{"id":9698,"date":"2021-11-29T16:05:00","date_gmt":"2021-11-29T15:05:00","guid":{"rendered":"https:\/\/www.show.it\/elenco-corsi\/"},"modified":"2021-12-21T17:59:14","modified_gmt":"2021-12-21T16:59:14","slug":"list-of-courses","status":"publish","type":"page","link":"https:\/\/www.show.it\/en\/training-services-security\/list-of-courses\/","title":{"rendered":"List of courses"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"9698\" class=\"elementor elementor-9698 elementor-8768\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6e3de206 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6e3de206\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;84a6bc6&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1992cb2e\" data-id=\"1992cb2e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-62d721e3 elementor-widget elementor-widget-jet-accordion\" data-id=\"62d721e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"jet-accordion\" data-settings=\"{&quot;collapsible&quot;:true,&quot;ajaxTemplate&quot;:false,&quot;switchScrolling&quot;:false,&quot;switchScrollingTablet&quot;:false,&quot;switchScrollingMobile&quot;:false,&quot;switchScrollingOffset&quot;:{&quot;size&quot;:0,&quot;unit&quot;:&quot;px&quot;},&quot;switchScrollingOffsetTablet&quot;:{&quot;size&quot;:0,&quot;unit&quot;:&quot;px&quot;},&quot;switchScrollingOffsetMobile&quot;:{&quot;size&quot;:0,&quot;unit&quot;:&quot;px&quot;},&quot;switchScrollingDelay&quot;:500,&quot;switchScrollingDelayTablet&quot;:500,&quot;switchScrollingDelayMobile&quot;:500}\">\n\t\t\t<div class=\"jet-accordion__inner\">\n\t\t\t\t<div class=\" jet-accordion__item jet-toggle jet-toggle-move-up-effect active-toggle\">\n\t\t\t\t\t\t\t<div id=\"jet-toggle-control-1651\" class=\"jet-toggle__control elementor-menu-anchor\" data-toggle=\"1\" role=\"button\" tabindex=\"0\" aria-controls=\"jet-toggle-content-1651\" aria-expanded=\"true\" data-template-id=\"false\">\n\t\t\t\t\t\t\t\t<div class=\"jet-toggle__label-text\">BASIC COURSES<\/div>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div id=\"jet-toggle-content-1651\" class=\"jet-toggle__content\" data-toggle=\"1\" role=\"region\" data-template-id=\"false\">\n\t\t\t\t\t\t\t\t<div class=\"jet-toggle__content-inner\"><ul><li>Fundamentals of computer security for end-users<\/li><li>Methodologies and security standards<\/li><li>Network Security Probing and Web Application Vulnerability;\u00a0Assessment: fundamental techniques of intrusion on network level and attack against Web based applications<\/li><li>Social Engineering fundamentals<\/li><li>ISO\/IEC 27001 Information Security Management<\/li><li>The OWSASP standard and the best practice in software development<\/li><li>Information Security for System Administrators<\/li><li>Network Security<\/li><li>Digital Data Protection<\/li><li>Security Best Practice<\/li><li>Cyber Security Awareness for non-technical Decision Makers<\/li><li>Social Media Security<\/li><li>Cloud and Mobile Security<\/li><li>Security in Critical Infrastructures of Industrial Systems<\/li><li>Cyber Crime, Cyber Espionage and Information Warfare<\/li><li>Digital Self-Defense for non-Technical Personnel<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div><div class=\" jet-accordion__item jet-toggle jet-toggle-move-up-effect \">\n\t\t\t\t\t\t\t<div id=\"jet-toggle-control-1652\" class=\"jet-toggle__control elementor-menu-anchor\" data-toggle=\"2\" role=\"button\" tabindex=\"0\" aria-controls=\"jet-toggle-content-1652\" aria-expanded=\"false\" data-template-id=\"false\">\n\t\t\t\t\t\t\t\t<div class=\"jet-toggle__label-text\">GRC COURSES<\/div>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div id=\"jet-toggle-content-1652\" class=\"jet-toggle__content\" data-toggle=\"2\" role=\"region\" data-template-id=\"false\">\n\t\t\t\t\t\t\t\t<div class=\"jet-toggle__content-inner\"><ul><li>Introduction to Information Security<\/li><li>Risk Management for Information Security<\/li><li>Incident Handling for Information Security<\/li><li>Business Continuity for Information Security<\/li><li>Disaster recovery for Information Security<\/li><li>Auditor\/Lead Auditor of information security management systems (ISO\/IEC 27001:13) \u2013 RICEC Qualified Course<\/li><li>Auditor\/Lead Auditor of IT Service Management Systems (ISO\/IEC 20000-1:11) and of information security