Emergencies & Disasters???
If any of your plans fail, do YOU have a “Plan B”?
Who can YOU count on to help YOU in case of “surprises”?
Who can help YOU monitor and manage your network security?
Have YOU accounted for ALL the regulatory requirements and legal mandates?
Are YOU in compliance? What do YOU need to do to remain current on your industry certifications?
Human Resource Concerns?
Do YOU have enough people, with the right skills, competencies, and readiness?
Will YOU have enough qualified people in times of crisis?
Risks & Issues???
Have YOU identified ALL the IT Security threats?
Did YOU do enough to mitigate ALL the risks?
Can YOU trust your team to address ALL your vulnerabilities?
We understand what keeps YOU up at night
We are a premier leader in information security solutions and services in KSA. We have led the industry for the last twelve (12) years with continuous growth in our partner and customer bases. Headquartered in Riyadh, Saudi Arabia, we were the FIRST local MSS (Managed Security Services) provider in the MENA region. Through our strong and exclusive partnerships with key international industry leaders, we continue to introduce cutting-edge technologies and solutions to the market. With our high caliber team of information security professionals; we are your trusted security and resilience provider.
To be the premier partner dedicated to protecting our Clients' information and ensuring their business continuity.
We deliver prime services and capacity building in information security and business resilience.
Vendors & Security
Eng. Ahmad Alkhiary
Chief Executive Officer
"... Cyber security is no longer just an IT or CIO priority. It must be addressed at the board level. In the event of a cyber-attack, business operations, reputation, and viability are at stake. So shouldn't shareholders, as well as, all employees, be worried about IT security? We must address the issue collectively to arrive at protective measures..."
- Eng. Ahmad Alkhiary, 6th Cyber Defense Summit - 4 March 2015
Download complete service catalog here
Certify your staff with trusted international professional bodies
World-class information security courses that enhance skills and competencies
Some of our popular and highly demanded courses:
The main objectives of this course is to equip the Attendees with the basic fundamental Cyber Security knowledge and skills required to identify risk, to participate in risk mitigation activities, and to provide infrastructure, application, information, and operational security.
In addition, delegates will apply security controls to maintain confidentiality, integrity, and availability, identify appropriate technologies and products, troubleshoot security events and incidents, and operate with an awareness of applicable policies, laws, and regulations.
Certified Incident Handling Engineer - C)IHE
The Certified Incident Handling Engineer course is designed to help Incident Handlers, System Administrators, and any General Security Engineers understand how to plan, create and utilize their systems in order to prevent, detect and respond to attacks.
In this in depth training, students will learn step-by-step approaches used by hackers globally, the latest attack vectors and how to safeguard against them, Incident Handling procedures (including developing the process from start to finish and establishing your Incident Handling team), strategies for each type of attack, recovering from attacks and much more.
CISSP CBK Review Seminar
The 5-day CISSP CBK review seminar is the most comprehensive, complete review seminar discussing the entire information systems security common body of knowledge. The benefit of the review seminar is to help its attendees prepare for the CISSP examination. However, it also serves as a very good learning tool for concepts and topics, known as the Common Body of Knowledge (CBK), related to all aspects of information systems security.
This seminar is the first and the only program endorsed by (ISC)2 (the organization that created and manages the CISSP certification) to familiarize you with the CISSP different domains and is led by instructors that are authorized from the (ISC)2 who are subject matter experts in developing material and presentation. The seminar highlights topic areas that attendees should study for exam preparation, and it also includes discussion of some practice CISSP questions.
SSCP Review Seminar
The SSCP certification is the ideal credential for those with proven technical skills and practical security knowledge in hands-on operational IT roles. It provides industry-leading confirmation of a practitioner’s ability to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability.
The SSCP indicates a practitioner’s technical ability to tackle the operational demands and responsibilities of security practitioners, including authentication, security testing, intrusion detection/prevention, incident response and recovery, attacks and countermeasures, cryptography, malicious code countermeasures, and more.
Certified Penetration Testing Engineer - C)PTE
CPTE Engineer’s foundation is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by our international group of vulnerability consultants. Mile2 trainers keep abreast of their field by practicing what they teach. They believe that, during training, an equal emphasis should be placed on both theoretical and real world experience if the student is going to succeed in mastering the necessary skills to become a CPTE Engineer.
