Trainings

We are offering many training programs for audience which include IT/IS professionals, business management and end-users. The training curriculum can be adopted to the specific customer requirements. Some of our trainings are listed below:
  Secure Software Development Lifecycle (SDLC). The training program is tailored to the customer software development process and technologies. The most popular topics are:
  • Web security, PHP, JavaScript
  • Web security JAVA EE, JavaSript
  • Web security ASP.NET, JavaSript
  • Mobile security, Android
  • Mobile security, iOS
  • Security in .NET and C#
  • Security practices in SDLC
  Information security awareness. The training in easy way explains current information security threats and precaution measures. It can be customized to the Customer policies and procedures.
  Malware analysis. The training covers effective methods of malware analysis, identification of infected computers, custom signatures development and backdoor cleaning. The program can be adopted to the specific technologies and environments (Windows, Linux, FreeBSD, MacOS, Android, Java and .NET malware, rootkits, web-shells, etc.).
  Vulnerability assessment and penetration testing. The training program covers a wide set of theoretical and practical tasks for penetration testing and application vulnerability assessment. A wide range of technologies is supported.
  Data recovery. The training program covers a wide set of theoretical and practical tasks for data recovery on different kind of technologies.
  Computer forensics. The training program covers a wide set of theoretical and practical tasks for computer, network and software forensics.
  Anti-fraud controls. The training program covers effective measures to build a mature system of internal controls to protect enterprise from different kinds of fraud, as well as fraud investigation cases. The training is adopted to the business industry of the Customer.
  Reverse engineering. The training program covers a wide set of theoretical and practical tasks for reverse engineering. A wide set of platforms is supported.
  IT audit. The training program covers necessary topics for conducting effective IT audits.
  Bitcoin and Blockchain security. The training program covers a wide set of theoretical and practical tasks for security of the the Blockchain technology, Bitcoin and its forks, smart-contracts, mining, tokens, etc.