Our Trainings
Our Trainings
At itrainsec we select the most relevant topics in the field of IT Security.
In any of our courses, your team will learn techniques from top industry experts.
At itrainsec we select the most relevant topics in the field of IT Security.
In any of our courses, your team will learn techniques from top industry experts.
We are proud to make our training a unique experience to learn from the best

PARTNERS
CYBER SECURITY TRAINING
At itrainsec we select the most relevant topics in the field of Cyber Security.
In any of our courses, your team will learn techniques from top industry experts.
Every training can be customized according your needs and polished together with you, so at the end you get the course that meets your particular goals.
Hannah Tufts
DIGITAL WELLBEING FOR CYBER SECURITY PROFESSIONALS
Discover how it feels to function at peak performance!
Vladimir Dashchenko
DETECTING AND HANDLING SUPPLY CHAIN ATTACKS
Gain a solid understanding of the most up to date snapshot of cyber security for Supply Chain and Trusted Partners.
Diego Comas
KUBERNETES SECURITY
Get practical real world techniques to assess the security posture of Kubernetes clusters and how to protect them.
Irena Damsky
INTRODUCTION TO THREAT INTELLIGENCE
Get basic familiarity with the world of threat intelligence and use cases.
Christian Martorella & Vicente Diaz
OPSEC FOR C-LEVELS
When your position makes you a target, OPSEC training helps you avoid becoming a victim.
Manuel Blanco
A QUICK DIVE INTO ANDROID MALWARE
Do you want to dissect their cyberwarfare tools?
Denis Makrushin
CRISIS COMMUNICATIONS: DATA BREACH MITIGATION STRATEGY
Enable organization leadership to perform right decisions and actions during data breach incidents.
Virginia Aguilar
APPLIED THREAT INTELLIGENCE
You cannot buy intelligence! But you can build a system to take actionable decisions based on data and your goals. Learn how.
Irena Damsky
HUNTING MALICIOUSNESS USING DNS
DNS is inherent to the internet – it’s also a powerful and often underestimated tool for researchers and defenders.
Join the coming up session in collaboration with 44Con!
Maria Markstedter
ARM REVERSE ENGINEERING ON 32-BIT AND 64-BIT
Good old RE is not the same for every platform, and ARM is at the core of 60% of mobile devices.
Arnau Gàmez i Montolio
A GUIDE TO MALWARE ANALYSIS AND REVERSE ENGINEERING
This is a discipline you really want to learn from the best.
Hannah Tufts
USING NEUROSCIENCE TO BOLSTER YOUR CYBER SECURITY AWARENESS PROGRAMME
Reap the rewards of this course long after the session closes.
Christian Martorella & Vicente Diaz
RANSOMWARE: GUÍA DE SUPERVIVENCIA
Preparamos a empresas y particulares a entender y prevenir esta devastadora amenaza que está en continuo crecimiento.
Ero Carrera
AUTOMATED INTELLIGENCE ANALYSIS
Building a modern Threat Intel environment is inconceivable without automation. Find out how to do it properly.
Arnau Gàmez i Montolio
AN ANALYTICAL APPROACH TO MODERN BINARY DEOBFUSCATION
Gain an in-depth understanding of code obfuscation mechanisms
Maria Markstedter
ANDROID INTRO TO EXPLOIT DEVELOPMENT
Learn how to move around the defenses of the world’s most popular mobile operating system.
Leonida Reitano
OPEN SOURCE INTELLIGENCE WITH MALTEGO
Learn a systematical, methodological approach to design, setup, and conduct investigations through open sources.
MISSING ANYTHING?
Let us know and we will find you the best experts to train your company!
Request a course for your team at info@itrainsec.com