The CPTE Engineer presents information based on the 5 Key Elements of Penetration Testing: Information Gathering, Scanning, Enumeration, Exploitation and Reporting. System vulnerabilities will be discovered using these tried and true steps alongside the use of the latest hacking techniques. This course also enhances the business skills needed by today’s students. It will enable them to identify protection opportunities, justify testing activities, and optimize security controls needed by businesses attempting to reduce risks.
CompTIA Network+ is Recommended as a first professional-level networking certification. Held by nearly half a million people worldwide and according to the BLS 12% job growth expected for Network & Computer Systems Administrators (2012 – 2022) and also ISO 17025 compliant.
Network+ is an ISO-17024 compliant, vendor-neutral technology certification that verifies the certified individual has the skills and knowledge needed to take on a pivotal role in building, managing, and protecting the critical asset that is the data network.
ISO/IEC: 27001-2013 Lead Implementer
This five-day intensive course enables participants to develop the necessary expertise to support an organization in implementing and managing an Information Security Management System (ISMS) based on ISO/IEC: 27001-2013. Participants will also gain a thorough understanding of best practices used to implement information security controls from all areas of ISO/IEC: 27002.
This training is consistent with the project management practices established in ISO 10006 (Quality Management Systems - Guidelines for Quality Management in Projects). This training is also fully compatible with ISO/IEC: 27003 (Guidelines for the Implementation of an ISMS), ISO/IEC: 27004 (Measurement of Information Security) and ISO/IEC: 27005 (Risk Management in Information Security).
ISO 31000: Risk manager
The "Certified ISO 31000 Risk Manager" credential is a professional certification for professionals needing to demonstrate the competence to implement, maintain and manage an ongoing information security risk management program according to ISO 31000.
The principal competencies and knowledge skills needed by the market are the ability to support an organization in implementing and managing an risk management framework as specified in ISO 31000.
Certified Penetration Testing Consultant C)PTC
The Certified Penetration Testing Consultant course is our advanced course in our penetration testing track. The C)PTC is designed for cyber security professionals and IT network administrators who are interested in conducting Penetration tests against large network infrastructures, such as large corporate networks.
The training starts with capturing and analyzing basic packets and continues with Layer2 attack vectors; Layer3 based attacks, including both IPv4 and IPv6 stacks, routing protocol attacks (OSPF, BGP, etc); Service Provider level attacks related with very common used MPLS; how to use relays and pivots; VPN attacks including IPSEC protocol suite; SSL attacks; and finally covers NIDS/NIPS evasion and implementation techniques.
ISO/IEC: 27001 Information Security Management System (ISMS) Lead Auditor
This five-day intensive course enables participants to develop the necessary expertise to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principles, procedures and techniques. During this training, the participant will acquire the necessary knowledge and skills to proficiently plan and perform internal and external audits in compliance with ISO: 19011 the certification process according to ISO: 17011. Based on practical exercises, the participant will develop the skills (mastering audit techniques) and competencies (managing audit teams and audit program, communicating with customers, conflict resolution, etc.) necessary to efficiently conduct an audit.
ISO/IEC: 38500 Corporate Governance Manger
The principal competencies and knowledge skills needed by the market are the ability to support an organization in implementing and managing a governance management framework as specified in ISO/IEC: 38500 implementation of a governance management program, governance identification, governance analysis, governance evaluation, governance treatment, acceptance of governance, and management of residual governances, communicating, monitoring and reviewing governance.
Click here to
We are hiring!
At I(TS)2, we are always on the lookout for bright, committed individuals to join our team! If you share our passion; join us and discover opportunities to drive change and create IT security solutions for a safer digital world.
Smart people who collaborate and innovate make great things happen. Whatever your role, your ideas are encouraged and rewarded. At I(TS)2 we give people the confidence and freedom to excel at what they do best…
After all, it’s all about TRUST!
Email us at:
1st Floor Al Rayadah Bldg.
8596 King Fahad Rd 12363-4179
P.O. Box 1255
Kingdom of Saudi Arabia
Tel: +966 11 207 7008
Fax: +966 11 207 7754
2015 - ALL RIGHTS RESERVED to IT Security Training & Solutions - I(TS)2