About us


EG-CERT was established in April 2009 as part of the National Telecom Regulatory Authority (NTRA). EG-CERT is charged with providing computer and information security incident response, support, defense and analysis against cyber attacks and collaboration with governmental, financial entities and any other critical information infrastructure sectors EG-CERT also provides early warning against malware spreading and massive cyber attacks against Egypt’s telecom infrastructure. EG-CERT consists of four main departments, which are Incident Handling,Cyber forensics,Malware Analysis and Penetration Testing.

EG-CERT Departments

Incident Handling
Our objective is:

  • To handle the incidents and the attacks targeting the Egyptian critical information infrastructure and mitigate the cyber threats, Involves being as ready as we can be and that requires being up to date with the latest threats and trends in the field of cyber security and constantly increasing our technical capabilities.
Cyber Forensics
Our objective is:

  • To preserve the integrity of digital artifacts to be presented as evidence to the responsible entities.
  • To recover, analyze, and identify the evidence to estimate the potential impact of the malicious activity on the victim.
  • To assess the intent and identity of the perpetrator.
  • To conduct the Cyber Forensics process in short time with the highest quality of analysis and reporting.
Penetration Testing
Our objective is:

  • To determine the strengths and weaknesses of a network consisting of computers and network devices.
  • To maintain both the integrity of the results and the stability of the systems being tested.
  • To provide recommendations for resolving the threats and vulnerabilities found in the system.
Malware Analysis
Our objective is:

  • To provide expertise in detecting and analyzing malicious software (malware).
  • The Reverse engineering process is used to identify, analyze, and extract information from the collected malware. We conduct research using artificial intelligence techniques to automatically detect and identify the malware and exploits.