- Security training with eshard means you get to learn from the experts. We share our expertise with you in a hands-on manner to provide a pro-active learning experience.
- Work on real cases. During our training we will give you examples of real-case weaknesses (know how to attack these weaknesses).
- Apply straight away to your daily work. We will show you what measures to put in place to patch these weakness, to avoid future attacks.
- We offer our training courses at our own premises or at yours, in total confidentiality, so you can rest assured everything we discuss is kept private.
SECURITY TRAINING: VIEW OUR COURSES
KNOWLEDGE IS POWER
OUR SECURITY TRAINING COURSES
ANDROID SECURITY - LEVEL 1
During this two day training course you will learn techniques and tools for reverse engineering Android applications. Specific focus will be put on practical exercises.
ANDROID SECURITY - LEVEL 2
During this three day training course you will learn advanced techniques and reverse engineering frameworks that can be used by powerful attackers to target Android applications.
SECURE MY MOBILE ANDROID APP - LEVEL 1
This two day course is particularly developed for mobile application developers. With this training, hackers will no longer have an easy life with your codes. We cover four main topics, including understand your risk, security by obfuscation, security by architecture and security by yourself.
SECURE MY CODE AGAINST SIDE-CHANNEL ATTACKS
This course will provide you with side-channel attack knowledge and show how your implementation can withstand these attacks. During this training we will cover the theoretical aspects of attacks, as well as counter-measures with demonstrations.
TEE TRUSTZONE - REPRODUCING AN EXPLOIT
During this three day training course you will learn how TrustZone® (ARM Security Extensions) works. You will focus on a real secure kernel implementation on the Nexus 5 and reproduce an exploit.
During this one plus one day (second day optional)training course you will learn how to apply the Rowhammer how the Rowhammer effect can be used to corrupt and recover secrets from a TrustZone implementation. An optional second day covers the mobile ‘Drammer’ attack.
TRUSTZONE V7-A, V8-M & TRUSTY
During this training participants will learn how TrustZone (ARM Security Extensions) works on ARM Architecture v7-A and v8-M. They will learn in detail what composes a TrustZone v7-A secure kernel and how it interacts with the rest of the system. They will then focus on the real world secure kernel implementation “Trusty” open-sourced by Google. They will modify Trusty in order to implement a Trusted Applet which will communicate with non-secure Linux application.
WHITEBOX SECURITY INVESTIGATION
During this two day training course you will learn how attacks on whitebox cryptography can be realised, from the mobile application to the secret key. An extra day for statistical attacks (DPA, CPA) and fault injections (DFA) can be arranged.