Intermediate

ETHICAL HACKING

It fits those who want to pursue a career in Pen Testing, but also in Blue Teaming or in network administration. Five days to get inside the hackers mind to become better protectors.

WEB APPLICATION PEN-TESTING

Through real cases of vulnerabilities identified in prominent sites such as Google, Facebook, Yahoo, etc., a deep understanding of the attack techniques, form the most common to the most advanced.

HACKING BY METASPLOIT

To hone pen-testing skills by Metasploit, the world most famous penetration test framework.

THE ART OF SOCIAL ENGINEERING 1

Understanding of massive phishing, spear phishing and phone pretexting, showing real use cases and explaining the psychological mechanisms, which allow maximizing the effectiveness of such attacks.

SECURITY: NETWORK & SYSTEM ADMINISTRATOR EDITION

Learn how to protect your IT infrastructure as active director by means of endpoint, server and complex settings hardening.

SECURE PROGRAMMING

Learn how to create a secure by-design software and how to develop, facing both architectural and technical aspects.

NETWORK FORENSICS & INCIDENT HANDLING

How to identify, analyse and effectively respond to threats by different kind of analysis of the network traffic defects and the systems use.

OPEN SOURCE & SOCIAL MEDIA INTELLIGENCE

Understanding of investigative techniques by analysing open sources (OSINT) and social networks (SOCMINT), moreover a special focus on the identification of the risks caused by the information overexposure.