S
Mark Identification

S

Serial Number

79295753

Filing Date

Sep 4, 2020

Registration Date

Aug 9, 2022

Trademark by

SECURE CODE WARRIOR LIMITED

Active Trademark

Classification Information

Downloadable computer software for educating and training others in the creation and writing of secure software code that complies with information security standards, requirements, and guidelines; downloadable computer software programs for educating and training others in the creation and writing of secure software code that complies with information security standards, requirements, and guidelines; downloadable computer software adapted for use in the operation of computers for educating and training others in the creation and writing of secure software code that complies with information security standards, requirements, and guidelines; downloadable computer software applications for educating and training others in the creation and writing of secure software code that complies with information security standards, requirements, and guidelines; computer software downloaded from the internet for educating and training others in the creation and writing of secure software code that complies with information security standards, requirements, and guidelines; downloadable computer software packages for educating and training others in the creation and writing of secure software code that complies with information security standards, requirements, and guidelines; computer software platforms, recorded or downloadable for educating and training others in the creation and writing of secure software code that complies with information security standards, requirements, and guidelines; downloadable computer software products for educating and training others in the creation and writing of secure software code that complies with information security standards, requirements, and guidelines; downloadable application software for educating and training others in the creation and writing of secure software code that complies with information security standards, requirements, and guidelines; computer game software, downloadable

Electrical and Scientific Apparatus

Computer software design; computer software development; design of computer software; development of computer software; development of computer software application solutions; maintenance of computer software; development of software; hosting of software as a service (SaaS) for others on a virtual private server; information technology (IT) services in the nature of computer hardware, software and peripherals design and technical consultancy; online provision of web-based non-downloadable software for educating and training others in the creation and writing of secure software code that complies with information security standards, requirements, and guidelines; provision of online non-downloadable software (application service provider); provision of online non-downloadable web-based software for educating and training others in the creation and writing of secure software code that complies with information security standards, requirements, and guidelines; software as a service (SaaS) for educating and training others in the creation and writing of secure software code that complies with information security standards, requirements, and guidelines; platform as a service (PaaS) for educating and training others in the creation and writing of secure software code that complies with information security standards, requirements, and guidelines; computer security consultancy; computer security services, namely, design and development of secure computer hardware, software and systems; computer security services, namely, programming and software installation repair and maintenance services; computer security services, namely, testing and risk assessment of computer networks; data security consultancy; internet security consultancy

Computer and Scientific

Licensing of computer software; licensing of computer programs; licensing services, namely, licensing of computer software for educating and training others in the creation and writing of secure software code that complies with information security standards, requirements, and guidelines

Personal