09
Computer software for learning, training and practice in the
fields of cyber security and cyber threats, simulation based
cyber attack assessment, cyber security incident simulation
exercises, disruptive cyber simulation, cyber attacks,
virtual prevention testing, and breach and attack
simulation; downloadable cyber security computer training
software for protecting IT (Information Technology), OT
(Operational Technology) and IoT (Internet of Things)
systems and infrastructures; downloadable computer training
software for simulating IT (Information Technology), OT
(Operational Technology) and IoT (Internet of Things)
systems, infrastructures and traffic and cyber-attacks;
downloadable computer software for cyber security training
and handling; computer software for behavioral analysis,
machine learning algorithms and big-data analytics; computer
software for managing cyber incident response, alert
management, response management, cyber incident
investigation, cyber incident workflow automation and cyber
incident data collection and analysis; computer software for
the purpose of cyber security training, network assessment,
tool assessment, vulnerability assessment, and penetration
testing; software for information asset, security, threat
and vulnerability risk assessment, evaluation and management
in the field of electronic information security; computer
software used to develop information technology solutions
for reducing information, asset, and security threats and
information technology vulnerability risks for businesses;
software for designing and developing information
availability, integrity and security solutions; downloadable
computer security software; computer software for
controlling and managing access server applications
41
Training in the fields of cyber security and cyber threats;
training for personnel development; training in the use of
computers; training in the field of communication
technologies; training in the field of data processing;
computer education training services; personal development
training; vocational training; career and vocational
training; computer based training; providing information
relating to training; providing courses of instruction;
providing on-line courses of instruction; know-how transfer
[training]; production of instructional materials; providing
of training and education; provision of training courses;
conducting of training workshops; conducting of training
seminars; conducting of training courses; business training;
arranging and conducting of seminars and training workshops;
arranging professional workshop and training courses;
arranging and conducting of conferences, congresses,
seminars and training workshops; basic and advanced training
for human resources development; conducting of training
courses in the field of technology and innovation; providing
on-line information and news in the field of employment
training; training and further training for personnel, team
and organizational development; career counselling and
coaching [training and education advice]; training in the
use and operation of computers and data processors;
organization and arranging of seminars, conferences,
training courses and further training; providing of
training; provision of training programs; vocational
education and training services; training services in the
field of computer software development; conducting of
instructional, educational and training courses for young
people and adults; vocational skills training
42
Providing temporary use of non-downloadable cyber security
computer training software for protecting IT (Information
Technology), OT (Operational Technology) and IoT (Internet
of Things) systems and infrastructures; providing temporary
use of non-downloadable computer training software for
simulating IT (Information Technology), OT (Operational
Technology) and IoT (Internet of Things) systems,
infrastructures and traffic and cyber-attacks; providing
temporary use of non downloadable computer software for
cyber security training and handling; development of
information, asset and security risk reduction software
tools for business use; design, development and project
management of computer software and hardware used for
information, asset and security risk solutions; providing
temporary use of non-downloadable software used to assess,
evaluate, manage and develop solutions to information, asset
and security risks; computer security threat analysis for
protecting data; computer security consultancy in the field
of cyber security, namely, evaluation of intrusion detection
and prevention risks and capabilities, including risks and
capabilities in relation to software applications and
firewalls, and configuration of intrusion detection and
prevention computer systems; data security consultancy;
information technology consulting services; Internet
security consultancy; providing temporary use of
non-downloadable computer programs for cyber surveillance,
for identifying information systems' security vulnerability,
for maintaining the security and integrity of computer
networks and data storage facilities, for real-time analysis
of security alerts, for defending against data breaches and
privacy violations, for conducting network intrusion
protection testing and for vulnerability management and
assessment, risk management and assessment, data breach
threat analysis and network threat analysis; maintenance of
computer software; temporary electronic storage of
information and data; providing on-line non-downloadable
software for use in database management; testing, analysis
and monitoring of navigation signals; testing, analysis and
monitoring of telecommunication signals; testing of computer
hardware and software; compilation of computer programs;
information technology engineering; rental of Internet
security programs; installation of software for computer
systems; consultancy in the design and development of
computer hardware; professional consultancy relating to
computer security; writing of computer programs; writing of
computer software; writing of data processing programs;
technological research; product research; providing
technical advice relating to computers; providing
information in the field of computer software development;
providing technical information about computers, computer
software and computer networks; providing information about
the design and development of computer software; monitoring
of computer systems for detecting unauthorized access or
data breach; computer system analysis; analysis of technical
data; updating and maintenance of computer software;
updating of computer software relating to computer security
and prevention of computer risks; updating of computer
software; updating of computer programs; design and
development of computer systems; design and development of
video game software; custom design of computer software;
design of computer programs; development and testing of
computer software; development and testing of computing
methods, algorithms and software; development of computer
platforms; development of computer game software; computer
hardware and software testing services; computer-aided
diagnostic testing services; information technology [IT]
consultancy; computer and technology services for securing
computer data; computer programming services for the
protection of software; design and development of virtual
reality software; design and development of Internet
security programs
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen