Formazione Cybersecurity

Aiuta il tuo team ad acquisire le competenze di Web Security e Penetration Testing.
Approfitta di un corso pratico guidato da docenti con esperienza reale sul campo.
Integra la formazione con la consulenza dedicata alla tua strategia di sicurezza informatica.

Non solo teoria

Un corso di sicurezza informatica efficace deve essere sostenuto da una competenza reale nella messa in sicurezza di sistemi complessi. I nostri docenti possiedono un'esperienza pluriennale di progettazione e messa in sicurezza di piattaforme hardware e software ad elevata complessità, affiancando le aziende nella trasformazione tecnologica.Proponiamo diversi corsi di formazione, fruibili da remoto o in presenza, per classi a partire da 6 persone.I corsi proposti prevedono un approccio interattivo nel quale i partecipanti possono sperimentare direttamente le tecniche viste in classe.

Martino Fornasa | Formazione Kubernetes per aziende

Un tema prioritario

Il tema della cybersecurity è oggi sentito in modo prioritario dai responsabili dell'IT delle imprese e da tutte le figure chiave all’interno dell’azienda ormai consapevoli dell’importanza di una corretta politica di gestione della sicurezza informatica.

Martino Fornasa | Formazione Kubernetes per aziende

Apprendimento interattivo

Il corso prevede una parte di teoria e un laboratorio pratico che permette di testare in tempo reale le tecniche viste.Il numero di partecipanti è limitato in modo da favorire una reale interazione con il docente da parte di tutti i partecipanti.

Martino Fornasa | Formazione Kubernetes per aziende

Esperienza reale

I nostri docenti vengono da una importante esperienza nel campo della progettazione e implementazione di sistemi e piattaforme sicuri. Ciò rende possibile approfondire nel dettaglio i vantaggi e le problematiche di ogni singola tecnica analizzata.

Martino Fornasa | Formazione Kubernetes per aziende

Consulenza specializzata

Vuoi valutare il livello di sicurezza della tua applicazione o dei tuoi sistemi?
Valuteremo insieme le scelte tecniche e architetturali in base alle esigenze aziendali e tenendo conto dei possibili vettori di attacco. Studieremo quindi una strategia di miglioramento.

Introduzione alla Web Security

Il corso fornisce le competenze e le metodologie necessarie a proteggere le applicazioni web dalle minacce informatiche.

Durata: 2 giornate

  1. Metodologie per l'analisi del rischio: introduzione a OSSTMM e OWASP

  2. Approccio all'analisi dei requisiti

  3. OWASP / OWASP10

  4. Broken Access Control (lab)

  5. Crypto failure (lab)

  6. Injection - XSS e Sql injection (lab)

  7. Insecure design (lab)

  8. Vulnerable and outdated components (lab)

  9. Identification and Authentication failure (lab)

  10. Software and data integrity failures (lab)

  11. Security logging and monitor failures

  12. SSRF (lab)

Tecniche di Hacking e Penetration Testing

In base al nuovo principio di accountability del GDPR le aziende devono adottare misure adeguate alla protezione dei dati e devono verificare che dette misure siano efficaci testandone sul campo l’adeguatezza attraverso strumenti di valutazione.Tramite gli strumenti di vulnerability assessment e penetration testing è possibile eseguire una approfondita analisi dei sistemi IT per metterne in luce le debolezze e per definire le azioni di mitigazione da intraprendere in base al rischio assunto.

Durata: 3 giornate

  1. Penetration Testing

  2. Footprinting

  3. Scansionamento

  4. Enumerazione: principi e strumenti di utilità

  5. Vettori di attacco per sistemi operativi Microsoft Windows

  6. Attacchi di tipo Man-In-The-Middle

  7. Vettori di attacco sui Firewall

  8. Attività di analisi dei server web ed hacking delle applicazioni

  9. Attività di analisi di reti Wireless: le principali vulnerabilità

Martino Fornasa

Sono un consulente informatico indipendente: accompagno le aziende nella progettazione e implementazione di una efficace strategia di adozione cloud e DevOps.Aiuto le aziende nella trasformazione da una infrastruttura di tipo tradizionale ad una infrastruttura cloud, tramite l’uso dei container e l’approccio serverless.Mi occupo di implementazioni DevOps e cloud-native con particolare attenzione alla scalabilità, affidabilità, prestazioni e osservabilità.Visita il mio profilo Linkedin, vedi il mio corso di formazione Terraform e il mio corso di formazione Kubernetes.

Martino Fornasa | Formazione Kubernetes per aziende

Per informazioni

Contattami via email o compila il form qui sotto.
Sarai ricontattato il prima possibile.

Contatti

Contattami via email o compila il form qui sotto.
Sarai ricontattato il prima possibile.

Dati societariMartino Fornasa S.r.l. Unipersonale
via Spinetti, 47/A - 37050 Oppeano (VR) - Italia
Partita Iva: IT 04933090237
Ufficio Registro Verona - REA: VR-457435
PEC: [email protected]
Cap. soc.: € 10000 i.v.

Grazie

Sarai ricontattato il prima possibile.


