Ethical Hacking

CEHv9 (EC-Council Certified Ethical Hacking Version 9)

The Certified Ethical Hacker class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it!
More Details

CPTE (Mile2 Certified Penetration Testing Engineering)

Certified Penetration Testing Engineer graduates obtain real world security knowledge that will enable them to recognize vulnerabilities, exploit system weaknesses, and help safeguard threats. Graduates will learn the art of Ethical Hacking with a professional edge (Penetration Testing).
More Details


Digital Forensics

CHFI (EC-Council Certified Hacking Forensic Investigation)

CHFI v8 Program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The C|HFI certification will fortify the application knowledge of system administrators, security officers, defence and military personal, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.
More Details

CDFE (Mile2 Digital Forensic Experts)

The Certified Digital Forensics Examiner program is designed to train Cyber Crime and Fraud Investigators whereby students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting an investigation.
More Details

ECSA (EC-Council Certified Security Analyst)

EC Council Certified Security Analyst, ECSA an advanced ethical hacking training Certification that complements the Certified Ethical Hacker, CEH certification by Exploring the analytical phase of ethical hacking. While the CEH Certification exposes the learner to hacking tools and technologies, the ECSA course takes it a step further by exploring how to analyse the outcome From these tools and technologies. Through ground-breaking network penetration testing methods and techniques, this pen testing computer security certification helps students perform the intensive assessments required to effectively identify and mitigate risks to the information security of the infrastructure.
More Details

CISSO (Mile2 Certified Information Security System Officer)

The CISSO course is designed for a forward-thinking security professional or consultant that manages or plays a key role in an organization’s information security department. The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security leader. The Candidate will learn both the theory and the requirements for practical implementation of core security concepts, practices, monitoring and compliance. Through the use of a risk-based approach the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with business requirements.
More Details

Trillium Institute of Security Professionals (TISP)

TISP looks to counter information security threats by educating those who are in the field of information security. Read More

Keep in Touch
This email address is being protected from spambots. You need JavaScript enabled to view it.
+92 51 5524181-2
+92 51 556 8044
10th Floor, AWT Plaza, 5 - The Mall, Rawalpindi, Pakistan

Get Map

Trilium Information Security System

Latest News


CSO Insight Sessions-2015

TISS sponsored the Tri-City CSO Insight Sessions. These sessions were comprised of Roundtable Discussion Sessions in Islamabad,...


InfoSec Conference – 2014

TISS, sponsored the InfoSec 2014 conference at Pearl Continental Hotel, Karachi. CEO of TISS, Mr. Mahir Mohsin,...


E Banking Conference ...

Participation as Co-Sponsor in 12th e-Banking International Conference Exhibition in Pakistan at Pearl Continental Hotel,...


CSO Central Sessions-2014

Trillium Information Security Systems (TISS) in collaboration with CIO Pakistan powered by IDG for...


InfoSec 2013

TISS, sponsored the InfoSec 2013 conference at Pearl Continental Hotel, Karachi.


CISO Summit – ITCN ASIA...

TISS, sponsored the CISO Summit conference held at ITCN Asia 2012 and Mr. Mahir Mohsin Sheikh, CEO...


Ethical Hacking Training

Trillium Institute of Security Professional organized Onsite 5 days Ethical Hacking Training by combing two of the...


Info Security Conference 2014

Info Sec 2014 was organized by the Total Communications with the support of ISACA, Karachi Chapter, Experienced...


Introducing New Courses

As a tradition of introducing new courses Trillium Institute of Security Professional organized its first 5 days...


Successful Ethical Hacking Training of...

World’s Youngest Microsoft Certified Professionals Rooma Syedain, Inam Ali Syedain Subhan aged 10 years, 9...


Successful EC Council Certified Security...

Trainer Zeeshan Akram of the Trillium Institute of Security Professionals successfully completed EC-Council Certified Security Analyst v9...


Successful EC Council Certified Ethical...

Trillium Institute of Security Professionals has successfully completed EC Council Certified Ethical Hacker v9 (CEHv9) training organized...


Successful Mobile Application Security Testing...

Trillium Institute of Security Professionals has successfully completed a 10 Day Onsite Mobile Application Security Testing Training...


UpComing Trainings

  • Recent Projects
  • Recent Projects
  • Recent Projects
  • Recent Projects