99673652
Feb 27, 2026
(Based on 44(d) Priority Application)(Based on Intent to Use) Arranging and conducting of training courses in the field of penetration-testing, data security, computer systems security and network security; Technical consulting in the field of cybersecurity risk management training; Providing on-line training courses in the field of penetration-testing, data security, computer systems security and network security; Computer education training services; Educational testing services; Online educational testing services; Providing training for certification in the field of cyber security, penetration-testing, data security, computer systems security and network security; Providing information relating to education services; Education services, namely, providing tutorials and conferences in the field of cyber security; Educational services, namely, providing workshops, tutorials, seminars and conferences in the fields of penetration-testing, data security, computer systems security and network security; Providing training for certification in the field of cyber security; Training services in the field of computer software development; Training services in the field of of computer hardware relating to cyber security (Based on Intent to Use) Arranging and conducting of training courses in the field of cyber security; Providing on-line training courses in the field of cyber security; Education services, namely, providing workshops and seminars in the field of cyber security
Education and EntertainmentScientific and technological services, namely, computer technology consultancy in the field of cyber security, penetration-testing, data security, computer systems security and network security; Quality control for others; Computer software development; Computer system analysis; Computer security consultancy; Internet security consultancy; Computer security threat analysis for protecting data; Recovery of computer data; Technology consultation in the field of cybersecurity; Data security consultancy; Providing temporary use of online non-downloadable computer software for use in database management in the field of cyber security; Monitoring of computer systems for detecting unauthorized access or data breach; Maintenance of computer programs; Updating of computer software relating to computer security and prevention of computer risks; Software as a service (SAAS) services featuring software for use in database management
Computer and Scientific