We are proud to make our training a unique experience to learn from the best

back5.jpg

WHAT WE DO?

1.png
2.png
3.png
4.png

Cyber security training and workshops

Customized training

courses for businesses

Online, off-line or hybrid

events

Trainees' support after

the course

OUR PARTNERS

damsky_tech_logo.png
sababa_security_logo.png
denexus_logo.png
azeria_labs_logo.png
osintraining.png
hexorcist_logo.png
infosec_in_the_city_logo.png
epicturla.png

Our Training

At itrainsec we select the most relevant topics in the field of Cyber Security.
In any of our courses, your team will learn techniques from top industry experts.

Every training can be customized according your needs and polished together with you, so at the end you get the course that meets your particular goals.

Learn a systematical, methodological approach to design, setup, and conduct investigations through open sources.

Leonida Reitano

OPEN SOURCE INTELLIGENCE WITH MALTEGO

Learn a systematical, methodological approach to design, setup, and conduct investigations through open sources.

June 10, 2021

Major attacks are becoming as complex as targeted operations against governments. Learn how to crack them.
Join our workshop in collaboration with HITB!

Sergey Lozhkin

ADVANCED CRIMEWARE REVERSE ENGINEERING

Major attacks are becoming as complex as targeted operations against governments. Learn how to crack them.
Join our workshop in collaboration with HITB!

July 17, 2021

Preparamos a empresas y particulares a entender y prevenir esta devastadora amenaza que está en continuo crecimiento.

Christian Martorella & Vicente Diaz

RANSOMWARE: GUÍA DE SUPERVIVENCIA

Preparamos a empresas y particulares a entender y prevenir esta devastadora amenaza que está en continuo crecimiento.

This is a discipline you really want to learn from the best.

Nicolas Brulez

REVERSE ENGINEERING

This is a discipline you really want to learn from the best.

Learn how to move around the defenses of the world’s most popular mobile operating system.

Maria Markstedter

ANDROID INTRO TO EXPLOIT DEVELOPMENT

Learn how to move around the defenses of the world’s most popular mobile operating system.

Building a modern Threat Intel environment is inconceivable without automation. Find out how to do it properly.
Join our workshop in collaboration with HITB!

Ero Carrera

AUTOMATED INTELLIGENCE ANALYSIS

Building a modern Threat Intel environment is inconceivable without automation. Find out how to do it properly.
Join our workshop in collaboration with HITB!

June 12, 2021

Why go bug hunting with a spear when you can use a whole army of bots?
Join the coming up workshop in collaboration with HITB!

Denis Makrushin

AUTOMATING BUG HUNTING

Why go bug hunting with a spear when you can use a whole army of bots?
Join the coming up workshop in collaboration with HITB!

July 24, 2021

Get basic familiarity with the world of threat intelligence and use cases.

Irena Damsky

INTRODUCTION TO THREAT INTELLIGENCE

Get basic familiarity with the world of threat intelligence and use cases.

20 billion devices at your service.

Maria Markstedter

IOT – EXPLOIT DEVELOPMENT

20 billion devices at your service.

As more and more companies move their infrastructure to AWS, do we understand security risks?

Christian Martorella

AWS KILL CHAIN

As more and more companies move their infrastructure to AWS, do we understand security risks?

When your position makes you a target, OPSEC training helps you avoid becoming a victim.
Join the coming up workshop in collaboration with HITB!

Christian Martorella & Vicente Diaz

OPSEC FOR C-LEVELS

When your position makes you a target, OPSEC training helps you avoid becoming a victim.
Join the coming up workshop in collaboration with HITB!

June 19, 2021

DNS is inherent to the internet – it’s also a powerful and often underestimated tool for researchers and defenders.
Join the coming up session in collaboration with 44Con!

Irena Damsky

HUNTING MALICIOUSNESS USING DNS

DNS is inherent to the internet – it’s also a powerful and often underestimated tool for researchers and defenders.
Join the coming up session in collaboration with 44Con!

September 16, 2021

You cannot buy intelligence! But you can build a system to take actionable decisions  based on data and  your goals. Learn how.

Virginia Aguilar

APPLIED THREAT INTELLIGENCE

You cannot buy intelligence! But you can build a system to take actionable decisions based on data and your goals. Learn how.

Good old RE is not the same for every platform, and ARM is at the core of 60% of mobile devices.

Maria Markstedter

ARM REVERSE ENGINEERING ON 32-BIT AND 64-BIT

Good old RE is not the same for every platform, and ARM is at the core of 60% of mobile devices.

Critical knowledge to protect critical systems.

Vladimir Daschenko

THE BASICS OF ADVANCED ICS SECURITY

Critical knowledge to protect critical systems.

MISSING ANYTHING?

Let us know and we will find you the best experts to train your company!

Request a course for your team at info@itrainsec.com

Upcoming Events

  • OPSEC FOR C-LEVELS
    Sat, Jul 10
    Online workshop in collab with HITB
    Jul 10, 12:00 PM – 4:00 PM GMT+2
    Online workshop in collab with HITB
    This lab introduces the necessary awareness based on real-life examples with a realistic action plan to minimize exposure to current and future attacks by advanced adversaries.
  • CRIMEWARE REVERSE ENGINEERING
    Sat, Jul 17
    Online workshop in collab with HITB
    Jul 17, 12:00 PM – 4:00 PM GMT+2
    Online workshop in collab with HITB
    This lab provides all you need to know for analyzing sophisticated malware used in modern real attacks against financial organizations. The lab will also touch on methods, malware, payload delivery vectors, shellcodes, anti-analysis and anti detection capabilities used in modern financial attacks.
  • APPLICATION SECURITY CHAMPIONS PROGRAM
    Sat, Jul 24
    Online workshop in collab with HITB
    Jul 24, 12:00 PM – 4:00 PM GMT+2
    Online workshop in collab with HITB
    During this Lab, you will research the web application attacks, tools, techniques, and procedures to exploit vulnerabilities in web applications. We will embark on the paths and go from zero knowledge about web vulnerabilities to automation of the bug hunting routine.
  • CRIMEWARE REVERSE ENGINEERING
    Tue, Sep 14
    Location is TBD
    Sep 14, 11:00 AM GMT+1 – Sep 15, 6:00 PM GMT+1
    Location is TBD
    Major attacks are becoming as complex as targeted operations against governments. Learn how to crack them.
  • HUNTING MALICIOUSNESS USING DNS
    Thu, Sep 16
    Online Training in collab with 44CON
    Sep 16, 9:00 AM
    Online Training in collab with 44CON
    DNS is inherent to the internet – it’s also a powerful and often underestimated tool for researchers and defenders.