Our Trainings

At itrainsec we select the most relevant topics in the field of IT Security.

blue.png

Sergey Lozhkin

ADVANCED CRIMEWARE REVERSE ENGINEERING

Major attacks are becoming as complex as targeted operations against governments. Learn how to crack them.

blue.png

Christian Martorella, Vicente Diaz

OPSEC FOR C-LEVELS

When your position makes you a target, OPSEC training helps you avoid becoming a victim.

blue.png

Ero Carrera

AUTOMATED INTELLIGENCE ANALYSIS

Building a modern Threat Intel environment is inconceivable without automation. Find out how to do it properly.

blue.png

Maria Markstedter

ANDROID INTRO TO EXPLOIT DEVELOPMENT

Learn how to move around the defenses of the world’s most popular mobile operating system.

blue.png

Denis Makrushin

AUTOMATING BUG HUNTING

Why go bug hunting with a spear when you can use a whole army of bots?

blue.png

Christian Martorella & Vicente Diaz

RANSOMWARE: SURVIVAL GUIDE

Helping businesses and individuals to to understand and prevent this devastating and growing threat.
The course is available in Spanish.

blue.png

Irena Damsky

INTRODUCTION TO THREAT INTELLIGENCE

Get basic familiarity with the world of threat intelligence and use cases.

blue.png

Nicolas Brulez

REVERSE ENGINEERING

This is a discipline you really want to learn from the best.

blue.png

Maria Markstedter

IOT – EXPLOIT DEVELOPMENT

20 billion devices at your service.

blue.png

Vladimir Daschenko

THE BASICS OF ADVANCED ICS SECURITY

Critical knowledge to protect critical systems.

blue.png

Leonida Reitano

OPEN SOURCE INTELLIGENCE WITH MALTEGO

Learn a systematical, methodological approach to design, setup, and conduct investigations through open sources.

May 13-15, 2021

blue.png

Virginia Aguilar

APPLIED THREAT INTELLIGENCE

You cannot buy intelligence! But you can build a system to take actionable decisions based on data and your goals. Learn how.

blue.png

Maria Markstedter

ARM REVERSE ENGINEERING ON 32-BIT AND 64-BIT

Good old RE is not the same for every platform, and ARM is at the core of 60% of mobile devices.

blue.png

Irena Damsky

HUNTING MALICIOUSNESS USING DNS

DNS is inherent to the internet – it’s also a powerful and often underestimated tool for researchers and defenders.

blue.png

Christian Martorella

AWS KILL CHAIN

As more and more companies move their infrastructure to AWS, do we understand security risks?