Skip to content
Security / Governance, Risk & Compliance

Advanced software security - beyond ethical hacking

Specialized advanced training leading participants through new horizons of software security beyond standard penetration testing techniques. The program combines in-depth analysis of advanced attack techniques with methods for detecting and countering them. Participants work with advanced tools and techniques in a dedicated lab environment where they can safely experiment with different threat scenarios. The training uses a methodology based on real-world cases, enabling an understanding of both the attackers and defenders perspectives. Hands-on workshops account for 80% of the training time, ensuring a deep understanding of the concepts presented.

Issues

  • Advanced Exploit Development

  • Reverse Engineering

  • Malware Analysis

  • Protocol Analysis

  • System Hardening

  • Incident Response

  • Threat Hunting

  • Advanced Persistence

  • Anti-forensics

  • Zero-day Research

  • Binary Analysis

  • Advanced Defense Strategies

Benefits

  • The participant will gain advanced knowledge of the latest attack techniques and defense methods
  • Will learn to identify and analyze sophisticated security bypass techniques
  • Will develop the ability to design systems that are resistant to advanced attacks
  • Will be able to perform in-depth security analysis of complex systems
  • Will gain practical experience in detecting and countering advanced threats
  • Will learn methods for securing specialized systems and protocols
  • Will learn to conduct advanced investigations of security incidents

Who is this training for?

Experienced application security specialists
Advanced pentesters looking for new techniques
Security engineers working on critical systems
Security analysts dealing with advanced threats
Security architects of high-risk systems
Red Team specialists
Blue Team leaders

Prerequisites

  • Extensive knowledge of application and system security
  • Experience in performing penetration testing
  • Advanced knowledge of operating systems
  • Ability to program in low-level languages

Training program

01

Reverse engineering of complex applications

  • Analysis of non-standard protocols
02

Security bypassing techniques

  • Detection of advanced backdoors
  • Attacks on modern architectures
  • Exploitation of vulnerabilities in distributed systems
  • Attacks on container infrastructure
  • Exploiting vulnerabilities in microservices architecture
  • Threats in serverless environments
03

Defense and counteraction

  • Advanced monitoring techniques
04

Early detection systems

  • Honeypots and traps
  • Anti-forensic techniques and their detection
05

Advanced incident analysis

  • Investigative techniques in complex systems
06

Rootkit and malware analysis

  • Reconstruction of advanced attacks
  • Creating indicators of compromise
  • Hacking and securing specialized systems
  • Security of industrial systems
  • Securing IoT and embedded systems
  • Attacks on cryptographic systems
  • Security of communication protocols

Delivery Methods

Online

  • Convenience of participating from anywhere
  • Interactive live sessions with trainer
  • Materials available for 30 days
  • No travel costs

On-site

  • Direct contact with trainer and group
  • Intensive hands-on workshops
  • Networking with other participants
  • Full focus on learning

Frequently asked questions

What are the prerequisites for this training?

For Advanced software security - beyond ethical hacking we recommend: Extensive knowledge of application and system security; Experience in performing penetration testing; Advanced knowledge of operating systems.

What is the format and duration of this training?

The training lasts 5 days and is available in online and on-site format. Sessions run from 9:00 AM to 4:00 PM. We can also customize the schedule to fit your team's needs.

Who is this training designed for?

This training is designed for: Experienced application security specialists; Advanced pentesters looking for new techniques; Security engineers working on critical systems.

Bożena Machowska-Worek
Bożena Machowska-Worek Opiekun szkolenia

Request a quote

Funding Options

Check funding options for your company

Up to 80%

Development Services Database

Up to 80% funding for SMEs from EU funds

Check availability
Up to 100%

National Training Fund

Up to 100% funding for employers

Learn more

Trusted by

We train teams at Poland's largest companies

ING Bank - EITT client
mBank - EITT client
PKO Bank Polski - EITT client
PZU - EITT client
Allianz - EITT client
T-Mobile - EITT client
KGHM - EITT client
PGE - EITT client
IKEA - EITT client
InPost - EITT client
Leroy Merlin - EITT client
ZUS - EITT client

Interested in this training?

Contact us - we'll prepare an offer tailored to your organization's needs.

500+ experts
2500+ trainings available
ISO 9001 quality certified
Request Training
Call us +48 22 487 84 90