management systems (ISO\/IEC 27001:13) \u2013 RICEC Qualified Course<\/li><li>Information Security Manager \u2013 RICEC Qualified Course<\/li><li>Auditor\/Lead Auditor of Business Continuity Management Systems (ISO 22301:2012)-RICEC Qualified Course<\/li><li>Auditor\/Lead Auditor of Quality Management Systems (ISO 9001:2008)\u2013RICEC Qualified Course<\/li><li>Auditor\/Lead Auditor of Business Continuity Management Systems (ISO 22301:2012)-RICEC Qualified Course Restricted to Auditor\/Lead Auditor already qualified in other schemes<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div><div class=\" jet-accordion__item jet-toggle jet-toggle-move-up-effect \">\n\t\t\t\t\t\t\t<div id=\"jet-toggle-control-1653\" class=\"jet-toggle__control elementor-menu-anchor\" data-toggle=\"3\" role=\"button\" tabindex=\"0\" aria-controls=\"jet-toggle-content-1653\" aria-expanded=\"false\" data-template-id=\"false\">\n\t\t\t\t\t\t\t\t<div class=\"jet-toggle__label-text\">BUSINESS CONTINUITY &amp; CRISIS MANAGEMENT COURSES<\/div>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div id=\"jet-toggle-content-1653\" class=\"jet-toggle__content\" data-toggle=\"3\" role=\"region\" data-template-id=\"false\">\n\t\t\t\t\t\t\t\t<div class=\"jet-toggle__content-inner\"><ul><li>Introduction to Crisis Management and Business Continuity<\/li><li>Course on ISO 22301:2012 Standard<\/li><li>Business Continuity Institute Certification Course<\/li><li>Crisis Management and Business Continuity<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div><div class=\" jet-accordion__item jet-toggle jet-toggle-move-up-effect \">\n\t\t\t\t\t\t\t<div id=\"jet-toggle-control-1654\" class=\"jet-toggle__control elementor-menu-anchor\" data-toggle=\"4\" role=\"button\" tabindex=\"0\" aria-controls=\"jet-toggle-content-1654\" aria-expanded=\"false\" data-template-id=\"false\">\n\t\t\t\t\t\t\t\t<div class=\"jet-toggle__label-text\">ETHICAL HACKING COURSES<\/div>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div id=\"jet-toggle-content-1654\" class=\"jet-toggle__content\" data-toggle=\"4\" role=\"region\" data-template-id=\"false\">\n\t\t\t\t\t\t\t\t<div class=\"jet-toggle__content-inner\"><ul><li>Hacker profiling, History and Culture<\/li><li>Introduction to penetration test<\/li><li>Penetration test for technical personnel<\/li><li>Social engineering, attack and defence techniques<\/li><li>Website security and defence from external attacks<\/li><li>Applied Wireless Security Awareness<\/li><li>Open Source Analysis Course \u2013 OSINT<\/li><li>Aerospace &amp; Satellite Hacking<\/li><li>ISECOM OSSTMM OPSA \u2013 Course with International Certification (Eng)<\/li><li>ISECOM OSSTMM OPST \u2013 Course with International Certification (Eng)<\/li><li>ISECOM OSSTMM OPSE \u2013 Course with International Certification (Eng)<\/li><li>Offensive Security by means of Kali Linux (Eng)<\/li><li>Offensive Wireless Security by means of kali Linux (Eng)<\/li><li>Certified Secure Web Developer (CSWD) \u2013 Course with International Certification (Eng)<\/li><li>Certified Secure Web Professional (CSWP) \u2013 Course with International Certification (Eng)<\/li><li>Introduction to OWASP standard and to best practise for software development<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div><div class=\" jet-accordion__item jet-toggle jet-toggle-move-up-effect \">\n\t\t\t\t\t\t\t<div id=\"jet-toggle-control-1655\" class=\"jet-toggle__control elementor-menu-anchor\" data-toggle=\"5\" role=\"button\" tabindex=\"0\" aria-controls=\"jet-toggle-content-1655\" aria-expanded=\"false\" data-template-id=\"false\">\n\t\t\t\t\t\t\t\t<div class=\"jet-toggle__label-text\">DIGITAL FORENSICS COURSES<\/div>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div id=\"jet-toggle-content-1655\" class=\"jet-toggle__content\" data-toggle=\"5\" role=\"region\" data-template-id=\"false\">\n\t\t\t\t\t\t\t\t<div class=\"jet-toggle__content-inner\"><ul><li>Introduction to Digital Forensics<\/li><li>Digital Forensics Legal Module<\/li><li>Anti\u2013forensics and Password Cracking<\/li><li>Cloud Forensics<\/li><li>GPS Forensics<\/li><li>Mobile Forensics<\/li><li>Windows Forensics<\/li><li>Mac Forensics<\/li><li>Memory Forensics<\/li><li>Live Forensics and Incident Response<\/li><li>Internet Forensics<\/li><li>IOS Forensics<\/li><li>Linux Forensics<\/li><li>CelleBrite