Visita il mio profilo

Privacy

Email: [email protected]The purpose of this document is to inform the natural person (hereinafter "Data Subject") regarding the processing of his personal data (hereinafter "Personal Data") collected by the data controller, Martino Fornasa Srl Unipersonale, with registered office in via Spinetti 47/A, 37050 Oppeano (VR), Fiscal Code/VAT number 04933090237, e-mail address [email protected] , (hereinafter "Owner"), through the website fornasa.it (hereinafter "Application").Changes and updates will be binding as soon as they are posted on the Application. In case of non-acceptance of the changes made to the Privacy Policy, the interested party is required to cease using this Application and may request the Owner to cancel his Personal Data.Categories of Personal Data processed

  • Technical Data: Personal Data produced by the devices, applications, tools and protocols used, such as, for example, information on the device used, IP addresses, browser type, type of Internet provider (ISP). Such Personal Data may leave traces which, particularly when combined with unique identifiers and other information received from servers, may be used to create profiles of natural persons

  • Navigation data and use of the Application: such as, for example, pages visited, number of clicks, actions performed, duration of sessions, etc.

Failure by the interested party to provide Personal Data for which there is a legal or contractual obligation or if they constitute a necessary requirement for the conclusion of the contract with the Data Controller, will make it impossible for the Data Controller to establish or continue the relationship with the Interested. The interested party who communicates to the Owner Personal Data of third parties is directly and exclusively responsible for their origin, collection, treatment, communication or dissemination.Cookies and similar technologiesThe Application uses cookies, web beacons, unique identifiers and other similar technologies to collect Personal Data of the interested party on the pages, on the links visited and on the other actions that are performed when the interested party uses the Application. They are memorized to then be transmitted on the next visit by the interested party.Legal basis and purpose of the processingThe processing of Personal Data is necessary:

  • for the execution of the contract with the interested party and precisely:

  • fulfillment of any obligation deriving from the pre-contractual or contractual relationship with the interested party

  • by legal obligation and precisely:

  • the fulfillment of any obligation established by current regulations, laws and regulations, in particular, in tax and fiscal matters

  • on the basis of the legitimate interest of the Data Controller, for:

  • statistics with anonymous data: to carry out statistical analyzes on aggregated and anonymous data to analyze the behavior of the interested party, to improve the products and/or services provided by the Data Controller and better meet the expectations of the interested party

The Personal Data of the interested party can also be used by the Data Controller to protect himself in court before the competent judicial offices.Processing methods and recipients of Personal DataThe processing of Personal Data is carried out using paper and IT tools with organizational methods and with logic strictly related to the purposes indicated and through the adoption of adequate security measures.Personal Data is processed exclusively by:

  • persons authorized by the Personal Data Controller who are committed to confidentiality or have an appropriate legal obligation of confidentiality; subjects who operate independently as separate data controllers or by subjects designated as data processors by the Data Controller in order to carry out all the processing activities necessary to pursue the purposes referred to in this information (for example, commercial partners, consultants, IT companies , service providers, hosting providers);

  • subjects or entities to which it is mandatory to communicate Personal Data by law or by order of the authorities.

The subjects listed above are required to use the appropriate safeguards to protect Personal Data and can only access those necessary to perform the tasks assigned to them. Personal Data will not be disseminated indiscriminately in any way.Place
Personal Data will not be subject to any transfer outside the territory of the European Economic Area (EEA).
Retention period of Personal DataPersonal Data will be kept for the period of time necessary to fulfill the purposes for which they were collected, in particular:

  • for purposes relating to the execution of the contract between the Data Controller and the Data Subject, they will be kept for the entire duration of the contractual relationship and, after termination, for the ordinary limitation period of 10 years. In the case of judicial litigation, for the entire duration of the same, until the exhaustion of the terms of practicability of the appeal actions

  • for purposes relating to the legitimate interest of the Data Controller, they will be kept until such interest is fulfilled

  • for the fulfillment of a legal obligation, by order of an authority and for legal protection, they will be kept in compliance with the timescales established by said obligations, regulations and in any case until the limitation period established by the regulations in force is completed

  • for purposes based on the consent of the interested party, they will be kept until the consent is revoked

At the end of the retention period, all Personal Data will be deleted or stored in a form that does not allow identification of the interested party.Rights of the interested partyInterested parties can exercise certain rights with reference to the Personal Data processed by the Data Controller. In particular, the interested party has the right to:

  • be informed on the processing of their Personal Data

  • withdraw consent at any time

  • limit the processing of your Personal Data

  • object to the processing of your Personal Data

  • access your Personal Data

  • verify and request the rectification of your Personal Data

  • obtain the limitation of the processing of your Personal Data

  • obtain the cancellation of their Personal Data

  • transfer your Personal Data to another holder

  • lodge a complaint with the supervisory authority for the protection of your Personal Data and/or take legal action.

To exercise their rights, interested parties can send a request to the following e-mail address [email protected] . Requests will be taken over by the Data Controller immediately and processed as soon as possible, in any case within 30 days.Last Updated: 19/06/2023

Dati societariMartino Fornasa S.r.l. Unipersonale
via Spinetti, 47/A - 37050 Oppeano (VR) - Italia
Partita Iva: IT 04933090237
Ufficio Registro Verona - REA: VR-457435
PEC: [email protected]
Cap. soc.: € 10000 i.v.

Style Guide

Welcome! This Page is for styling & custom code. Use it to customize your colors, fonts, badges, links, and buttons.
Need to customize some features? Please contact me through Upwork


Typography


Site Title

Site Subtitle

Section Header

Section Text

Features Header

Text Large

Footer


Colors


#286964

#D4FAF8

#0F0F0F


BUTTONS



LINKS



ICONS



DO NOT EDIT OR REMOVE THE CODE BLOCKS BELOW