top of page

We are proud to make our training a unique experience to learn from the best

back5.jpg

WHAT WE DO?

Group 662.png

Cyber security training
and workshops

Group 663.png
Group 662.png
Group 665.png

Customized training
courses for businesses

Online, off-line or hybrid
events

Trainees' support
after 
the course

PARTNERS

damsky_tech_logo.png
sababa_security_logo.png
denexus_logo.png
azeria_labs_logo.png
osintraining.png
44con_logo.png
hitbsecconf_logo.png
hexorcist_logo.png
infosec_in_the_city_logo.png
epicturla.png
logo-full-b.png
harbour.space logo 3.png
logo-bcn-congress.png
hermes_logo.png

CYBER SECURITY TRAINING

At itrainsec we select the most relevant topics in the field of Cyber Security.
In any of our courses, your team will learn techniques from top industry experts.

Every training can be customized according your needs and polished together with you, so at the end you get the course that meets your particular goals.

Whether you're a beginner or an experienced analyst, these courses offer a comprehensive approach to understanding, analyzing, and mitigating malware's impact.

Arnau Gàmez i Montolio

REVERSE ENGINEERING AND MALWARE ANALYSIS

Whether you're a beginner or an experienced analyst, these courses offer a comprehensive approach to understanding, analyzing, and mitigating malware's impact.

Discover how it feels to function at peak performance!

Hannah Tufts

DIGITAL WELLBEING FOR CYBER SECURITY PROFESSIONALS

Discover how it feels to function at peak performance!

Do you want to dissect their cyberwarfare tools?

Manuel Blanco

A QUICK DIVE INTO ANDROID MALWARE

Do you want to dissect their cyberwarfare tools?

DNS is inherent to the internet – it’s also a powerful and often underestimated tool for researchers and defenders.

Irena Damsky

HUNTING MALICIOUSNESS USING DNS

DNS is inherent to the internet – it’s also a powerful and often underestimated tool for researchers and defenders.

Building a modern Threat Intel environment is inconceivable without automation. Find out how to do it properly.

Ero Carrera

AUTOMATED INTELLIGENCE ANALYSIS

Building a modern Threat Intel environment is inconceivable without automation. Find out how to do it properly.

When your position makes you a target, OPSEC training helps you avoid becoming a victim.

Christian Martorella & Vicente Diaz

OPSEC FOR C-LEVELS

When your position makes you a target, OPSEC training helps you avoid becoming a victim.

Gain insights into the attackers' mindset and minimise the damage for your business!

Alexander Antukh & Gaston Pumar

CYBER EXTORTION VS ZEN: SURVIVING RANSOMWARE

Gain insights into the attackers' mindset and minimise the damage for your business!

Starting from July 2023

Get practical real world techniques to assess the security posture of Kubernetes clusters and how to protect them.

Diego Comas

KUBERNETES SECURITY

Get practical real world techniques to assess the security posture of Kubernetes clusters and how to protect them.

Gain a solid understanding of the most up to date snapshot of cyber security for Supply Chain and Trusted Partners.

Vladimir Dashchenko

DETECTING AND HANDLING SUPPLY CHAIN ATTACKS

Gain a solid understanding of the most up to date snapshot of cyber security for Supply Chain and Trusted Partners.

Preparamos a empresas y particulares a entender y prevenir esta devastadora amenaza que está en continuo crecimiento.

Christian Martorella & Vicente Diaz

RANSOMWARE: GUÍA DE SUPERVIVENCIA

Preparamos a empresas y particulares a entender y prevenir esta devastadora amenaza que está en continuo crecimiento.

Get basic familiarity with the world of threat intelligence and use cases.

Irena Damsky

INTRODUCTION TO THREAT INTELLIGENCE

Get basic familiarity with the world of threat intelligence and use cases.

Good old RE is not the same for every platform, and ARM is at the core of 60% of mobile devices.

Maria Markstedter

ARM REVERSE ENGINEERING ON 32-BIT AND 64-BIT

Good old RE is not the same for every platform, and ARM is at the core of 60% of mobile devices.

Gain essential knowledge and key concepts behind DFIR, and develop an understanding of digital forensics artifacts, as well as hands-on experience with forensics tools.

Anton Kalinin

DIGITAL FORENSICS & INCIDENT RESPONSE

Gain essential knowledge and key concepts behind DFIR, and develop an understanding of digital forensics artifacts, as well as hands-on experience with forensics tools.

Reap the rewards of this course long after the session closes.

Hannah Tufts

USING NEUROSCIENCE TO BOLSTER YOUR CYBER SECURITY AWARENESS PROGRAMME

Reap the rewards of this course long after the session closes.

Enable organization leadership to perform right decisions and actions during data breach incidents.

Denis Makrushin

CRISIS COMMUNICATIONS: DATA BREACH MITIGATION STRATEGY

Enable organization leadership to perform right decisions and actions during data breach incidents.

You cannot buy intelligence! But you can build a system to take actionable decisions  based on data and  your goals. Learn how.

Virginia Aguilar & Vicente Diaz

APPLIED THREAT INTELLIGENCE

You cannot buy intelligence! But you can build a system to take actionable decisions based on data and your goals. Learn how.

Whether you're a beginner or an experienced analyst, these courses offer a comprehensive approach to understanding, analyzing, and mitigating malware's impact.

Arnau Gàmez i Montolio

AN ANALYTICAL APPROACH TO MODERN BINARY DEOBFUSCATION

Whether you're a beginner or an experienced analyst, these courses offer a comprehensive approach to understanding, analyzing, and mitigating malware's impact.

Learn how to move around the defenses of the world’s most popular mobile operating system.

Maria Markstedter

ANDROID INTRO TO EXPLOIT DEVELOPMENT

Learn how to move around the defenses of the world’s most popular mobile operating system.

MISSING ANYTHING?

Let us know and we will find you the best experts to train your company!

Request a course for your team at info@itrainsec.com

bottom of page