SECURITY TRAINING: VIEW OUR COURSES

KNOWLEDGE IS POWER

  • Security training with eshard means you get to learn from the experts. We share our expertise with you in a hands-on manner to provide a pro-active learning experience.
  • Work on real cases. During our training we will give you examples of real-case weaknesses (know how to attack these weaknesses). 
  • Apply straight away to your daily work. We will show you what measures to put in place to patch these weakness, to avoid future attacks. 

OUR SECURITY TRAINING COURSES

REVERSE ENGINEERING FOR ANDROID APPLICATIONS

During this two day training course you will learn techniques and tools for reverse engineering Android applications. Specific focus will be put on practical exercises.

TEE TRUSTZONE - REPRODUCING AN EXPLOIT

During this three day training course you will learn how TrustZone® (ARM Security Extensions) works. You will focus on a real secure kernel implementation on the Nexus 5 and reproduce an exploit.

TRUSTZONE V7-A, V8-M & TRUSTY

During this training participants will learn how TrustZone (ARM Security Extensions) works on ARM Architecture v7-A and v8-M. They will learn in detail what composes a TrustZone v7-A secure kernel and how it interacts with the rest of the system. They will then focus on the real world secure kernel implementation “Trusty” open-sourced by Google. They will modify Trusty in order to implement a Trusted Applet which will communicate with non-secure Linux application.

WHITEBOX SECURITY INVESTIGATION

During this two day training course you will learn how attacks on whitebox cryptography can be realised, from the mobile application to the secret key. An extra day for statistical attacks (DPA, CPA) and fault injections (DFA) can be arranged.

SIGN UP TODAY AND GET UP-TO-DATE INFORMATION ON THE LATEST ATTACK METHODS

Select your course