An integrated security infrastructure places equal importance on both IT systems and people. Dreamlab experts support all levels of an organization’s manpower, equipping individuals with key cyber-security intelligence.
In-House Training
IT security experts share their knowledge and experience to ensure your team are aware of cyber risks and how to prevent incidents.
Workshop Facilitation
Seasoned Dreamlab consultants deliver high-level workshop moderation and facilitation, driven by the will to share their cybersecurity awareness with those who may struggle with it.
Customized Solutions
Dreamlab is always happy to deliver customised solutions in addition to our current portfolio. Please contact our experts to discuss training that suits your specific needs.
Trainings
Our industry experts have crafted training with real-world scenario scenarios that will prepare you and your organization for the security challenges of today and tomorrow.
Advanced Docker & Kubernetes Defense
Containers are a big revolution in the software industry. They bring production to the local environment without thinking about compatibilities: with a few commands anyone can have containers running on their machines. When using containers locally, they seem to be neither complex nor complicated to secure and developers have the power of packaging applications that will behave exactly as tested. Enterprises can then split them into scalable microservices.
Duration: 1 day
Attacking and Securing Industrial Control Systems (ICS)
Industrial Control Systems (ICS) are often a sitting target for cybercriminals. The majority of these systems monitor complex industrial processes and critical infrastructures that deliver power, water, transport, manufacturing and other essential services.
Duration: 2 days
Pentesting Docker, Swarm & Kubernetes Clusters
Containerisation and orchestration have changed the way in which today’s technologies are deployed and managed. Attack techniques require reinvention and security professionals are bound to acquire the necessary skills to competently analyse these environments.
Duration: 1 day
Mastering in (mass)scanning
Technological advances are a driving force for internet democratization. Everyday millions of devices are connected for a wide variety of purposes. From keeping track of exercise routines, to allowing international forces to receive real-time communication about the launch of an attack on an important target. Right now, petabytes of public data, from every device, can be potentially transformed into exploitable information.
Duration: 1 or 2 days (adaptable)
Presented by: Francisco Candia
Pentesting and Securing Docker, Swarm & Kubernetes Environments
Containerisation and orchestration have dramatically changed the way in which today’s technologies are deployed and managed. Attack and defence techniques require reinvention and security professionals must now acquire the necessary skills to competently protect these environments.
Duration: 2, 3 or 4 days (adaptable)