Student in Library

WELCOME TO ITRANSEC

We are proud to make our training a unique experience to learn from the best

 
Financial Malware Analysis
Online Training
 
Startup

ABOUT

We make all our training a unique and enjoyable experience that goes beyond your expectations. We carefully select the best trainers in the field to share their knowledge, and provide you with a great opportunity that combines  learning, networking, and exclusive atmosphere.

 

BENEFITS

Learning at itrainsec will give you much more than a degree or a diploma. When you join us, you’ll enjoy a vibrant atmosphere, countless networking opportunities and many other benefits.

 

NETWORKING MEETUPS

At itrainsec, we believe in a holistic learning experience. One of the most popular activities are the Networking Meetups, hosted together with our courses. To find out how to get involved,  contact us today.

EVENTS

We provide on-line and off-line training courses under request.
We organize 1-5 days sessions on your premises. However, what makes us different is our all-inclusive events.
We take care of every detail to both save your time and get the most of it: training facilities, accommodation for all participants, dinners, meet-ups and entertainment programs for better networking.

ALUMNI

We've built strong friendship with our trainers and trainees during the last 10 years. Their courses were provided at the key security conferences like TheSAScon, BlackHat, BlueHat, etc.

OUR TRAINING

At itrainsec we select the most relevant topics in the field of IT Security.
In any of our courses, your team will learn techniques from top industry experts.

 

REVERSE ENGINEERING

This training provides students with the knowledge, methods and tools needed to analyze modern malware both statically and dynamically. All exercises are samples from real attacks used by APT groups and cybercriminals. The training is provided in different levels, from no reverse engineering experience to methods used by top experts in AV companies.

APPLIED THREAT INTELLIGENCE

This realistic approach to Threat Intelligence provides practical solutions for the problems this discipline is meant to solve: improving threat hunting skills, building effective detection and prevention strategies, what tools and platforms use to effectively collect valuable data and what are the best practices to analyze it. The training is based on modern solutions with real use case scenarios.

BREAKING INTO THE CLOUD

“Breaking into the Cloud” (BiC) course is an intense hands-on experience on Cloud security. Best hacking techniques and tools will be demonstrated to exploit common AWS misconfigurations. As a final challenge, students will be offered a unique CTF where they will have to deal with containers, application vulnerabilities and keys´ permissions to exploit AWS infrastructure.

APPLICATION BUG HUNTING

The multiple technologies used for application security increase the attacking vector. Bug hunting and exploitation of web vulnerabilities is a vital process both for red teams and developers. This training provides the tools, techniques and procedures to automate and orchestrate the bug hunting process and  exploitation of advanced web vulnerabilities.

OPSEC FOR C-LEVELS

C-levels are one of the most usual targets for cyberespionage. This training provides the necessary awareness based on real examples with a realistic action plan to minimize the exposure to current and future attacks by advanced adversaries.

MISSING ANYTHING?

Let us know and we will find you the best experts to train your company!

Request a course for your team at info@itrainsec.com

Woman%20with%20Computer_edited.jpg

CONTACT US

 

Barcelona, Spain

  • Twitter
  • LinkedIn

©2020 by ITrainSec. Proudly created with Wix.com