Our Trainings
Our Trainings
At itrainsec we select the most relevant topics in the field of IT Security.
In any of our courses, your team will learn techniques from top industry experts.
At itrainsec we select the most relevant topics in the field of IT Security.
In any of our courses, your team will learn techniques from top industry experts.
Trainer
Irena Damsky
Irena Damsky is the founder of Damsky.tech. She is a security and intelligence researcher and developer based in Israel. Her focus is on threat intelligence, networking, malware and data analysis and aking out bad guys, while also running the company and providing different services.
Prior to starting Damsky.tech, Irena was VP of Security Research for a US-based startup, established the Threat Intelligence group for Check Point Software and served over six years in the Israeli Intelligence Forces, where she now holds the rank of Captain in the Reserve Service. She is a frequent speaker at security events, holds a BSc and MSc in Computer Science, and is fluent in English, Russian and Hebrew.
About the training:
DNS is one of the basic layers that holds the internet together. Without it, not much else works... not even malware. In this training course we will focus on how to use DNS to the advantage of defending networks. With good techniques it is possible to find a great deal of misuse based on DNS such as DGAs, fast/double flux networks, phishing and brand impersonation. Tools like passive DNS, whois and active probing allow defenders to proactively search for malicious indicators before they are operationalized so defenders can get ahead of the attack cycle.
Training focuses on the use of DNS for malware hunting, detection of new infrastructure, discovery of new network assets and other “research” type products. There is an emphasis on hands-on labs while also covering some theory and history of DNS. Multiple topics are available and can be tailored to the class based on their interest.
Key takeaways:
-
DNS for malware hunting
-
Learn about all the resources you can use for DNS analysis
-
Discover malicious activity through DNS data
What you get after the training:
-
itrainsec shareable certificate, signed by the trainer (add it to your LinkedIn profile)
-
Course materials
-
Practical skill to elevate your career to the next level
-
After-training consultancy and support
-
Expansion of your professional network in the cybersecurity industry
-
Stronger cybersecurity posture of your business