EDUCATIONAL COURSES TRAINING

Brand Owner (click to sort) Address Description
CENTREVO Sandvik Mining and Construction Tools AB N/A Sandviken 81181 Sweden Educational courses and training in the fields of mining and construction; providing educational seminars in the fields of mining and construction; provision of online training relating to rock tools and drilling performance; training services provided via simulators in the fields of rock tools and drilling performance; providing online electronic publications in the nature of reports and articles, not downloadable in the fields of mining and construction; information, advisory and consultancy services related to all of the aforesaid;Downloadable computer software and applications relating to the management of rock tools; downloadable computer software and applications for collecting, organizing, analyzing, monitoring, tracking, recording and reporting operational data related to machines, equipment and tools used in the mining and construction industry; downloadable computer software and applications for measuring and monitoring performance and productivity for tools used in the mining and construction industry; downloadable computer software and applications for recording, reporting and creation of operational data reports used in the mining and construction industry; downloadable computer software and applications for the fault diagnosis, troubleshooting and preventive maintenance of machines and equipment used in mining and construction industry; downloadable computer software providing predictions, notifications, analysis, service reminders, sales recommendations and reports related to performance optimization in mining and construction industry; downloadable computer software and applications relating the analysis of worn, damaged and discarded tools; simulators consisting of computer hardware and downloadable software for training in the operation of rock tools and drilling performance; simulators for training personnel in the operation of rock tools and drilling performance; interactive computerized simulators that simulate how different tools and settings affect drilling performance; computer hardware, downloadable computer software and applications for testing, analyzing and simulation of performance of tools used in the mining and construction industry; downloadable electronic reports and publications in the nature of articles relating to rock tools and drilling performance; downloadable electronic reports and publications in the nature of articles in the fields of mining and construction; simulators consisting of computer hardware for use with non-downloadable computer software for training in the operation of rock tools and drilling performance;Computerised inventory management; electronic inventory management services inventory control services; compilation and systemization of information and reports relating to rock tools and drilling performance into computer databases; management of computer databases relating to reports in the fields of mining and construction; information, advisory and consultancy services relating to all of the aforesaid;Platform as a services (PaaS) featuring computer software platforms for the management of rock tools; platform as a services (PaaS) featuring computer software platforms for the mining and construction industry, namely, for training in the field of mining and construction tools; platform as a services (PaaS), namely, providing a non-downloadable computer platform that enables operators, mine managers and salesforce to track, record and report how different tools are used and consumed and how much they produce in the mine; software as a service (SaaS) featuring computer software for the management of rock tools; software as a service (SaaS) featuring computer software for relating to the mining and construction industry, namely, for training in the field of mining and construction tools; software as a service (SaaS), namely, providing non-downloadable computer software used to track tool performance; scientific and technological services and research and design relating thereto, namely, scientific and technological research in the field of the design of mining and construction machinery; industrial analysis of the design of mining and construction tools and machinery, industrial research in the field of the design of mining and construction machinery and tools, and industrial design services; technical product design analysis services relating to the analysis of worn, damaged and discarded tools; design and development of computer software for use in the mining and rock processing industry; maintenance of computer software for use in the mining construction industry; technical support services, namely, troubleshooting in the nature of diagnosing problems with computer hardware and software for use in the mining construction industry; providing temporary use of non-downloadable computer software and applications for the management of rock tools; providing temporary use of non-downloadable computer software and applications for collecting, organizing, analyzing, monitoring, tracking, recording and reporting operational data related to machines, equipment and tools used in the mining and construction industry; providing temporary use of non-downloadable computer software and applications for measuring and monitoring performance and productivity for tools used in the mining and construction industry; providing temporary use of non-downloadable computer software and applications for recording, reporting and creation of operational data reports used in the mining and construction industry; providing temporary use of non-downloadable computer software and mobile phone apps for the fault diagnosis, troubleshooting and preventive maintenance of machines and equipment used in mining and construction industry; providing temporary use of non-downloadable computer software providing predictions, notifications, analysis, service reminders, sales recommendations and reports related to performance optimization in mining and construction industry; providing temporary use of non-downloadable computer software and applications for testing, analyzing and simulation of performance of tools used in the mining and construction industry; providing temporary use of non-downloadable computer software and applications for the analysis of worn, damaged and discarded tools; preparation of scientific and technological reports for the mining and construction industry; preparation of scientific and technological reports relating to rock tools and drilling performance; information, advisory and consultancy services relating to all the aforesaid;
POWERED BY PROFICIO PROSOC, INC. 2177 Salk Ave, Suite 100 Carlsbad CA 92008 Educational courses and training in the fields of computer security; Education and training in the fields of computer security, namely, educational courses and training in the field of computer security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of computer technical support services for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of computer vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of data security diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of data security maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of data security; Education and training in the fields of computer security, namely, educational courses and training in the field of data security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of data security technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of data security vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of endpoint detection and response; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware diagnostic; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware security; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology security; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of managed detection and response; Education and training in the fields of computer security, namely, educational courses and training in the field of managed security service provider; Education and training in the fields of computer security, namely, educational courses and training in the field of network diagnostic services; Education and training in the fields of computer security, namely, educational courses and training in the field of network maintenance services; Education and training in the fields of computer security, namely, educational courses and training in the field of network security; Education and training in the fields of computer security, namely, educational courses and training in the field of network security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of network technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of network vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of password diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of password maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of password security; Education and training in the fields of computer security, namely, educational courses and training in the field of password security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of password technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of password vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of computer security; Education and training in the fields of computer security, namely, educational courses and training in the field of security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of penetration testing; Education and training in the fields of computer security, namely, educational courses and training in the field of security operations center management; Education and training in the fields of computer security, namely, educational courses and training in the field of software diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of software maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of software security policy assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of software technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of software vulnerability assessments;Computer hardware and software in the fields of computer security for use in keeping computers, software and networks secure; computer software for computer security policy assessment; computer software for computer technical support services; computer software for computer vulnerability assessments; computer software for cybersecurity diagnostics services; computer software for cybersecurity maintenance services; computer software for maintaining cybersecurity of computers, software and hardware; computer software for cybersecurity policy assessment; computer software for cybersecurity technical support services; computer software for cybersecurity vulnerability assessments; computer software for data security diagnostics services; computer software for data security maintenance services; computer software for maintaining data security of computers, software and hardware; computer software for data security policy assessment; computer software for data security technical support services; computer software for data security vulnerability assessments; computer software for endpoint detection and response; computer software for firewall security assessments; computer software for firewall security diagnostics services; computer software for firewall security maintenance services; computer software for firewall security; computer software for firewall security policy assessment; computer software for firewall security technical support services; computer software for firewall security vulnerability assessments; computer software for computer hardware diagnostics services; computer software for computer hardware maintenance services; computer software for computer hardware security; computer software for computer hardware security policy assessment; computer software for computer hardware technical support services; computer software for hardware vulnerability assessments; computer software for information technology diagnostics services; computer software for information technology maintenance services; computer software for information technology security; computer software for information technology security policy assessment; computer software for information technology technical support services; computer software for information technology vulnerability assessments; computer software for managed detection and response to cyber-attacks, data security exceptions and policy exceptions; computer software for a managed security service provider; computer software for computer network diagnostics services; computer software for computer network maintenance services; computer software for computer network security; computer software for computer network security policy assessment; computer software for computer network technical support services; computer software for computer network vulnerability assessments; computer software for software or hardware password diagnostics services; computer software for software or hardware password maintenance services; computer software for software or hardware password security; computer software for software or hardware password security policy assessment; computer software for software or hardware password technical support services; computer software for software or hardware password vulnerability assessments; computer software for preventing cybersecurity and unauthorized data access; computer software for software-implemented security policy assessment; computer software for support services, namely, diagnosing computer software and hardware problems, diagnosing computer security problems; computer software for cyber and data vulnerability assessments; computer software for penetration testing of cyber threats and data access threats; computer software for cyber and data security operations center management; computer software for software diagnostics services; computer software for software maintenance services; computer software for software security policy assessments; computer software for software technical support services; computer software for software vulnerability assessments; computer software for computer operating software, applications software, computer hardware and computer network vulnerability assessments;Security guarding of facilities; security policy assessment, namely, physical security consultation; physical security support services in the nature of consulting; vulnerability assessments, namely, security threat analysis for protecting tangible corporate property; penetration testing, namely, security threat analysis for protecting tangible corporate property; vulnerability assessment, namely, verifying and monitoring the credentials of security personnel for corporate offices to ensure public safety and building security;Computer services in the fields of computer security, namely, computer security consulting; computer security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; computer support services, namely, help desk services; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; cybersecurity computer diagnostic services; cybersecurity computer software maintenance services; cybersecurity, namely, computer security threat analysis for protecting data; cybersecurity policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; cybersecurity support services, namely, help desk services; cybersecurity vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; data security computer diagnostic services; data security computer software maintenance services; data security consulting; data security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; data security support services, namely, help desk services; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; endpoint detection and response, namely, monitoring of computer systems to detect intrusions and breakdowns; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; firewall security computer diagnostic services; firewall security services, namely, computer security threat analysis for protecting data; firewall security policy assessment, namely, scanning, review and testing of computer and network policies implemented by software to assess information security vulnerability for computer security purposes; firewall security support services, namely, help desk services; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; hardware diagnostic services, namely, troubleshooting in the nature of diagnosing computer hardware problems; hardware security, namely, computer security threat analysis for protecting data; hardware security policy assessment, namely, reviewing policies, scanning hardware, and reviewing human compliance with policies to assess information security vulnerability for computer security purposes; hardware support services, namely, troubleshooting in the nature of diagnosing computer hardware problems; hardware vulnerability assessments, namely, diagnosing computer hardware security problems; information technology computer diagnostic services; information technology software maintenance services; information technology security, namely, computer security threat analysis for protecting information technology data; information technology security policy assessment, namely, scanning, review and testing of computer and network policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with policies to assess information security vulnerability for computer security purposes; information technology support services, namely, help desk services; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; managed detection and response, namely, monitoring of computer systems to detect breakdowns and security vulnerabilities; managed security service provider, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; network computer diagnostic services; network maintenance services, namely, maintenance of computer software relating to computer security and prevention of computer risks; network security services, namely, maintenance of computer software relating to computer security and prevention of computer risks; network security policy assessment, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes; network support services, namely, help desk services; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, review and testing of computer hardware security involved in computer networks, review and testing of network hardware security of computer networks; computer diagnostic services relating to passwords; computer software maintenance services relating to passwords; password security, namely, maintenance of computer software relating to computer security and prevention of computer risks for passwords; password security policy assessment, namely, scanning and penetration testing of computers and networks to assess password security vulnerability for computer security purposes, scanning, review and testing of computer and network password policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with password policies to assess information security vulnerability for computer security purposes; password support services, namely, help desk services; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess password information security vulnerability for computer security purposes, , scanning, review and testing of computer and network password policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with password policies to assess information security vulnerability for computer security purposes; security, namely, computer consultation in the field of computer security; security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; vulnerability assessments, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes, , scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; penetration testing of computers and networks to assess information security vulnerability for computer security purposes; security operations center management, namely, monitoring technological functions of computer network systems; software diagnostic services, namely, troubleshooting of computer software and computer security problems; computer software maintenance services; software security policy assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; software support services, namely, troubleshooting of computer software problems; software vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess password security vulnerability for computer security purposes;
POWERED BY PROSOC PROSOC, INC. 2177 Salk Ave, Suite 100 Carlsbad CA 92008 Educational courses and training in the fields of computer security; Education and training in the fields of computer security, namely, educational courses and training in the field of computer security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of computer technical support services for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of computer vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of data security diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of data security maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of data security; Education and training in the fields of computer security, namely, educational courses and training in the field of data security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of data security technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of data security vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of endpoint detection and response; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware diagnostic; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware security; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology security; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of managed detection and response; Education and training in the fields of computer security, namely, educational courses and training in the field of managed security service provider; Education and training in the fields of computer security, namely, educational courses and training in the field of network diagnostic services; Education and training in the fields of computer security, namely, educational courses and training in the field of network maintenance services; Education and training in the fields of computer security, namely, educational courses and training in the field of network security; Education and training in the fields of computer security, namely, educational courses and training in the field of network security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of network technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of network vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of password diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of password maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of password security; Education and training in the fields of computer security, namely, educational courses and training in the field of password security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of password technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of password vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of computer security; Education and training in the fields of computer security, namely, educational courses and training in the field of security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of penetration testing; Education and training in the fields of computer security, namely, educational courses and training in the field of security operations center management; Education and training in the fields of computer security, namely, educational courses and training in the field of software diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of software maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of software security policy assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of software technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of software vulnerability assessments;Computer hardware and software in the fields of computer security for use in keeping computers, software and networks secure; computer software for computer security policy assessment; computer software for computer technical support services; computer software for computer vulnerability assessments; computer software for cybersecurity diagnostics services; computer software for cybersecurity maintenance services; computer software for maintaining cybersecurity of computers, software and hardware; computer software for cybersecurity policy assessment; computer software for cybersecurity technical support services; computer software for cybersecurity vulnerability assessments; computer software for data security diagnostics services; computer software for data security maintenance services; computer software for maintaining data security of computers, software and hardware; computer software for data security policy assessment; computer software for data security technical support services; computer software for data security vulnerability assessments; computer software for endpoint detection and response; computer software for firewall security assessments; computer software for firewall security diagnostics services; computer software for firewall security maintenance services; computer software for firewall security; computer software for firewall security policy assessment; computer software for firewall security technical support services; computer software for firewall security vulnerability assessments; computer software for computer hardware diagnostics services; computer software for computer hardware maintenance services; computer software for computer hardware security; computer software for computer hardware security policy assessment; computer software for computer hardware technical support services; computer software for hardware vulnerability assessments; computer software for information technology diagnostics services; computer software for information technology maintenance services; computer software for information technology security; computer software for information technology security policy assessment; computer software for information technology