WELCOME TO ITRANSEC
We are proud to make our training a unique experience to learn from the best
We make all our training a unique and enjoyable experience that goes beyond your expectations. We carefully select the best trainers in the field to share their knowledge, and provide you with a great opportunity that combines learning, networking, and exclusive atmosphere.
Learning at itrainsec will give you much more than a degree or a diploma. When you join us, you’ll enjoy a vibrant atmosphere, countless networking opportunities and many other benefits.
At itrainsec, we believe in a holistic learning experience. One of the most popular activities are the Networking Meetups, hosted together with our courses. To find out how to get involved, contact us today.
We provide on-line and off-line training courses under request.
We organize 1-5 days sessions on your premises. However, what makes us different is our all-inclusive events.
We take care of every detail to both save your time and get the most of it: training facilities, accommodation for all participants, dinners, meet-ups and entertainment programs for better networking.
We've built strong friendship with our trainers and trainees during the last 10 years. Their courses were provided at the key security conferences like TheSAScon, BlackHat, BlueHat, etc.
At itrainsec we select the most relevant topics in the field of IT Security.
In any of our courses, your team will learn techniques from top industry experts.
Download the brochure with all training courses.
This training provides students with the knowledge, methods and tools needed to analyze modern malware both statically and dynamically. All exercises are samples from real attacks used by APT groups and cybercriminals. The training is provided in different levels, from no reverse engineering experience to methods used by top experts in AV companies.
APPLIED THREAT INTELLIGENCE
This realistic approach to Threat Intelligence provides practical solutions for the problems this discipline is meant to solve: improving threat hunting skills, building effective detection and prevention strategies, what tools and platforms use to effectively collect valuable data and what are the best practices to analyze it. The training is based on modern solutions with real use case scenarios.
BREAKING INTO THE CLOUD
“Breaking into the Cloud” (BiC) course is an intense hands-on experience on Cloud security. Best hacking techniques and tools will be demonstrated to exploit common AWS misconfigurations. As a final challenge, students will be offered a unique CTF where they will have to deal with containers, application vulnerabilities and keys´ permissions to exploit AWS infrastructure.
APPLICATION BUG HUNTING
The multiple technologies used for application security increase the attacking vector. Bug hunting and exploitation of web vulnerabilities is a vital process both for red teams and developers. This training provides the tools, techniques and procedures to automate and orchestrate the bug hunting process and exploitation of advanced web vulnerabilities.
OPSEC FOR C-LEVELS
C-levels are one of the most usual targets for cyberespionage. This training provides the necessary awareness based on real examples with a realistic action plan to minimize the exposure to current and future attacks by advanced adversaries.