Keep your employees trained and your business secure.

ITUniversity.ro cybersecurity training team

Certifications

We hold the following certifications

  • Offensive Security: OSCE, OSWE, OSWP, OSCP
  • EC-Council: ICS-SCADA Cybersecurity, ECSA, CEH, CHFI, ECIH, CEI
  • Others: ISO 27001 Lead Auditor, CREST CRT (CREST Registered Penetration Tester), CREST Practitioner Security Analyst
  • Cisco CCNA, CCNA Security, CCAI, CCNP Routing, CCNP Switching
  • VMWare vSphere Install, Configure, Manage, Microsoft Certified Technology Specialist (MCTS/MCP 70-642), Advanced Linux & INFOSEC

Over 18 Years of Cybersecurity Experience

With over 18 years of industry experience, we have become a trusted partner for cybersecurity training and penetration testing services, educating over 150,000 online students and more than 1,500 face-to-face students.

Customers

Our cybersecurity training and penetration testing services have already been trusted by over 90 satisfied customers in over 40 countries.

Ethical hacking and IT Audit

We are focused on ethical hacking and IT Audit – deliberately challenging IT security assumptions, strategies, and protective methods for vital assets and information by emulating an adversary. We scan for and attempt to exploit a wide variety of vulnerabilities in data center infrastructure and applications, following defined rules of engagement and attack scenarios (ethical hacking). We provide actionable recommendations to address identified security weaknesses and report on all activities and findings.

Internet penetration testing (black box / white box testing)

We perform comprehensive internet penetration testing (black-box and white-box) and conduct thorough code reviews (manual and automated). We use a variety of testing tools—such as NetBIOS scanning utilities, network ping tools, packet crafting and analysis software, and port scanners—to perform comprehensive vulnerability assessments. Furthermore, we perform analysis and testing to verify the strengths and weaknesses of Web Applications and Web Services (SML, SOAP, WSDL, UDDI, etc.). Perform analysis and testing to verify the strengths and weaknesses of a variety of operating systems, network devices, web applications, and security architectures. We assist in developing remediation plans for any identified findings. We customize, operate, audit, and maintain security-related tools and applications.

Services

Check Out Our Services

Cybersecurity Training and Awareness

We offer a vast portfolio of courses, created by our professionals or by well-recognized companies in the IT industry. Furthermore, we offer cybersecurity awareness training for your employees to help them stay safe and secure together with our partner Awakeness.ai

Penetration Testing

A penetration test is an authorized security assessment that simulates a malicious hacker’s attack to identify vulnerabilities.

Web Security Assesment

The aim of this assessment is to determine whether any vulnerabilities exist in a given web application that provides internal or client-facing services.

Audit, Risk and Compliance

We meet and exceed compliance standards required in many industries—such as GDPR, NIS2, HIPAA, MiCA, DORA and PCI DSS—while also following cybersecurity best practices like ISO 27001 and NIST guidelines.

Wireless and Mobile

The aim of this assessment is to determine if any vulnerabilities can be exploited through wireless networks or mobile devices.

Security Consulting Services

We deliver world-class cybersecurity expertise and experience to provide you with comprehensive information security solutions.

LLM / AI Pentest

We harden LLM-powered assistants and AI copilots through prompt-injection, model-safety, and data exfiltration assessments.

AI & Human Risk Management

Align cyber awareness with DORA, NIS 2, and AI governance.

Our AI-enabled human risk management framework combines continuous phishing simulation, adaptive micro-learning, and LMS analytics to reduce social engineering exposure. We map behaviors to DORA and NIS 2 control objectives, ensuring every employee and vendor touchpoint is auditable.

Through Awakeness.ai, we correlate phishing simulation outcomes with compliance gaps and generate prioritized remediation plans that extend into our custom security trainings.

Program Highlights

  • AI-driven human risk scoring with executive dashboards.
  • Automated cyber awareness training pathways and LMS enrollment.
  • Control mapping for DORA ICT risk, NIS 2 Annex I, and ISO 27001.
  • Audit-ready evidence for internal, external, and regulator reviews.
Discuss AI Risk Programs

Phishing & Spear Phishing Simulation

Measure, coach, and certify resilience across global teams.

Spear Phishing Coverage

We build bespoke spear phishing campaigns that emulate brand impersonation, credential harvesting, VIP targeting, and cloud admin takeovers. Reports flow directly into our LMS learning management system to trigger precise follow-up lessons.

Red-team style attacks can be paired with penetration testing engagements for a combined human and technical picture.

  • Adaptive difficulty to keep advanced users challenged.
  • Localization across EN/RO and additional languages on request.
  • Automated reminders, phishing drill calendars, and policy attestations.
  • Google Workspace and Microsoft 365 safe payload testing with audit trails.
Plan a Phishing Simulation

Cloud & Crypto Pentest Audit

Penetration testing for multi-cloud, Web3, and regulated workloads.

Cloud Pentest

Azure, AWS, and Google Cloud pentests include configuration drift analysis, IAM abuse paths, and container breakout attempts mapped to CIS benchmarks.

Crypto Pentest

Smart contract and crypto custody audits detect flaws in key management, governance, and liquidity protections, pairing manual review with automated fuzzing.

DORA & NIS 2 Ready

Findings are prioritized by operational resilience impact, offering remediation playbooks and evidence packages for auditors, supervisors, and board updates.

LLM / AI Pentest Methodology

Hands-on validation for copilots, assistants, and autonomous agents.

We execute a structured playbook: enumerate LLM entry points, craft targeted prompt-injection chains, simulate data exfiltration, and fuzz tool/agent actions. Findings are benchmarked against the OWASP LLM Top 10 (prompt injection, model bias, supply-chain tampering, data leakage, insecure output handling, and more) and mapped to EU AI Act, NIS 2, and DORA evidence requirements.

The deliverable contains reproducible attack traces, prioritized fixes for guardrails, retrieval pipelines, and plugin integrations, plus monitoring guardrails to keep new releases aligned with the same controls.

Schedule an AI Pentest

LMS Learning Management System Enablement

Deliver cyber awareness training at scale with measurable impact.

Our LMS deployment services cover content migration and regulatory audit logging. Dashboards highlight course completion, phishing resilience, and human risk KPIs so leadership can prove ongoing compliance.

Plug the LMS into penetration testing remediation plans and DORA testing cycles to keep every ICT control owner accountable.

Included Services

  • Turnkey onboarding and single sign-on configuration.
  • Custom cyber awareness learning paths per department.
  • Automated certificate issuance and expiry tracking.
  • Dashboards for DORA Article 11 reporting and NIS 2 KPIs.
Explore LMS Courses

FAQ

Answers for CISOs, auditors, and compliance teams.

How does ITUniversity.ro support DORA operational resilience testing?

We align penetration testing, phishing simulations, and LMS governance with DORA ICT risk management guidelines, delivering evidence packages ready for competent authorities.

Can phishing simulations integrate with our LMS learning management system?

Yes. Spear phishing outcomes automatically enroll learners in targeted modules, and completion data is pushed back into your LMS dashboards.

Do you cover crypto pentest and cloud pentest audits under the same engagement?

We can scope multi-cloud, on-prem, and crypto audits together, sharing threat intel, remediation workshops, and compliance reporting.

What reports are provided for auditors and regulators?

Engagements include executive summaries, technical findings, human risk metrics, and control-mapped action plans for DORA, NIS 2, ISO 27001, and PCI DSS together with our partner Omnient

Contact

Contact Us

Location:

Floreasca 169, Bucharest, Romania

Call:

+40 724 485 985