We are proud to make our training a unique experience to learn from the best

back5.jpg

Cybersecurity Trainings

We make all our training a unique and enjoyable experience that goes beyond your expectations. We carefully select the best trainers in the field to share their knowledge, and provide you with a great opportunity that combines  learning, networking, and exclusive atmosphere. 

OUR PARTNERS

damsky_tech_logo.png
sababa_security_logo.png
denexus_logo.png
azeria_labs_logo.png
osintraining.png
hexorcist_logo.png
infosec_in_the_city_logo.png
epicturla.png

Our Training

At itrainsec we select the most relevant topics in the field of IT Security.
In any of our courses, your team will learn techniques from top industry experts.

Every training can be customized according your needs and polished together with you, so at the end you get the course that meets your particular goals.

Sergey Lozhkin

ADVANCED CRIMEWARE REVERSE ENGINEERING

Major attacks are becoming as complex as targeted operations against governments. Learn how to crack them.

April 12-15, 2021

Christian Martorella

OPSEC FOR C-LEVELS

When your position makes you a target, OPSEC training helps you avoid becoming a victim.

Ero Carrera

AUTOMATED INTELLIGENCE ANALYSIS

Building a modern Threat Intel environment is inconceivable without automation. Find out how to do it properly.

Maria Markstedter

IOT – EXPLOIT DEVELOPMENT

20 billion devices at your service.

Denis Makrushin

AUTOMATING BUG HUNTING

Why go bug hunting with a spear when you can use a whole army of bots?

Christian Martorella & Vicente Diaz

RANSOMWARE: GUÍA DE SUPERVIVENCIA

Preparamos a empresas y particulares a entender y prevenir esta devastadora amenaza que está en continuo crecimiento.

Irena Damsky

INTRODUCTION TO THREAT INTELLIGENCE

Get basic familiarity with the world of threat intelligence and use cases.

Nicolas Brulez

REVERSE ENGINEERING

This is a discipline you really want to learn from the best.

Maria Markstedter

ANDROID INTRO TO EXPLOIT DEVELOPMENT

Learn how to move around the defenses of the world’s most popular mobile operating system.

Vladimir Daschenko

THE BASICS OF ADVANCED ICS SECURITY

Critical knowledge to protect critical systems.

Leonida Reitano

OPEN SOURCE INTELLIGENCE WITH MALTEGO

Learn a systematical, methodological approach to design, setup, and conduct investigations through open sources.

Virginia Aguilar

APPLIED THREAT INTELLIGENCE

You cannot buy intelligence! But you can build a system to take actionable decisions based on data and your goals. Learn how.

Maria Markstedter

ARM REVERSE ENGINEERING ON 32-BIT AND 64-BIT

Good old RE is not the same for every platform, and ARM is at the core of 60% of mobile devices.

Irena Damsky

HUNTING MALICIOUSNESS USING DNS

DNS is inherent to the internet – it’s also a powerful and often underestimated tool for researchers and defenders.

Christian Martorella

AWS KILL CHAIN

As more and more companies move their infrastructure to AWS, do we understand security risks?

MISSING ANYTHING?

Let us know and we will find you the best experts to train your company!

Request a course for your team at info@itrainsec.com

Upcoming Events

  • OSINT with MALTEGO
    Online Event
    Mar 19, 1:30 PM GMT+1 – Mar 21, 6:00 PM GMT+1
    Online Event
    The advanced Maltego/ Social Links training program will teach participants a systematical, methodological approach to design, setup, and conduct investigations through open sources.
  • OPEN SOURCE INTELLIGENCE
    Online Event
    Mar 26, 2:00 PM GMT+1 – Mar 27, 6:00 PM GMT+1
    Online Event
    The investigative OSINT training program will teach participants a, methodological approach to design, setup, and conduct an investigation trough information from open sources.
  • BITCOIN INTELLIGENCE
    Online Event
    Mar 27, 11:00 AM – Mar 28, 4:00 PM
    Online Event
    Participants from law enforcement and government agencies (police, justice, security, tax authorities) can benefit from insights into the growth of criminal activity on the hidden part of the web and gain insight into cryptocurrencies such as the use of Bitcoin for money transfers, money laundering,
  • SOCIAL MEDIA INTELLIGENCE
    Online Event
    Apr 09, 2:00 PM GMT+2 – Apr 10, 6:00 PM GMT+2
    Online Event
    The Social Media Intelligence Course will teach participants how to design, setup, and conduct an investigation through Social Networks.
  • ADVANCED CRIMEWARE REVERSE ENGINEERING
    Online Event
    Apr 12, 3:00 PM GMT+1 – Apr 15, 9:00 PM GMT+1
    Online Event
    This training course provides all you need to know for analyzing sophisticated malware used in modern real-world attacks against financial organizations.