Zi-Train

  • Secure Coding
  • Reverse Engineering
  • Exploit writing
  • Incident Examinations

Secure Development: .NET Applications

Secure Development: PHP Applications

Secure Development: Java Applications

Web application Security: Introduction

Web Application security: Advanced Penetration Testing

All the topics covered in each course have practical lab at the end of the topic, and the final day includes a five hours hands-on practical implementation of every technique covered in the course.

For more information about courses schedule or syllabus please contact us at:
training [at] ZINAD [dot] net

Assembly Languages: Introduction (Free – scheduled each 3 month)
Code Auditing for C: Introduction

Reverse Engineering: Introduction

Advanced Binary Auditing

Advanced Fuzz Testing

Advanced Exploit Writing

All the topics covered in each course have practical lab at the end of the topic, and the final day
includes a five hours hands-on practical implementation of every technique covered in the course.

For more information about courses schedule or syllabus please contact us at:
training [at] ZINAD [dot] net

we can focus our reports on your most valuable assets and monitor and score the performance of your security systems so you can see, at a glance, if you need to tighten your defenses to respond to emerging new attack patterns. All our reports are provided via an online security management dashboard, and are customized to provide you with precisely the information that you need to better manage your IT security.

Our experts are on hand 24/7 and will draw on both their experience and knowledge of your business to block malicious activity. Meanwhile, our analysts will learn from the attack vectors and recommend ways to prevent similar future incidents. If the situation leads to a prosecution, you can rely on our forensic security experts to prepare data evidence and support you in court.