
Online or onsite, instructor-led live Cyber Warfare training courses demonstrate through interactive hands-on practice the fundamentals of Cyber Warfare.
Cyber Warfare training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Cyber Warfare training can be carried out locally on customer premises in Hong Kong or in NobleProg corporate training centers in Hong Kong.
NobleProg -- Your Local Training Provider
Testimonials
Ann is very knowledgeable on the subject. She is constantly varying pace according to the feedback. There is a lot of room for discussing attendee's own experiences. It was a great joy !.
Sjoerd Hulzinga - KPN p/a Bloomville
Course: IoT Security Architecture
It was quite informal.
Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
Trainer covered a lot of ground over a relatively short period.
Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
I found it very interesting to learn all about what happens behind the scenes when it comes to IT systems. I also enjoyed learning about security and what hackers do as ethical hacking is an avenue I'm very keen in pursuing.
Knowledge Pool/ DVLA
Course: Understanding Modern Information Communication Technology
Richard was very knowledgeable in his field.
Knowledge Pool/ DVLA
Course: Understanding Modern Information Communication Technology
It was pitched at the right level - challenging but understandable & informative.
Louise Voisey - Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
Hacking
Mohalmald Salim - PSO
Course: Ethical Hacker
Level of expertise from the trainer Use case examples
Pierre Maillot - Bosch
Course: IoT Security Architecture
His deep knowledge of the IoT topic.
Bosch
Course: IoT Security Architecture
Ron's experience on how to successfully implement IoT projects and the deep technical subjects covered.
Bosch
Course: IoT Security Architecture
relevance of content to our I4.0 business environment
Bosch
Course: IoT Security Architecture
Very knowledgeable trainer, was able to adjust to audience knowledge, excellent industry experience and ability to relate to audience needs Excellent content preparation , tailored to needs discussed beforehand. Good supplement reading materials prepared by trainer
Oliver Steinig - Bosch
Course: IoT Security Architecture
Ron was very mindful of his audience and addressed everyone's questions. He checked his audience for clarity and was willing to spend the time to review a topic until everyone understood the topic. He gauged the audience for energy levels and suggested a break when he saw that the energy from the group was waning. This was much appreciated.
Bosch
Course: IoT Security Architecture
The pace of training delivery.
Ian McInally - KnowledgePool
Course: Business Continuity Practitioner
the exercises and group discussions.
KnowledgePool
Course: Business Continuity Practitioner
The trainer was very knowledgeable and was happy to go at the pace of the attendees. He was polite and respectful to all those in attendance. I felt I learnt a lot from the course as the trainer was very succinct in his delivery when going through the PP slides. A really good, worth while course from my personal point of view.
Julie Price - KnowledgePool
Course: Business Continuity Practitioner
The environment was really relaxed and open so everyone could ask questions or put across points of view or experience. David the trainer was a SME on the subject and his style was very good.
KnowledgePool
Course: Business Continuity Practitioner
Tutorials
ICAO
Course: Web Security with the OWASP Testing Framework
The example and exercise
ICAO
Course: Web Security with the OWASP Testing Framework
I got more information regarding the web applications' security issues, the different tools that could be used to cope with these issues, and more advice from the trainer to handle all these issues.
ICAO
Course: Web Security with the OWASP Testing Framework
the list of tools
ICAO
Course: Web Security with the OWASP Testing Framework
how it was broken into the technical and security mindset aspects.
ICAO
Course: Web Security with the OWASP Testing Framework
Excercises.
ICAO
Course: Web Security with the OWASP Testing Framework
he is very knowledgeable and comprehensive.
ICAO
Course: Web Security with the OWASP Testing Framework
Matthew was very knowledge and has lot experience to share with us. it was very pleasant, as he take the time to listen to us and answer to our questions. Thank you Matthew, it was awesome.
ICAO
Course: Web Security with the OWASP Testing Framework
The second day, scenarios exercises.
Christina Hutchings - KnowledgePool
Course: Business Continuity Practitioner
The real life examples Ron gave.
Bosch
Course: IoT Security Architecture
I liked the trainer's introduction and anecdotes to make the learning more real
KnowledgePool
Course: Business Continuity Practitioner
David's in depth knowledge. His relationship building skills with the audience. I really enjoyed the way he managed to make us (as a collective audience) enjoy the quite dry and uninteresing subject matter. He had anecdotes and knowledge of specific examples of security failings - hacker attacks - BCP 'breakdowns' etc which put flesh on the bones to the piece of legislation or 'best practice' for BCP that he was trying to teach us about. A really engaging, down to earth and personable man: A very good listener and a fabulous, charismatic trainer.
Cris Bollin - KnowledgePool
Course: Business Continuity Practitioner
All is excellent
Manar Abu Talib - Dubai Electronic Security Center
Course: MITRE ATT&CK
- Understanding that ATT&CK creates a map that makes it easy to see, where an organization is protected and where the vulnerable areas are. Then to identify the security gaps that are most significant from a risk perspective. - Learn that each technique comes with a list of mitigations and detections that incident response teams can employ to detect and defend. - Learn about the various sources and communities for deriving Defensive Recommendations.
CHU YAN LEE - PacificLight Power Pte Ltd
Course: MITRE ATT&CK
He took his time to make sure everyone understood and were on the same wave length
Tina Hopkins - Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
I found the training too in depth for IT beginners. There was too many high level subjects that i felt were too advanced for a beginner level.
Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
Cyber Warfare Course Outlines in Hong Kong
Last Updated: