KEYW training and educational services, namely, conducting courses and certification programs in the field of cyber security, cyber-defense, information security and assurance, data security, computer security, network security, network exploitation, tactical forensics, offensive methodology and analysis, programming access tools and prevention, detection, mitigation and remediation of hacking, cyber-attacks, computer crimes and computer viruses; aerial photography services for monitoring purposes for intelligence, surveillance and reconnaissance activities, scientific and research purposes, and for disaster management, construction site management, oil and gas exploration, port security, general area of interest mapping, geographic analysis, wildlife management, hydrocarbon and geophysical exploration, agriculture management, forest management and other government and commercial uses; provision of remote imaging services, namely, aerial photography; aerial digital photographic image capture; digital imaging services; aerial imagery services in the nature of photography; arranging and conducting cyber-security educational training exercises; providing an on-line portal featuring an interactive learning management system for designing, developing, implementing and administering courses and training in the fields of cyber-security, computer security, network security and data security, including monitoring student progress, assessing student learning and performance, evaluating assignments, assessments, tests and exercises, providing student feedback and support, and generating reports | 10/26/2017 |
PARROT LABS training and educational services, namely, conducting courses and certification programs in the field of cyber security, cyber-defense, information security and assurance, data security, computer security, network security, network exploitation, tactical forensics, offensive methodology and analysis, programming access tools and prevention, detection, mitigation and remediation of hacking, cyber-attacks, computer crimes and computer viruses | 03/11/2014 |