Copyright © 2014  "Cybermate Technologies Limited"  ·  All Rights reserved  ·  E-Mail: info@cybermatetechnologies.com
Twitter
Facebook
Linkedin
Webmail
Cybermate Logo
Let's Begin Security

   FREE Scan for SQL Injection and XSS Flaws for Web Applications

   FREE Port Scanning & Service Identification for Servers

   FREE Trial on Policy Review and Tunneling Holes for Firewals
Back
Next

Secure Network Architecture Setup

  • Includes Firewall and IDS Setup
  • Network Risks Threat Modelling
  • Threats and Risk Prioritization
  • Network Security Policy Framework
  • Secure Network Deployment
  • Network Monitoring Setup

Application Security Training OWASP Top 10

  • 16 hrs Rigorous Training
  • OWASP Top 10 Coverage
  • Live Attack Simulation
  • Real World Attack Scenarios
  • Hands On Practice Sessions
  • For Corporate: Available On Demand
Application Penetration Testing

  • OWASP Web Vulnerbilities Coverage
  • Business Logic Testing
  • Special OWASP Top 10 Testing
  • Hybrid/Semi-Automatic Approach
  • Black/White/Grey Box Testing
  • Most Effective: Completely Manual Testing Available On Demand
Network Penetration Testing

  • Comprehensive Vulnerability Coverage
  • Speacial SANS Top 20 Testing
  • Hybrid/Semi-Automatic Approach
  • Black/White/Grey Box Testing
  • Internal and External Network Testing
  • Most Effective: Completely Manual Testing Available On Demand
IPhone Application Penetration Testing
  • Comprehensive Vulnerability Coverage
  • Complex iPhone Attack Simulation
  • Testing for XSS and CSRF
  • Testing Buffer Overflow Attacks
  • Static Source Code Analysis
  • Dynamic Source Code Analysis
Wireless Network Penetration Testing

  • Comprehensive Vulnerability Coverage
  • Complex iPhone Attack Simulation
  • Testing for XSS and CSRF
  • Testing Buffer Overflow Attacks
  • Static Source Code Analysis
  • Dynamic Source Code Analysis
Application Security Code Review

  • Code Review for JAVA, PHP and ASP
  • Application Threat Modelling
  • Threats and Risk Prioritization
  • Code Review Metrics
  • Application Security Considerations
  • Secure Application Deployment