Our Trainings

At itrainsec we select the most relevant topics in the field of IT Security.

blue.png

Hannah Tufts

DIGITAL WELLBEING FOR CYBER SECURITY PROFESSIONALS

Discover how it feels to function at peak performance!

blue.png

Vladimir Dashchenko

DETECTING AND HANDLING SUPPLY CHAIN ATTACKS

Gain a solid understanding of the most up to date snapshot of cyber security for Supply Chain and Trusted Partners.

blue.png

Christian Martorella & Vicente Diaz

RANSOMWARE: GUÍA DE SUPERVIVENCIA

Preparamos a empresas y particulares a entender y prevenir esta devastadora amenaza que está en continuo crecimiento.

blue.png

Irena Damsky

HUNTING MALICIOUSNESS USING DNS

DNS is inherent to the internet – it’s also a powerful and often underestimated tool for researchers and defenders.
Join the coming up session in collaboration with 44Con!

blue.png

Christian Martorella & Vicente Diaz

OPSEC FOR C-LEVELS

When your position makes you a target, OPSEC training helps you avoid becoming a victim.

blue.png

Maria Markstedter

IOT – EXPLOIT DEVELOPMENT

20 billion devices at your service.

blue.png

Manuel Blanco

A QUICK DIVE INTO ANDROID MALWARE

Do you want to dissect their cyberwarfare tools?

blue.png

Denis Makrushin

CRISIS COMMUNICATIONS: DATA BREACH MITIGATION STRATEGY

Enable organization leadership to perform right decisions and actions during data breach incidents.

blue.png

Virginia Aguilar

APPLIED THREAT INTELLIGENCE

You cannot buy intelligence! But you can build a system to take actionable decisions based on data and your goals. Learn how.

blue.png

Irena Damsky

INTRODUCTION TO THREAT INTELLIGENCE

Get basic familiarity with the world of threat intelligence and use cases.

blue.png

Maria Markstedter

ARM REVERSE ENGINEERING ON 32-BIT AND 64-BIT

Good old RE is not the same for every platform, and ARM is at the core of 60% of mobile devices.

blue.png

Arnau Gàmez i Montolio

A GUIDE TO MALWARE ANALYSIS AND REVERSE ENGINEERING

This is a discipline you really want to learn from the best.

blue.png

Hannah Tufts

USING NEUROSCIENCE TO BOLSTER YOUR CYBER SECURITY AWARENESS PROGRAMME

Reap the rewards of this course long after the session closes.

blue.png

Diego Comas

KUBERNETES SECURITY

Get practical real world techniques to assess the security posture of Kubernetes clusters and how to protect them.

blue.png

Ero Carrera

AUTOMATED INTELLIGENCE ANALYSIS

Building a modern Threat Intel environment is inconceivable without automation. Find out how to do it properly.

blue.png

Arnau Gàmez i Montolio

AN ANALYTICAL APPROACH TO MODERN BINARY DEOBFUSCATION

Gain an in-depth understanding of code obfuscation mechanisms

blue.png

Maria Markstedter

ANDROID INTRO TO EXPLOIT DEVELOPMENT

Learn how to move around the defenses of the world’s most popular mobile operating system.

blue.png

Leonida Reitano

OPEN SOURCE INTELLIGENCE WITH MALTEGO

Learn a systematical, methodological approach to design, setup, and conduct investigations through open sources.