Training and Awareness


The growing increase and evolution of cyber threats for users and companies, has positioned cybersecurity among the strategic priorities of international organizations, governments, companies and society as a whole. These levels of insecurity will not only remain, but will increase over the years.

As the concern of awareness of being prepared for the threats that threaten us in a society increasingly dependent on computer systems increases, also does the need for people with the necessary knowledge to use, defend and manage these infrastructures and systems network.

It is important to know that the people behind a training, not only have extensive experience in the field of what is being taught, but also in the field of teaching. We will provide you with the best experts in each area to illustrate what you need in security of computer systems. Those who teach classes both in universities and for example in La Salle or the University of the Balearic Islands or in training schools such as the Institute Training Directive.


  • Ethical Hacking.

  • Forensics Analysis. Linux / MacOSX / Windows XP/2003/ 7 / 8.1 / IOS.


  • Awareness to Directors.

  • Protection and attack on Infrastructure and Web Applications
  • NET, Java, PHP

  • Exploiting on Win32.


    Be aware of the danger and threats that your company has every day, should be a thing of each and every one of the members of the company, is not a unique and exclusive task of the computer security department. Attackers or people with bad intentions, will take advantage of any fissures that may have to enter the computer systems and thus obtain privileges and / or information.

    As ''Kevin Mitnick ‘’saysOrganizations spend millions of dollars on firewalls and security devices, but they throw away the money because none of these measures covers the weakest link in the security chain: the people who use and administer it computers.

    The purpose of the sevice is to show the members of your company, managers, employees, suppliers or collaborators the dangers that exist, give them advice to mitigate them, not only from a theoretical point of view but also practical. The practical part consists of demonstrating how a person can get to enter the systems of the company or the users of the people who compose it.