

CISSP
The OCSP is referred to as the ‘knightly accolade’ in pentesting.
​
The OSCP course, officially ‘PEN-200: Penetration Testing with Kali Linux’ by OffSec, offers practical training in penetration testing. Participants learn methods, tools and techniques for detecting and exploiting security vulnerabilities in systems. The course covers topics such as information gathering, vulnerability scanning, web applications and SQL injection. Those who pass the exam receive the OSCP certification (OffSec Certified Professional). This certification is one of the most highly valued in the security industry and requires proof of professional practical skills in penetration testing.
​
General Course Introduction
Introduction to Cybersecurity
Effective Learning Strategies
Report Writing for Penetration Testers
Information Gathering
Vulnerability Scanning
Introduction to Web Applications
Common Web Application Attacks
SQL Injection Attacks
Client-Side Attacks
Locating Exploits Public
Fixing Exploits
Antivirus Evasion
Password Attacks
Windows Privilege Escalation
Linux Privilege Escalation
Port Redirection and SSH Tunneling
Advanced Tunneling
The Metasploit Framework
Active Directory Introduction and Enumeration
Attacking Active Directory Authentication
Lateral Movement in Active Directory
Enumerating AWS Cloud Infrastructure
Attacking AWS Cloud Infrastructure
Assembling the Pieces
Trying Harder: The Labs
​

CISSP
The CISSP is known as the "Gold Standard Credential" of Information Security.
​​
Show knowledge and experience to your customers, prove your competence and gain confidence and competitive advantages through a broad and deep set of knowledge!
​​
The participants of this 5-day course will be prepared intensively and exam-oriented in German language by an ISC2 authorized trainer for the exam "Certified Information Systems Security Professional" (CISSP). The seminar uses the official ISC2 CISSP training materials and teaches the full CISSP Common Body of Knowledge:
​
Security and Risk Management
Asset Security
Security Architecture and Engineering
Communication and Network Security
​Identity and Access Management (IAM)
​Security Assessment and Testing
​Security Operations
Software Development Security

CCSP
The Cloud: Permanent new challenges, technologies, vendors, laws, regulations and threats. Time for the right perspective! The CCSP is an international certificate created by the ISC2 in collaboration with the Cloud Security Alliance (CSA) and accredits you the highest standard of cloud security expertise.
​
​
The participants of this 4-day course will be prepared intensively and exam-oriented in German by an ISC2 authorized trainer for the exam "Certified Cloud Security Professional" (CCSP). The seminar will provide you with the official ISC2 CCSP training materials and teach the full CCSP Common Body of Knowledge:
​
Cloud Concepts, Architecture and Design​
Cloud Data Security
​Cloud Platform and Infrastructure Security
​Cloud Application Security
​Cloud Security Operations
​​Legal, Risk and Compliance

CISM
As a CISM, you manage complex information security programs, develop risk management programs, build corporate security governance and lead incident response teams. The certificate is a pioneer from consulting to management. Certificate holders have a good overview of standards, frameworks, and best practices and are highly acclaimed.
​
The participants of this 3-day course will be prepared intensively and exam-oriented in German language by an experienced trainer for the exam "Certified Information Systems Manager" (CISM). Using the official ISACA documents and test examinations, the seminar conveys all knowledge areas of the CISM Job Practice in a detailed and interactive form:
Information Security Governance
​Information Risk Management and Compliance
Information Security Program Development and Management
​Information Security Incident Management
​

CISA
As auditor you check the controls for information systems, processes and data and make sure that your customers are on the right track. Your qualifications and work experience enables you to assess technology, risks, threats, and vulnerabilities, and to understand how to secure business processes, data, and systems. Your work ensures that the assumptions made in business are met, that data, systems and processes are secure and that the company's employees are working compliant to law, regulation and policies.
The certificate is traded globally as the Gold Standard for "IS Audits, Controls and Assurance Professionals".
​
The participants of this 4-day course will be prepared intensively and exam-oriented in German language by an experienced trainer for the exam "Certified Information Systems Auditor" (CISA). Using the official ISACA documents and test examinations, the seminar conveys all knowledge areas of the CISA Certification Job Practice in a detailed and interactive form:
​
​
The Process of Auditing Information Systems​​
Governance and Management of IT
​Information Systems Acquisition, Development and Implementation
Information Systems Operations, Maintenance and Service Management
​Protection of Information Assets
​

Information Security Training
The participants of this 5-day intensive course will be comprehensively introduced to all important areas of information security and privacy by an experienced trainer. Participants will gain an in-depth overview of the content below and understand the key security measures involved in developing and securing software:
​
​
Information Security
​​Risk Management
Asset Security
​Security Engineering
Cryptography
Physical Security
​Network Communication
​​Identity Management and Access Controls
​​Web Applications
Secure software development
Operations and Maintenance
​Business Continuity
​​Disaster Recovery
​

Security Awareness Seminar
The participants of this one-day seminar will be informed comprehensively about common social engineering attacks ("human hacking") and their impact. Numerous examples and scenarios illustrate how attackers bypass the technical security measures in a company by moving people to provide information or access.
​
The most effective security measure is to sensitize employees and managers and to create an appropriate security culture within the organization. Take the next step, protect yourself, and immunize your business!
​
Human Hacking
Social Engineering Scenarios
Psychological Aspects
Corporate Security Culture
​