We understand what keeps YOU up at night

I(TS)2 In Numbers


Inforamtion Security




Highly Qualified


Vendors & Security


Eng. Ahmad Alkhiary

Chief Executive Officer

"... Cyber security is no longer just an IT or CIO priority. It must be addressed at the board level. In the event of a cyber-attack, business operations, reputation, and viability  are at stake. So shouldn't shareholders, as well as, all employees, be worried about IT security? We must address the issue collectively to arrive at  protective measures..."

                                    - Eng. Ahmad Alkhiary, 6th Cyber Defense Summit - 4 March 2015


Download complete service catalog here


Education for YOUR staff and YOUR organization!

We offer specialized courses & comprehensive training tracks!!!

Certify your staff with trusted international professional bodies

World-class information security courses that enhance skills and competencies

Some of our popular and highly demanded courses:

  • CompTIA Security+

    The main objectives of this course is to equip the Attendees with the basic fundamental Cyber Security knowledge and skills required to identify risk, to participate in risk mitigation activities, and to provide infrastructure, application, information, and operational security.


    In addition, delegates will apply security controls to maintain confidentiality, integrity, and availability, identify appropriate technologies and products, troubleshoot security events and incidents, and operate with an awareness of applicable policies, laws, and regulations.

  • Certified Incident Handling Engineer - C)IHE

    The Certified Incident Handling Engineer course is designed to help Incident Handlers, System Administrators, and any General Security Engineers understand how to plan, create and utilize their systems in order to prevent, detect and respond to attacks.


    In this in depth training, students will learn step-by-step approaches used by hackers globally, the latest attack vectors and how to safeguard against them, Incident Handling procedures (including developing the process from start to finish and establishing your Incident Handling team), strategies for each type of attack, recovering from attacks and much more.

  • CISSP CBK Review Seminar

    The 5-day CISSP CBK review seminar is the most comprehensive, complete review seminar discussing the entire information systems security common body of knowledge. The benefit of the review seminar is to help its attendees prepare for the CISSP examination. However, it also serves as a very good learning tool for concepts and topics, known as the Common Body of Knowledge (CBK), related to all aspects of information systems security.


    This seminar is the first and the only program endorsed by (ISC)2 (the organization that created and manages the CISSP certification) to familiarize you with the CISSP different domains and is led by instructors that are authorized from the (ISC)2 who are subject matter experts in developing material and presentation. The seminar highlights topic areas that attendees should study for exam preparation, and it also includes discussion of some practice CISSP questions.

  • SSCP Review Seminar

    The SSCP certification is the ideal credential for those with proven technical skills and practical security knowledge in hands-on operational IT roles. It provides industry-leading confirmation of a practitioner’s ability to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability.


    The SSCP indicates a practitioner’s technical ability to tackle the operational demands and responsibilities of security practitioners, including authentication, security testing, intrusion detection/prevention, incident response and recovery, attacks and countermeasures, cryptography, malicious code countermeasures, and more.

  • Certified Penetration Testing Engineer - C)PTE

    CPTE Engineer’s foundation is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by our international group of vulnerability consultants. Mile2 trainers keep abreast of their field by practicing what they teach. They believe that, during training, an equal emphasis should be placed on both theoretical and real world experience if the student is going to succeed in mastering the necessary skills to become a CPTE Engineer.


    The CPTE Engineer presents information based on the 5 Key Elements of Penetration Testing: Information Gathering, Scanning, Enumeration, Exploitation and Reporting. System vulnerabilities will be discovered using these tried and true steps alongside the use of the latest hacking techniques. This course also enhances the business skills needed by today’s students. It will enable them to identify protection opportunities, justify testing activities, and optimize security controls needed by businesses  attempting to reduce risks.

  • CompTIA Network+

    CompTIA Network+ is Recommended as a first professional-level networking certification. Held by nearly half a million people worldwide and according to the BLS 12% job growth expected for Network & Computer Systems Administrators (2012 – 2022) and also ISO 17025 compliant.


    Network+ is an ISO-17024 compliant, vendor-neutral technology certification that verifies the certified individual has the skills and knowledge needed to take on a pivotal role in building, managing, and protecting the critical asset that is the data network.

  • ISO/IEC: 27001-2013 Lead Implementer

    This five-day intensive course enables participants to develop the necessary expertise to support an organization in implementing and managing an Information Security Management System (ISMS) based on ISO/IEC: 27001-2013. Participants will also gain a thorough understanding of best practices used to implement information security controls from all areas of ISO/IEC: 27002.


    This training is consistent with the project management practices established in ISO 10006 (Quality Management Systems - Guidelines for Quality Management in Projects). This training is also fully compatible with ISO/IEC: 27003 (Guidelines for the Implementation of an ISMS), ISO/IEC: 27004 (Measurement of Information Security) and ISO/IEC: 27005 (Risk Management in Information Security).

  • ISO 31000: Risk manager

    The "Certified ISO 31000 Risk Manager" credential is a professional certification for professionals needing to demonstrate the competence to implement, maintain and manage an ongoing information security risk management program according to ISO 31000.

    The principal competencies and knowledge skills needed by the market are the ability to support an organization in implementing and managing an risk management framework as specified in ISO 31000.

  • Certified Penetration Testing Consultant  C)PTC

    The Certified Penetration Testing Consultant course is our advanced course in our penetration testing track. The C)PTC is designed for cyber security professionals and IT network administrators who are interested in conducting Penetration tests against large network infrastructures, such as large corporate networks.


    The training starts with capturing and analyzing basic packets and continues with Layer2 attack vectors; Layer3 based attacks, including both IPv4 and IPv6 stacks, routing protocol attacks (OSPF, BGP, etc); Service Provider level attacks related with very common used MPLS; how to use relays and pivots; VPN attacks including IPSEC protocol suite; SSL attacks; and finally covers NIDS/NIPS evasion and implementation techniques.

  • ISO/IEC: 27001 Information Security Management System (ISMS) Lead Auditor

    This five-day intensive course enables participants to develop the necessary expertise to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principles, procedures and techniques. During this training, the participant will acquire the necessary knowledge and skills to proficiently plan and perform internal and external audits in compliance with ISO: 19011 the certification process according to ISO: 17011. Based on practical exercises, the participant will develop the skills (mastering audit techniques) and competencies (managing audit teams and audit program, communicating with customers, conflict resolution, etc.) necessary to efficiently conduct an audit.

  •  ISO/IEC: 38500 Corporate Governance Manger

    The principal competencies and knowledge skills needed by the market are the ability to support an organization in implementing and managing a governance management framework as specified in ISO/IEC: 38500 implementation of a governance management program, governance identification, governance analysis, governance evaluation, governance treatment, acceptance of governance, and management of residual governances, communicating, monitoring and reviewing governance.


We are hiring!


At I(TS)2, we are always on the lookout for bright, committed individuals to join our team! If you share our passion; join us and discover opportunities to drive change and create IT security solutions for a safer digital world.


Smart people who collaborate and innovate make great things happen. Whatever your role, your ideas are encouraged and rewarded. At I(TS)2 we give people the confidence and freedom to excel at what they do best…


After all, it’s all about TRUST!


Email us at:





Riyadh, KSA


1st Floor Al Rayadah Bldg.

8596 King Fahad Rd 12363-4179

P.O. Box 1255

Riyadh 11321

Kingdom of Saudi Arabia

Tel: +966 11 207 7008

Fax: +966 11 207 7754

Submitting Form...

The server encountered an error.

Form received.

CAPTCHA placeholder image

2015 - ALL RIGHTS RESERVED to IT Security Training & Solutions - I(TS)2