UFED \u2013 Course with International Certification (Eng)<\/li><li>DELL\/Evidence Talks \u201cSpektor\u201d\u2013 Course with International Certification (Eng)<\/li><li>Theoretical and practical comparison between commercial and open source tools<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div><div class=\" jet-accordion__item jet-toggle jet-toggle-move-up-effect \">\n\t\t\t\t\t\t\t<div id=\"jet-toggle-control-1656\" class=\"jet-toggle__control elementor-menu-anchor\" data-toggle=\"6\" role=\"button\" tabindex=\"0\" aria-controls=\"jet-toggle-content-1656\" aria-expanded=\"false\" data-template-id=\"false\">\n\t\t\t\t\t\t\t\t<div class=\"jet-toggle__label-text\">INFORMATION WARFARE COURSES<\/div>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div id=\"jet-toggle-content-1656\" class=\"jet-toggle__content\" data-toggle=\"6\" role=\"region\" data-template-id=\"false\">\n\t\t\t\t\t\t\t\t<div class=\"jet-toggle__content-inner\"><ul><li>How to Build a Cyber Army<\/li><li>Legal aspects of computer network operations<\/li><li>Legal aspects of Computer Network Operation and recruitment rules<\/li><li>Legal and strategic aspects of Cyber Weapons<\/li><li>From Cyber-crime to Cyber Warfare acts. Global trends and Strategies<\/li><li>Security of fixed and mobile telecommunications operators<\/li><li>Information warfare: practical exercises of attack<\/li><li>Information warfare: practical exercises of attack and defence<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div><div class=\" jet-accordion__item jet-toggle jet-toggle-move-up-effect \">\n\t\t\t\t\t\t\t<div id=\"jet-toggle-control-1657\" class=\"jet-toggle__control elementor-menu-anchor\" data-toggle=\"7\" role=\"button\" tabindex=\"0\" aria-controls=\"jet-toggle-content-1657\" aria-expanded=\"false\" data-template-id=\"false\">\n\t\t\t\t\t\t\t\t<div class=\"jet-toggle__label-text\">SECURE COODING COURSES<\/div>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div id=\"jet-toggle-content-1657\" class=\"jet-toggle__content\" data-toggle=\"7\" role=\"region\" data-template-id=\"false\">\n\t\t\t\t\t\t\t\t<div class=\"jet-toggle__content-inner\"><ul><li>Java Security<\/li><li>Java, and Web Application Security<\/li><li>Java, JEE and Web Application Security<\/li><li>.NET, C# and ASP.NET Security<\/li><li>Web application security<\/li><li>Web application Testing<\/li><li>Secure Programming in PHP<\/li><li>Secure Programming in C\/C++<\/li><li>C\/C++, Java and Web Application Security<\/li><li>C\/C++, C#, ASP.NET and web application security<\/li><li>Java, PHP and Web application Security<\/li><li>Android Security<\/li><li>IOS Security<\/li><li>Windows Phone Security<\/li><li>Crypto Chip\u2013Set Security<\/li><li>VoIP Security<\/li><li>Microsoft SDL<\/li><li>Secure programming and Management on Microsoft SDL (Online Course)<\/li><li>Java Security Technologies and Specific Vulnerabilities (Online Course)<\/li><li>Vulnerability, Secure Programming and Protection in C\/C++ (Online Course)<\/li><li>.NET and ASP.NET Security Technologies and .NET and Web Application Specific Vulnerabilities (Online Course)<\/li><li>Introduction to Microsoft SDL and Secure Programming Testing (Online Course)<\/li><li>Security holes and Privacy (Online Course)<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>BASIC COURSES Fundamentals of computer security for end-users Methodologies and security standards Network Security Probing and Web Application Vulnerability;\u00a0Assessment: fundamental techniques of intrusion on network level and attack against Web based applications Social Engineering fundamentals ISO\/IEC 27001 Information Security Management The OWSASP standard and the best practice in software development Information Security for System Administrators [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":9699,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-9698","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/pages\/9698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/comments?post=9698"}],"version-history":[{"count":0,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/pages\/9698\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/pages\/9699"}],"wp:attachment":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media?parent=9698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}