Downloadable and recorded software for use in security risk assessment, reviewing and assessing information security vulnerability, and auditing information related thereto, all to support global organizations' compliance with applicable regulations, laws and industry requirements
Electrical and Scientific ApparatusEducational services, namely, providing classes and instruction in the fields of cybersecurity, security risk assessment, computer and network information security vulnerability, penetration testing, and advanced persistent threat tooling; security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of cyber security software and hardware, computer security software and hardware, network security software and hardware, and information technology software and hardware; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely, conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and non-downloadable publications in the nature of articles in the field of cyber security
Education and EntertainmentComputer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Comprehensive enterprise security assessment and vulnerability testing services, namely, security risk assessment services and testing of computers and networks to assess information security vulnerability, all provided to business enterprises; Providing a computer software platform and Software as a service (SAAS) services featuring on-line non-downloadable software for use in security risk assessment, reviewing and assessing information security vulnerability, and auditing information related thereto, all to support global organizations' compliance with applicable regulations, laws and industry requirements
Computer and Scientific