Cyber-Trace

Cyber-Trace is a university club founded in 2017. The club ultimate goal is to grow a cyber security community along ISSATSo students. The club provides the students with high quality and practical training and workshops

About

Who are we ?

Junior Path

Cyber Trace’s Junior Path is a beginner-friendly path dedicated to our dear members. Each session of this path consists of an introduction to one of the numerous sub-domains of cyber security in addition to a mini-workshop helping them apply what they’ve just learnt.

img1

Senior Path

Cyber Trace’s Senior Path is a path dedicated to the amateurs of cyber security. Within the sessions of this path, we discuss in-depth, one specific, delicate and very interesting concept of cyber security.

img1

Events

Our community

React Life cycles and Hooks

Our web dev journey is back! Our dev team has provided you with another fruitful session for the world's most popular libraries: #REACT! with the guidance of the talented Guirat Walid and Mehdi Ben Hariz

(SQLi) Expoits and Maintaining Web Access

Continuing our junior path with a very interesting part that will cover"SQL injection (SQLI)" from the chapter "Exploits and maintaining web access", with our two amazing trainers Hakim Kacem and Seif Belhaj giving their best to ensure the delivery of the proper information.

(XSS) Expoits and Maintaining Web Access

We are happily delivering an XSS: eXtra Stunning Surprise! This Wednesday we are back not online but face-to-face to deliver a very special session covering "cross site scripting" from the chapter "Exploits and maintaining access web"! This session will be presented by our junior team members : Abderrahmen Said and Seif Belhaj So what are you waiting for?

React Basics

Want to get started on one of the most popular frameworks/libraries in the planet? Want to get an in-close guidance from a professional to tackle all of the daunting aspects of this powerful technology? Then you'd better not miss this upcoming opportunity on Sunday, February 27th where we are having Mr Mohamed Nouri , senior developer at DejaMobile, walking us through the basics of React! Places ARE LIMITED, so please book your place by filling this link : https://forms.gle/bj4mzBBMPzL5WjGW9 And who knows? This might be your starting point in your future React development career!!

Blog

Top Articles

IOT Threats and Vulnerabilities

Most IoT devices are remotely deployed, and are constantly exposed to the broader physical attack surface surveillance allow potential attackers to gain valuable information which can assist in future remote attacks or gaining control over the device.

By Maryem Jaouadi

6 min Read

Ransomware

Ransomware is a form of malicious software or malware which restricts access to your computer or mobile device or encrypts data until you pay a ransom in exchange for accessing your device or data again.

By Shayma Trad

6 min Read

Phishing attack

Phishing is a type of social engineering attack often used to steal user's sensitive data (such as login credentials and credit card numbers). Such an attack can have devastating results for individuals as well as companies and businesses. It could lead to unauthorized purchases, stealing of funds or identity thefts.

By Mootez Zemmel

6 min Read

Keyloggers

Most sources defines it as a tool designed to secretly monitor and log all keystrokes in a small file, which is either accedded later or automatically emailed to the person monitoring your actions.

By Azmi Hwamed

6 min Read

Sponsors

who trust us

wen hostingcronos4Cinfinitycodeissatissat

Teams

departement

president

Mohamed Ali Meddeb

vice president

Shayma Trad

Finance and external relations

Abir Chalghami

Contact

Talk to us