• Boot camps & training
  • Awareness & anti-phishing
  • Community
    • Topics
    • Certification Prep
    • Cyber Work
    • About us
    • Back
    • Industry insights
    • Phishing
    • Hacking
    • Capture the flag (CTF)
    • Professional development
    • Security awareness
    • Penetration testing
    • Cyber ranges
    • General security
    • Management & compliance
    • Malware analysis
    • MITRE ATT&CK™
    • News
    • Application security
    • Digital forensics
    • View all
    • Back
    • Back
    • (ISC)² CISSP
    • (ISC)² CCSP
    • (ISC)² CAP
    • Cisco CCNA
    • CMMC
    • CompTIA A+
    • CompTIA Network+
    • CompTIA Security+
    • CompTIA CySA+
    • CompTIA PenTest+
    • CompTIA CASP+
    • EC-Council CEH
    • ISACA CDPSE
    • ISACA CGEIT
    • ISACA CISA
    • ISACA CISM
    • ISACA CRISC
    • Microsoft Azure
    • PMP
    • View all
    • Back
    • Cyber Work Podcast
    • Cyber Work Live
    • Back
    • Contact us
    • Contributors

Mattia Reggiani

Mattia is an offensive security enthusiast, certified Ethical Hacker and graduated summa cum laude from a Master’s degree in Information Security at the University of Milan. He is interested in ethical hacking and forensics analysis. Currently, he works as IT Security consultant for a wide range of clients: industrial, automotive, insurance banking and energy.

Digital forensics August 3, 2016 Mattia Reggiani

A brief introduction to Forensic Readiness

As defined in the RFC 2350 (Expectations for Computer Security Incident Response), the security incident is any adverse event which compromises some aspect...
Application security July 26, 2016 Mattia Reggiani

Purple Teaming: A Security-Testing Collaborative

The Red Tem term was born in the military environment to represent the highly specialized groups, able to play the role of opponents in contrast to the defensive...
Hacking April 11, 2016 Mattia Reggiani

VoIP Call Modification

This lab describes the telephone signal tampering, a type of Man in The Middle attack with the aims to insert, modify and remove VoIP packet to alter the communication...
Hacking December 16, 2015 Mattia Reggiani

Attacking WPA2 enterprise

The widespread use of mobile and portable devices in the enterprise environment requires a proper implementation of the wireless network infrastructure to provide...
Infosec logo

Topics

Hacking Penetration testing Cyber ranges Capture the flag Malware analysis Professional development General security News Security awareness Phishing Management, compliance & auditing Digital forensics Threat intelligence DoD 8570 View all topics

Certifications

CISSP CCSP CGEIT CEH CCNA CISA CISM CRISC A+ Network+ Security+ CASP+ PMP CySA+ CMMC Microsoft Azure View all certifications

Careers

IT auditor Cybersecurity architect Cybercrime investigator Penetration tester Cybersecurity consultant Cybersecurity analyst Cybersecurity engineer Cybersecurity manager Incident responder Information security auditor Information security manager View all careers

Company

Contact us About Infosec Work at Infosec Newsroom Partner program
  • Infosec, part of Cengage Group — ©2023 Infosec Institute, Inc.
    • Trademarks
    • Privacy Policy