Information Technology & Cybersecurity Training and Consulting

  • Follow
  • Follow
  • Follow
  • Follow
  • Follow
Menu
  • Home
  • About
  • Trainings
  • Services
  • Cybersecurity
    • Close
    • Cybersecurity Framework 2.0
    • Cybersecurity Framework 1.1
    • Cybersecurity Technical Architecture Reference
    • Risk Management Framework
    • COBIT 2019 – Governance and Management Objectives
    • OWASP Top 10 (2021) Threat Levels
    • Amazon Web Services (AWS) Security
    • Azure Cloud Security
    • Azure Cloud Security Benchmark
    • Ransomware Prevention Guide
    • Identity Management Security
    • ISO 27001:2022 – Security Controls
    • PCI DSS Requirements
    • Zero Trust Security
    • Data Privacy Framework
    • DevSecOps Lifecycle Security Reference
    • Ethical Guidelines for Trustworthy Artificial Intelligence (AI)
    • Close
  • IT Job Roles
  • KB
  • Blog
  • Contact
Identity Management Security Checklist

Identity Management Security Checklist

Cybersecurity Technical Architecture Reference

Cybersecurity Technical Architecture Reference

Cybersecurity Framework

Cybersecurity Framework

Data Privacy Framework

Data Privacy Framework

DevSecOps Lifecycle Security Reference

DevSecOps Lifecycle Security Reference

Risk Assessment Lifecycle Flowchart

Risk Assessment Lifecycle Flowchart

PCI DSS Requirements

PCI DSS Requirements

COBIT 2019 – Governance and Management Objectives

COBIT 2019 – Governance and Management Objectives

Risk Management Framework Checklist

Risk Management Framework Checklist

Zero Trust Maturity Model

Zero Trust Maturity Model

ISO 27001 Control Objectives

ISO 27001 Control Objectives

Amazon Web Services (AWS) Security Checklist

Amazon Web Services (AWS) Security Checklist

Ransomware Prevention & Response Guide

Ransomware Prevention & Response Guide

Azure Cloud Security Checklist

Azure Cloud Security Checklist

Ethical Guidelines for Trustworthy Artificial Intelligence (AI)

Ethical Guidelines for Trustworthy Artificial Intelligence (AI)

OWASP Top 10 (2021) Threat Levels & Scenarios

OWASP Top 10 (2021) Threat Levels & Scenarios

Euriun Technologies is an Information Technology and Cybersecurity Management Services Company providing managed support services on Windows and Linux Servers, Vulnerability Management, Information Security Audit, Web Application Security, Business Intelligence and Data Analytics, Project and Service Management and Business Process Automation/Workflow.

Suite D98 Dolphin Plaza,
Ikoyi, Lagos, Nigeria.

[email protected]

+234 0201 4536171

Euriun Technologies
  • Follow
  • Follow
  • Follow
  • Follow
  • Follow
Copyright © 2025 | Euriun Technologies Limited | All Rights Reserved.
  • +234 0201 453 6171

  • [email protected]