Loading...

Professional Solutions

Products & Partners

We are co-operating with the worldwide most skilled Cyber Security companies from Israel, Switzerland and other countries, complemented with local legal-, PR- and insurance resources. This gives our customers access to most advanced services and products to stay ahead of Cyber risks.

Learn More

Trusted Cyber Academy

Our Academy enables you to develop skilled IT technicians into skilled Cyber Security experts or to enhance their knowledge by training with the world’s best experts from Israel. All the trainers are still engaged hands-on in the Cyber Security field and have unique up-to-date skills.

Learn More

Our Valued Partners

We are co-operating with the worldwide most skilled Cyber Security companies from Israel, Switzerland and other countries, complemented with local legal-, PR- and insurance resources. This gives our customers access to most advanced services and products to stay ahead of Cyber risks.

  • Secure E-Mail
  • Anti-Phishing Learning Automation & Awareness
  • CDR (Content Disarm & Reconstruction)
  • Automated Pen Testing Tools
  • Cyber Intelligence (incl. Dark-/Deep Web)
  • Open Source Investigation
  • SDLC
  • Total Web Isolation
  • Threat Intelligence Management
  • Automated Threat Hunting
  • Vendor Security Compliance
  • Endpoint Security Management
  • Cybersecurity Solution for Industrial OT Networks
  • Video Surveillance
Agari

Agari

Agari is the only SaaS email security solution that uses predictive AI to stop advanced email attacks such as spear-phishing, account takeover and business email compromise.
Athena

Athena

Open source collection and analysis solution for Background Checks.
checkmark

checkmark

Checkmarx is a provider of state-of-the-art application security solution: static code analysis software, seamlessly integrated into development process.
Consienta

Consienta

ConSienta is focusing on cyber awareness, providing a comprehensive and managed solution.
Crusoe

Crusoe

Crusoe Security is the leading solution for Web Isolation.
Cybeready

Cybeready

CybeReady has developed the world’s first anti-phishing learning automation that removes the overhead associated with other phishing solutions through automated dissemination of continuous simulations and training.
Cybonet

Cybonet

CYBONET is committed to protecting organizations of all sizes. Whether securing the IP reputations of some of the largest Service Provider networks in the world, or providing total messaging solutions to the SMB market, CYBONET proudly partners with leaders across industries.
Cymulate

Cymulate

Breach & Attack Simulation.
EclecticIQ

EclecticIQ

EclecticIQ is a leader in collaborative Threat Intelligence Management. Empowering the Threat Analyst. Exchange intelligence based on STIX and TAXII.
ExeonAnalytics

ExeonAnalytics

Machine learning Big Data security Solutions analyzing network traffic to identify Cyber threats.
fcase - Fraud Orchestration

fcase - Fraud Orchestration

fcase provides sophisticated technology and dedicated support to help your fraud investigations, legal and compliance, customer experience, customer support see and manage the full picture of fraud in confidence with fraud orchestration.
IDRRA

IDRRA

AI powered platform, automating manual driven processes in the security compliance space.
FortyTwo

FortyTwo

Forty Two is a high-end Israeli cyber security solutions provider with world leading expertise. Together we help enterprises and governments in promoting cyber security resilience.
Kela

Kela

Radark, a Real time Darknet threat intelligence console automatically tracks Darknet threats, giving immediate notification of compromised company-specific information and ensures that Radark gives you only the highest quality Darknet information.
Kernelios

Kernelios

Kernelios has vowed to train the future generation of cyber security experts in the industry by offering them to learn from Israel’s leading experts in the field, placing maximum emphasis on hands-on training in the various topics.
Menny Barzilay

Menny Barzilay

Menny is an internationally known cyber security expert and evangelist of innovation. He is a strategic adviser to leading enterprises around the world, as well as States and Governments and sits in the advisory board of several startup companies.
promisec

promisec

Agentless Endpoint Security Management Software and Solutions.
Radiflow

Radiflow

Trusted Industrial Cyber-Security Solutions for Critical Business Operations - Our portfolio of game-changing cyber-security solutions for ICS/SCADA empowers users to maintain visibility and control of their OT networks.
SKYLOCK

SKYLOCK

SKYLOCK’s anti drone system unique and flexible approach enables us to offer comprehensive anti drone protection - for the detection, verification and neutralization of unauthorized drones.
viisights

viisights

Behavioral understanding systems for real-time video intelligence.
XM Cyber

XM Cyber

XM Cyber is a multiple award-winning startup with a clear mission to be the first fully automated purple team.
YazamTech

YazamTech

Next-Generation CDR (Content Disarm und Reconstruction) Deep Content Filtering for Files and Emails.

