, ISO, SCF, PCI DSS, COBIT 5, ENISA, FISMA, FedRAMP, OWASP, PCI, DoD, NAVY, ARMY, Risk Management Framework (RMF), OMB M-19-03, HIPAA, OMB, Homeland Security Act, Gramm-Leach Bliley Act, PII, PIA, FIPS, NSTISSP, NASA, FAR, CFAA, laws and regulations; Reviewing information technology standards and practices to assure compliance with laws and regulations
Personal