Logo

Trainings

Defend against the modern threat landscape or prepare your IT team for your business’s unique security needs.

Advanced Docker & Kubernetes Defense

Containers are a big revolution in the software industry. They bring production to the local environment without thinking about compatibilities: with a few commands anyone can have containers running on their machines. When using containers locally, they seem to be neither complex nor complicated to secure and developers have the power of packaging applications that will behave exactly as tested. Enterprises can then split them into scalable microservices.

Duration: 1 day
Presented by: Sheila A. Berta & Sol Ozzan

Attacking and Securing Industrial Control Systems (ICS)

Industrial Control Systems (ICS) are often a sitting target for cybercriminals. The majority of these systems monitor complex industrial processes and critical infrastructures that deliver power, water, transport, manufacturing and other essential services.

Duration: 2 days
Presented by: Yamila Levalle & Sarka Pekarov

Pentesting Docker, Swarm & Kubernetes Clusters

Containerisation and orchestration have changed the way in which today’s technologies are deployed and managed. Attack techniques require reinvention and security professionals are bound to acquire the necessary skills to competently analyse these environments.

Duration: 1 day
Presented by: Sheila A. Berta & Sol Ozzan

Mastering in (mass)scanning

Technological advances are a driving force for internet democratization. Everyday millions of devices are connected for a wide variety of purposes. From keeping track of exercise routines, to allowing international forces to receive real-time communication about the launch of an attack on an important target. Right now, petabytes of public data, from every device, can be potentially transformed into exploitable information.

Duration: 1 or 2 days (adaptable)
Presented by: Francisco Candia

Pentesting and Securing Docker, Swarm & Kubernetes Environments

Containerisation and orchestration have dramatically changed the way in which today’s technologies are deployed and managed. Attack and defence techniques require reinvention and security professionals must now acquire the necessary skills to competently protect these environments.

Duration: 2, 3 or 4 days (adaptable)
Presented by: Sheila A. Berta & Sol Ozzan