top of page

Our Trainings

At itrainsec we select the most relevant topics in the field of IT Security

OFFENSIVE-IOS-INTERNALS.jpg

In partnership with 8KSec

OFFENSIVE IOS INTERNALS 

This course prepares you for the Certified iOS Security Engineer (CISE) certification exam. Get a comprehensive understanding of the internals of the iOS operating system and its security features. The course will cover topics such as the iOS operating system architecture, memory management, application sandboxing, code signing etc.

Format: Online / Offline 

Language: English 

OFFENSIVE-ANDROID-INTERNALS 1.jpg

In partnership with 8KSec

OFFENSIVE ANDROID INTERNALS 

This course prepares you for the Certified Android Security Engineer (CASE) certification exam. Get an opportunity to enhance an understanding of Android Internals, Reverse Engineering as well as Android Application Exploitation.

Format: Online / Offline 

Language: English 

android intro to exploit development

In partnership with 8KSec

PRACTICAL MOBILE APPLICATION EXPLOITATION 

This course prepares you for the Certified Mobile Security Engineer (CMSE) certification exam. Equip yourself with the knowledge and tools to navigate the complex world of mobile application security focusing on iOS and Android platforms.

Format: Online / Offline 

Language: English 

Dive into android malware

In partnership with 8KSec

OFFENSIVE MOBILE REVERSING AND EXPLOITATION 

This course prepares you for the Offensive Mobile Security Expert (OMSE) certification exam. This comprehensive course offers an in-depth exploration of both iOS and Android operating systems, focusing on their internals and security features.

Format: Online / Offline 

Language: English 

arm reverce engineering

Maria Markstedter

ARM REVERSE ENGINEERING & EXPLOITATION ON 32-BIT AND 64-BIT
​​
AMR Reverse Engineering course is designed to give students a deep understanding of Arm 32-bit and Arm 64-bit assembly, and to perform both static and dynamic analysis of compiled programs.

Format: Online / Offline 

Language: English 

DIGITAL FORENSICS & INCIDENT RESPONSE

Anton Kalinin

DIGITAL FORENSICS & INCIDENT RESPONSE
Gain essential knowledge and key concepts behind DFIR, and develop an understanding of digital forensics artifacts, as well as hands-on experience with forensics tools.









 

Format: Online

Language: English / Russian

 

KUBERNETES SECURITY

Diego Comas

KUBERNETES SECURITY

Get practical real world techniques to assess the security posture of Kubernetes clusters and how to protect them.

Format: Online / Offline

Language: English / Spanish

REVERSE ENGINEERING AND MALWARE ANALYSIS

Arnau Gàmez i Montolio

REVERSE ENGINEERING AND MALWARE ANALYSIS

Whether you're a beginner or an experienced analyst, these courses offer a comprehensive approach to understanding, analyzing, and mitigating malware's impact.

Format: Offline 

Language: English / Spanish / Catalan

CYBER EXTORTION VS ZEN: SURVIVING RANSOMWARE

Alexander Antukh & Gaston Pumar

CYBER EXTORTION VS ZEN: SURVIVING RANSOMWARE

Gain insights into the attackers' mindset and minimise the damage for your business!

Format: Online 

Language: English / Spanish / Russian

RANSOMWARE: GUÍA DE SUPERVIVENCIA

Christian Martorella & Vicente Diaz

RANSOMWARE: GUÍA DE SUPERVIVENCIA

Preparamos a empresas y particulares a entender y prevenir esta devastadora amenaza que está en continuo crecimiento.

Format: Online 

Language: Spanish

USING NEUROSCIENCE TO BOLSTER YOUR CYBER SECURITY AWARENESS PROGRAMME

Hannah Tufts

USING NEUROSCIENCE TO BOLSTER YOUR CYBER SECURITY AWARENESS PROGRAMME

Reap the rewards of this course long after the session closes.

Format: Online / Offline

Language: English 

DIGITAL WELLBEING FOR CYBER SECURITY PROFESSIONALS

Hannah Tufts

DIGITAL WELLBEING FOR CYBER SECURITY PROFESSIONALS

Discover how it feels to function at peak performance!

Format: Online / Offline

Language: English 

INTRODUCTION TO THREAT INTELLIGENCE

Irena Damsky

INTRODUCTION TO THREAT INTELLIGENCE

Get basic familiarity with the world of threat intelligence and use cases.

Format: Online 

Language: English / Hebrew / Russian 

APPLIED THREAT INTELLIGENCE

Virginia Aguilar & Vicente Diaz

APPLIED THREAT INTELLIGENCE

You cannot buy intelligence! But you can build a system to take actionable decisions based on data and your goals. Learn how.

Format: Online / Offline

Language: English / Spanish

AUTOMATED INTELLIGENCE ANALYSIS

Ero Carrera

AUTOMATED INTELLIGENCE ANALYSIS

Building a modern Threat Intel environment is inconceivable without automation. Find out how to do it properly.

Format: Offline

Language: English / Spanish

OPEN SOURCE INTELLIGENCE WITH MALTEGO

Leonida Reitano

OPEN SOURCE INTELLIGENCE WITH MALTEGO

Learn a systematical, methodological approach to design, setup, and conduct investigations through open sources.

Format: Online 

Language: English / Italian

AN ANALYTICAL APPROACH TO MODERN BINARY DEOBFUSCATION

Arnau Gàmez i Montolio

AN ANALYTICAL APPROACH TO MODERN BINARY DEOBFUSCATION

Whether you're a beginner or an experienced analyst, these courses offer a comprehensive approach to understanding, analyzing, and mitigating malware's impact.

Format: Online / Offline

Language: English / Spanish / Catalan

OPSEC FOR C-LEVELS

Christian Martorella & Vicente Diaz

OPSEC FOR C-LEVELS

When your position makes you a target, OPSEC training helps you avoid becoming a victim.

Format: Online / Offline

Language: English / Spanish

bottom of page