- Security training with eshard means you get to learn from the experts. We share our expertise with you in a hands-on manner to provide a pro-active learning experience.
- Work on real cases. During our training we will give you examples of real-case weaknesses (know how to attack these weaknesses).
- Apply straight away to your daily work. We will show you what measures to put in place to patch these weakness, to avoid future attacks.
SECURITY TRAINING: VIEW OUR COURSES
KNOWLEDGE IS POWER
OUR SECURITY TRAINING COURSES
REVERSE ENGINEERING FOR ANDROID APPLICATIONS
During this two day training course you will learn techniques and tools for reverse engineering Android applications. Specific focus will be put on practical exercises.
TEE TRUSTZONE - REPRODUCING AN EXPLOIT
During this three day training course you will learn how TrustZone® (ARM Security Extensions) works. You will focus on a real secure kernel implementation on the Nexus 5 and reproduce an exploit.
TRUSTZONE V7-A, V8-M & TRUSTY
During this training participants will learn how TrustZone (ARM Security Extensions) works on ARM Architecture v7-A and v8-M. They will learn in detail what composes a TrustZone v7-A secure kernel and how it interacts with the rest of the system. They will then focus on the real world secure kernel implementation “Trusty” open-sourced by Google. They will modify Trusty in order to implement a Trusted Applet which will communicate with non-secure Linux application.
WHITEBOX SECURITY INVESTIGATION
During this two day training course you will learn how attacks on whitebox cryptography can be realised, from the mobile application to the secret key. An extra day for statistical attacks (DPA, CPA) and fault injections (DFA) can be arranged.