technical support services; computer software for information technology vulnerability assessments; computer software for managed detection and response to cyber-attacks, data security exceptions and policy exceptions; computer software for a managed security service provider; computer software for computer network diagnostics services; computer software for computer network maintenance services; computer software for computer network security; computer software for computer network security policy assessment; computer software for computer network technical support services; computer software for computer network vulnerability assessments; computer software for software or hardware password diagnostics services; computer software for software or hardware password maintenance services; computer software for software or hardware password security; computer software for software or hardware password security policy assessment; computer software for software or hardware password technical support services; computer software for software or hardware password vulnerability assessments; computer software for preventing cybersecurity and unauthorized data access; computer software for software-implemented security policy assessment; computer software for support services, namely diagnosing computer software and hardware problems, diagnosing computer security problems; computer software for cyber and data vulnerability assessments; computer software for penetration testing of cyber threats and data access threats; computer software for cyberand data security operations center management; computer software for software diagnostics services; computer software for software maintenance services; computer software for software security policy assessments; computer software for software technical support services; computer software for software vulnerability assessments; computer software for computer operating software, applications software, computer hardware and computer network vulnerability assessments;Security guarding of facilities; security policy assessment, namely, physical security consultation; physical security support services in the nature of consulting; vulnerability assessments, namely, security threat analysis for protecting tangible corporate property; penetration testing, namely, security threat analysis for protecting tangible corporate property; vulnerability assessment, namely, verifying and monitoring the credentials of security personnel for corporate offices to ensure public safety and building security;Computer services in the fields of computer security, namely, computer security consulting; computer security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; computer support services, namely, help desk services; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; cybersecurity computer diagnostic services; cybersecurity computer software maintenance services; cybersecurity, namely, computer security threat analysis for protecting data; cybersecurity policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; cybersecurity support services, namely, help desk services; cybersecurity vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; data security computer diagnostic services; data security computer software maintenance services; data security consulting; data security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; data security support services, namely, help desk services; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; endpoint detection and response, namely, monitoring of computer systems to detect intrusions and breakdowns; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; firewall security computer diagnostic services; firewall security services, namely, computer security threat analysis for protecting data; firewall security policy assessment, namely, scanning, review and testing of computer and network policies implemented by software to assess information security vulnerability for computer security purposes; firewall security support services, namely, help desk services; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; hardware diagnostic services, namely, troubleshooting in the nature of diagnosing computer hardware problems; hardware security, namely, computer security threat analysis for protecting data; hardware security policy assessment, namely, reviewing policies, scanning hardware, and reviewing human compliance with policies to assess information security vulnerability for computer security purposes; hardware support services, namely, troubleshooting in the nature of diagnosing computer hardware problems; hardware vulnerability assessments, namely, diagnosing computer hardware security problems; information technology computer diagnostic services; information technology software maintenance services; information technology security, namely, computer security threat analysis for protecting information technology data; information technology security policy assessment, namely, scanning, review and testing of computer and network policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with policies to assess information security vulnerability for computer security purposes; information technology support services, namely, help desk services; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; managed detection and response, namely, monitoring of computer systems to detect breakdowns and security vulnerabilities; managed security service provider, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; network computer diagnostic services; network maintenance services, namely, maintenance of computer software relating to computer security and prevention of computer risks; network security services, namely, maintenance of computer software relating to computer security and prevention of computer risks; network security policy assessment, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes; network support services, namely, help desk services; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, review and testing of computer hardware security involved in computer networks, review and testing of network hardware security of computer networks; computer diagnostic services relating to passwords; computer software maintenance services relating to passwords; password security, namely, maintenance of computer software relating to computer security and prevention of computer risks for passwords; password security policy assessment, namely, scanning and penetration testing of computers and networks to assess password security vulnerability for computer security purposes, scanning, review and testing of computer and network password policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with password policies to assess information security vulnerability for computer security purposes; password support services, namely, help desk services; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess password information security vulnerability for computer security purposes, , scanning, review and testing of computer and network password policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with password policies to assess information security vulnerability for computer security purposes; security, namely, computer consultation in the field of computer security; security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; vulnerability assessments, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes, , scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; penetration testing of computers and networks to assess information security vulnerability for computer security purposes; security operations center management, namely, monitoring technological functions of computer network systems; software diagnostic services, namely, troubleshooting of computer software and computer security problems; computer software maintenance services; software security policy assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; software support services, namely, troubleshooting of computer software problems; software vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess password security vulnerability for computer security purposes;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. In a method for individualized training of hearing aid users a number of hearing training courses are stored in a databank. An individual user profile is acquired in a training device. A transmission of the hearing training data from the databank to the training device and/or vice versa ensues via a data network before or during the implementation of the hearing training. The training thus ensues adapted to the respective user profile by means of one or more individualized hearing training courses.