Home
Our company
Our values
Our commitments
The MCA Group
Our expertise
Audit
Architecture audit
Configuration audit
Organizational Audit
Subcontracting audit
Penetration testing
Web Penetration Test
Infrastructure Penetration Test
Mobile Application Penetration Test
Cloud Penetration Test
Consulting and governance
Creating the cyber foundations
Risk analysis
Global Information Security Policy (GISP)
Information Security Assurance Plan (ISAP)
Action Plan - Remediation
Resilience and business continuity
Information systems acceptance
Training
Become a cyber team member
Manage Information Security in new projects
Secure software development
Introduction to hacking techniques
Cyber security in IT operations (SecOps)
Project owners assistants
Project managers
Cyber tech leaders, cyber team members, pentesters
IT infrastructure security administrators (network, systems, endpoints)
Cloud security administrators (Azure, AWS, GCP, O365)
SOC and response teams skills (Level 1 to Level 3)
Join us
Publications
Blog
Articles
Exploits
Tools
Contact
Contact form
From
Message
Send