Cyberdom Consulting (Pvt) Ltd was established in March with the prime intention of providing Hi-Tech training, consulting and Solution to fill the gap of lack of quality training for Cyber Security field in the IT training industry of the island and providing support services in the field of IT & Cyber Security. Having understood the need for quality training and awareness for a few key fields, we concentrated for focused differentiation and build their expertise not only in security and also related system administration.
විෂයයන් සහ පාඨමාලා
We are Providing Following Ethical Hacking and Cyber Security Training.
CCSS-Certified cyber Security Sentinel
CCSP-Certified cyber Security Professional
CCFI-Certified cyber Forensic Investigator
CIHE-Certified Incident Handling Expert
CVSE-Certified Voip Security Expert
CDRS-Certified Disaster Recovery Specialist
CWVA-Certified Web Vulnerability Assessor
CWSA-Certified Web Security Auditor
CPTE-Certified Penetration Testing Expert
CWSP-Certified Wireless security Professional
CNFE-Certified Network Forensic Expert
Services We Provide
Vulnerability Assessment
Cyberdom consultants use an exhaustive methodology that clearly points
out the weaknesses and deficiencies, from a security standpoint, in any
given system. Organizations across the world have to be sure that their
systems will run continuously. Cyberdom Consulting (VA) is critical for
organizations that need to ensure this. The idea is to minimize or,
better still, eliminate the chance of a security breach. Organizations
feel a particular need in this regard when they are shifting their
operations or launching new systems. Our assessment criteria is
comprehensive, our reports are generated in real-time and
self-explanatory, and our consultants are ‘management
friendly’, our recommendations being practical, and our
data-collection and analysis procedures are swift and accurate.
Enterprise Security Audit
An Enterprise security audit involves a review of all processes and
practices followed by an organization looking to ensure enterprise-wide
security. Additionally, there will be a technical audit conducted
across all the locations and devices in the enterprise. Based on the
spread and critical of the devices being audited, there is a judicious
mix of remote and onsite audits. The technical audit uses
industry-standard tools as well as custom-developed tools
Penetration Testing
Penetration testing is the testing of networks and their components for
security weaknesses. Cyberdom consultants could carry these tests with
no knowledge of the network, or as authorized users having restricted
knowledge of the network. The test is conducted remotely via the
Internet on the IP address, the URL specified by the client, or at the
client site (for internal penetration testing)
Security Code Review
A security code review assignment involves the rigorous testing of the
existing application source code for programming and structural faults
that may lead to possible security weaknesses. It requires access to
the source code of the sections of the application, or the complete
application that is being tested.
Application Security Audit
Cyberdom consultant would conduct an Application security audit by
testing applications remotely over the Internet for security holes, or
testing applications at the customer site on a staging server with
higher levels of access to the application architecture and
documentation. We offer this service in two modes:
Initial ASA (remote)
Comprehensive ASA (onsite)
Information Forensics
Cyberdom Consulting Forensics Experts have gone through extensive
training and hold various industry certifications under their belt for
added credibility. These consultants have got their background verified
by the enforcement, so that our client can rest assured that only the
best and most reliable are put on to investigate their computer crime /
industry crime cases. Cyberdom Consulting Forensics Experts have often
been called by various enforcement officials to train and guide their
elite police forces on investigation techniques and methodologies.
Information Security Solutions
Security solutions are not just a one-time event but it needs to be
constantly aligned with business objectives and goals. Web applications
and sensitive corporate information are increasingly vulnerable and
potential open door to attack by hackers. Organizations have no choice
but to deploy technology that specifically secure these critical
resources from attack. Cyberdom Consulting security
assessment is customized for your specific needs. Our services review
and analyze many different subject areas to ensure that both IT and
business functions are headed the same direction.