Skip to main content
Cyber Security Days
This October/November the CyResLab is launching a special set of cyber security related courses.
ESI CEE
Solution for Industry Maturity in Eastern Europe

Email Security Test

The significance of email communication in the modern business world cannot be overstated - hundreds of email messages are sent and received daily by even the smallest companies, containing confidential or personal information such as clients' data, competitive advantages, financial data or just private information. Despite this significance, email security is often overlooked, as demonstrated by the 2016 DNC email leak, which significantly impacted the 58th Presidential Elections in the USA.

Web Security Test

This test has CyResLab security researchers combine a multitude of automated testing tools with a manual follow-up testing of the client website with focus on key functionality and taking into account the client’s security needs.
The automated tools include both well-known open-source tools (e.g. Nmap, OpenVAS, Nikto) and proprietary CyResLab tools developed specifically for such tests.

Mobile App Security Test

The purpose of this test is to find both standard and specific vulnerabilities in Mobile applications by using different static code/binary analysis tools, various dynamic analysis techniques and manual testing and verification of issues by CyResLab security researchers.

Advanced Web Threats (6-7 July)

When: 6-Jul-2017 09:00

 

In this advanced course, CyResLab has additionally included exercises in which participants in turn attempt to fix and attack particular implementations. A heavier focus is be placed on labs.


The “Advanced Web Threats” course includes free access to an interactive online exercise environment for one week, following the course’s completion.

 

Top 10 Web Threats (3 July)

When: 3-Jul-2017 09:00

 

In this course, CyResLab has included live demos of attacks, exercises in detecting and leveraging threats, examples of weak and vulnerable code and the process of repairing it and fixing vulnerabilities, mitigation tactics, developer-specific best practices and discussions on how not to write vulnerable code in the process of daily work. The course is mostly technical and not organizational.