Comparison Overview

ALC Training

VS

Women in Construction Program

ALC Training

9 McInroy Street, Taringa, Qld, 4068, AU
Last Update: 2025-12-18

ALC is a leading provider of quality training for business and government. Our focus is on best-practice methods and frameworks that help ensure you get the most out of your investment in IT. Since March 2023, we are part of Tesserent Academy. We have been recognised at the 2024 Learning Impact Awards as a finalist for the Learning Provider of the Year, and the Diversity and Inclusion initiative categories. Our extensive training portfolio is designed to help equip people to address the key areas in which Information and Computer Technology impacts the enterprise. Portfolio streams include: • Information/Cyber Security (SABSA®, CRISC®, CISSP®, CISM®, CCSP®) • Project Management (Agile, PRINCE2®, Scrum, MSP®) • Enterprise (TOGAF®, Business Analysis, DevOps) • IT Governance (COBIT®, CGEIT®) • Service Management (ITIL® – Foundation to Expert) • Management and People ALC has strong form in training and a proven track record of being at the leading edge with a series of firsts: • Project management training since 1994 and PRINCE2 since 1999 • Longest-serving provider of ITIL training in Asia-Pacific. Launched in Singapore & Malaysia in July 1998 and in Australia since August 1999 • World’s first SABSA Foundation Certificate course held by ALC in Sydney in March 2007 • First DevOps certificate training in Asia-Pacific in July 2015 ITIL®/PRINCE2®/MSP® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. The Swirl logo™ is a trademark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.

NAICS: 611
NAICS Definition:
Employees: 12
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Women in Construction Program

684 Walker St, Biloxi, 39530, US
Last Update: 2025-12-19

The Women in Construction (WinC) program at Moore Community House is a pre-apprenticeship job training program that provides career and technical training that qualifies participants for employment in advanced manufacturing and the construction skilled craft trades. This innovative program combines classroom and hands-on learning, with the opportunity for participants to earn nationally recognized credentials.

NAICS: 6115
NAICS Definition: Technical and Trade Schools
Employees: None
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/alc-training.jpeg
ALC Training
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/women-in-construction-program.jpeg
Women in Construction Program
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
ALC Training
100%
Compliance Rate
0/4 Standards Verified
Women in Construction Program
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Technical and Vocational Training Industry Average (This Year)

No incidents recorded for ALC Training in 2025.

Incidents vs Technical and Vocational Training Industry Average (This Year)

No incidents recorded for Women in Construction Program in 2025.

Incident History — ALC Training (X = Date, Y = Severity)

ALC Training cyber incidents detection timeline including parent company and subsidiaries

Incident History — Women in Construction Program (X = Date, Y = Severity)

Women in Construction Program cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/alc-training.jpeg
ALC Training
Incidents

No Incident

https://images.rankiteo.com/companyimages/women-in-construction-program.jpeg
Women in Construction Program
Incidents

No Incident

FAQ

Women in Construction Program company demonstrates a stronger AI Cybersecurity Score compared to ALC Training company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Women in Construction Program company has disclosed a higher number of cyber incidents compared to ALC Training company.

In the current year, Women in Construction Program company and ALC Training company have not reported any cyber incidents.

Neither Women in Construction Program company nor ALC Training company has reported experiencing a ransomware attack publicly.

Neither Women in Construction Program company nor ALC Training company has reported experiencing a data breach publicly.

Neither Women in Construction Program company nor ALC Training company has reported experiencing targeted cyberattacks publicly.

Neither ALC Training company nor Women in Construction Program company has reported experiencing or disclosing vulnerabilities publicly.

Neither ALC Training nor Women in Construction Program holds any compliance certifications.

Neither company holds any compliance certifications.

Women in Construction Program company has more subsidiaries worldwide compared to ALC Training company.

Neither ALC Training nor Women in Construction Program holds SOC 2 Type 1 certification.

Neither ALC Training nor Women in Construction Program holds SOC 2 Type 2 certification.

Neither ALC Training nor Women in Construction Program holds ISO 27001 certification.

Neither ALC Training nor Women in Construction Program holds PCI DSS certification.

Neither ALC Training nor Women in Construction Program holds HIPAA certification.

Neither ALC Training nor Women in Construction Program holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability has been found in SeaCMS up to 13.3. The affected element is an unknown function of the file js/player/dmplayer/dmku/class/mysqli.class.php. Such manipulation of the argument page/limit leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HappyDevs TempTool allows Stored XSS.This issue affects TempTool: from n/a through 1.3.1.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tormorten WP Microdata allows Stored XSS.This issue affects WP Microdata: from n/a through 1.0.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
Description

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in HappyDevs TempTool allows Retrieve Embedded Sensitive Data.This issue affects TempTool: from n/a through 1.3.1.

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

A vulnerability has been found in Tenda FH1201 1.2.0.14(408). Affected is the function sprintf of the file /goform/SetIpBind. Such manipulation of the argument page leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X