Welcome to ENGENSEC blog!

Are you interested in Cyber Security and ready to investigate this world? We can help you by providing useful Cyber Security knowledge! ENGENSEC international experts, who are master program developers, have a lot of theoretical and practical skills in different topics of Cyber Security. There are scientific articles of our experts in the blog. We are glad to share the latest project news and discuss the courses development process here. More over you can suggest your idea to talk about. Read the blog posts and be informed in the current state of Cyber Security!

Join us following the next topics:

Advanced Network & Cloud Security

The course is aimed to provide students with the skills of how to protect against network attacks such as man-in-the-middle, port scanning, spoofing, DDOS attacks.


Wireless & Mobile Security

The course is aimed to provide students with the skills of information threats analysis and information security improving in wireless networks.


Secure software development

The computer software developed currently becomes more and more networked and accessible through different hardware platforms.


Malware Analysis

The course is aimed to provide students with the skills of real-world threats analysis as the majority of modern cyber attacks are performed using malware or, so called, “cyber weapon”.


Digital Forensic

The course is aimed to provide students with the skills of real-world cases investigation by various aspects of digital forensic. Nowadays an analysis of such cases requires a special knowledge in both theoretical and practical areas of operation systems architecture, security software, network services, hardware analysis, etc.

Ethical hacking or penetration testing

Ethical hacking or penetration testing is a process of attempting to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.



Modern Web-resources have become an integral part of the information assets of the absolute majority of today’s organizations, regardless of what they do. Web applications more other assets susceptible to security threats because available from the Internet at the same time users and hackers. The relevance of protecting Web applications only growing because develop and improve methods and techniques for hacking attacks.


Remote Security Laboratory

The Remote Security Laboratory system has been planned to be a cloud system based on OpenStack and deployed at member universities. Teachers and students will use this laboratory for the teaching and studying processes once it will be ready to use.