Trusted Cyber Academy

Organizations all over Europe are facing a lack of Cyber Security experts. In the EU there is a predicted lack of 300.000 experts by 2023. Our Academy enables you to either develop IT technicians into skilled Cyber Security experts or to enhance their knowledge by training with the world’s best experts from Israel. All trainers are actively working in the Cyber Security field and have unique up-to-date skills.

Our Academy proposes on-site classes at our customers premises or tailor trainings to their individual needs, with the additional possibility for some students to attend the classes remotely.

Please contact us for an offer at office@tcss.eu.

Course Overview

Cyber Forensics - Memory

CHWMFE- Certified Hands-On Malware Analysis and Windows Memory Forensics Expert – 5 Days
This course provides the critical skills necessary for digital forensics examiners and incident responders to successfully perform live system memory triage and analyze captured memory images. Hands-on training courses.

Web Security - Hacker Mode

CHWAH – Certified Hands-On Web Application Hacker – 5 Days
The objectives of the course are to teach developers and security professionals how to find and exploit the most dangerous web vulnerabilities, giving them the tools necessary in order to audit web applications by themselves.

Web Security - Web Hunter

CHWVH – Certified Hands-On Web Vulnerability Hunter (0-day hunting) – 5 Days
The course will introduce the common techniques used when auditing massive pieces of code, teach you how to detect complex vulnerabilities, and give you the tools to exploit them.

Cyber Forensics - Investigative Mode

CHCFE – Certified Hands-On Cyber Forensic Expert – 5 Days
This course covers the up-to date topics in the digital forensics field. The course will describe the forensic tools, methods, techniques and what to look for when investigating a digital computer event. You will learn how to forensically copy, analyze, recover, search and investigate artifacts in your organization in different scenes.
The course will also cover the methods to collect evidence that will be valid in court.

Cyber Security - 101 Basic

CHCSS – Certified Hands-on Cyber Security Specialist – 310 Hours
Entry level cyber security course intended for an audience looking to make a career change, or alternatively for those wishing to enter the world of cyber and information security. Students in the course will be exposed to a whole range of topics and methods of defense and attack in the cyber world and practice the material with tools that simulate what happens in the real world, tools required for the ongoing work of modern cyber security person in a changing world.

Cyber Security - 101

CHCSS – Certified Hands-on Cyber Security Specialist – 510 Hours
Entry level cyber security course intended for an audience looking to make a career change, or alternatively for those wishing to enter the world of cyber and information security. Students in the course will be exposed to a whole range of topics and methods of defense and attack in the cyber world and practice the material with tools that simulate what happens in the real world, tools required for the ongoing work of modern cyber security person in a changing world.

Cyber Awareness Enhancement – Management Introduction

Cyber Management Intro – 2 Days
The student will be exposed to vast abilities to comprehend cyber risks and components. The workshop manager will be exposed to a whole range of topics and methods of defense and attack that are common in the world. This unique workshop was developed to allow you to cope with the existing threat in our cyber world. The subjects in this workshop were chosen in order to include most of the defensive tools and the attacks a manager can encounter in his organization on a day- to-day basis. Designed for people who want to understand the field in a broad way.

Cyber Awareness Enhancement – OSINT

Open Source Intelligence (OSINT) – 2 Days
Providing tools and knowledge of the Internet world as “the arena” and the use of social networks as a source of information. Knowledge of the existing sources of information, including social networks benefits that can be derived from them, how to operate in the internet without being blocked and arouse suspicion, and treatment of different media types.

Security and events management

CHSE – Certified Hands-On SIEM Expert – 5 Days
This course will walk you through the SIEM-SOC world with the advanced theory of SOC generations, strategies, build your own SOC, and open discussions to enrich knowledge and share new ideas between the students. Altogether with many LABs to practice event lifecycle via data mining, normalizing, handling and visualizing to better understand SIEM behind the scene.

Cyber Security - 102

CHPTE – Certified Hands-On Penetration Tester Expert – 15 Days
Intermediate cyber security course intended for students seeking to enhance their PT and Python abilities. This course is offer as next level course for our graduate of the CHCSS program.

Cybercrime - Malware Analysis

CHMAE – Certified Hands-On Malware Analysis Expert – 5 Days
An advanced reverse engineering course with emphasis on Windows operating system from a very experienced 8200 alumni (IDF Intelligence).Topics include research of malware, sandbox detection, code packing and unpacking, encryption and anti- debugging, exploits and a lot of low-level code!

6 Trillion $ - Estimated amount to be spent globally on cyber security by 2021