A c a d e m y

Image description

IMPLEMENTACIJA PROJEKTA PEN TESTA U VAŠOJ ORGANIZACIJI!!


Pozovite, pošaljite e-mail, zatražite PONUDU po meri Vaše organizacije, ODGOVOR očekujte istog dana!

Image description

Penetracioni Test

Image description

Imamo u ponudi uslugu PENETRACIONI TEST 

"po meri Vaše organizacije" kako bismo proverili bezbednost informacija sa kojima poslujete

(web napad na mrežu spolja i server side napad na informacioni sistem iznutra)

Image description
Penetration testing
PREUZMITE BROŠURU

Ako Vam je potreban know-how, pohađajte PECB trening kurseve!

Image description

PENETRACIONI TEST

Image description

ISACA Glossary, 2013:       

 

„A penetration test, occasionally pentest, is a method of evaluating computer and network security by simulating an attack on a computer system or network from external and internal threats.“

 

 

Institut za standarde i tehnologije doo Beograd (IST) according to Information Security Management System ISO 27001 will conduct a Penetration test in your organization designed to help organisations with limited resources understand and manage their information and cyber-security risks. It helps you to approach the protection of your information from all angles to make sure no holes have opened up that could put your information assets at risk!

 

  • Penetration Testing - WEB ATTACK
  • Penetration testing - SERVER SIDE ATTACK
  • XSS, Fuzz Testing, XSRF
  • Database Assesment (SQL Injection)
  • Scapy, XPath Injection
  • Metasploit, Session Hijack
  • Brute Force Attack
  • Password attack, Live Hosts Scan
  • Sniffing/Spoofing
  • Vulnerability Scanner

 

Image description

PENETRATION TESTING AS A PART OF ISO 27001 IMPLEMENTATION


Return on Information Security Investments! How do you know if your computers and network are an easy target for hackers? The simple answer is that you don’t. And that’s where the penetration testing part of our service comes in. Using industry-leading tools Institut za standarde i tehnologije doo Beograd will scan (in just 2 weekends) your network and computers for vulnerabilities that an attacker could use to break in. We’ll come back every six months to make sure no holes have opened up that could put your information assets at risk!

 

Image description
Image description
Image description

Professional Advice.

Image description

For an improvement of your business we will engage the best Consultants who are  experienced and educated for the ISO Standards you want to implement..

Friendly Service.

Image description

We would like to help you how to prepare your ISO documents and your records as better as possible..

Help Implementation.

Image description

We are at your disposal during and after implementation and certification of ISO Standards. Plan - Do - Check - Act cycle is our moto..