top of page
OSCP
Bildschirmfoto 2024-03-16 um 17.19_edited.jpg

CISSP

The OCSP is referred to as the ‘knightly accolade’ in pentesting.

​

The OSCP course, officially ‘PEN-200: Penetration Testing with Kali Linux’ by OffSec, offers practical training in penetration testing. Participants learn methods, tools and techniques for detecting and exploiting security vulnerabilities in systems. The course covers topics such as information gathering, vulnerability scanning, web applications and SQL injection. Those who pass the exam receive the OSCP certification (OffSec Certified Professional). This certification is one of the most highly valued in the security industry and requires proof of professional practical skills in penetration testing.

​

 

General Course Introduction

Introduction to Cybersecurity

Effective Learning Strategies

Report Writing for Penetration Testers

Information Gathering

Vulnerability Scanning

Introduction to Web Applications

Common Web Application Attacks

SQL Injection Attacks

Client-Side Attacks

Locating Exploits Public

Fixing Exploits

Antivirus Evasion

Password Attacks

Windows Privilege Escalation

Linux Privilege Escalation

Port Redirection and SSH Tunneling

Advanced Tunneling

The Metasploit Framework

Active Directory Introduction and Enumeration

Attacking Active Directory Authentication

Lateral Movement in Active Directory

Enumerating AWS Cloud Infrastructure

Attacking AWS Cloud Infrastructure

Assembling the Pieces

Trying Harder: The Labs

 

​

Details finden Sie auf unserer Trainingsseite!

CISSP

CISSP

The CISSP is known as the "Gold Standard Credential" of Information Security.

​​

Show knowledge and experience to your customers, prove your competence and gain confidence and competitive advantages through a broad and deep set of knowledge!

​​

The participants of this 5-day course will be prepared intensively and exam-oriented in German language by an ISC2 authorized trainer for the exam "Certified Information Systems Security Professional" (CISSP). The seminar uses the official ISC2 CISSP training materials and teaches the full CISSP Common Body of Knowledge:

​

 
Security and Risk Management

Asset Security

Security Architecture and Engineering

Communication and Network Security

​Identity and Access Management (IAM)

​Security Assessment and Testing

​Security Operations

Software Development Security

 

CCSP

CCSP

 

The Cloud: Permanent new challenges, technologies, vendors, laws, regulations and threats. Time for the right perspective! The CCSP is an international certificate created by the ISC2 in collaboration with the Cloud Security Alliance (CSA) and accredits you the highest standard of cloud security expertise.

​

​

The participants of this 4-day course will be prepared intensively and exam-oriented in German by an ISC2 authorized trainer for the exam "Certified Cloud Security Professional" (CCSP). The seminar will provide you with the official ISC2 CCSP training materials and teach the full CCSP Common Body of Knowledge:

​

Cloud Concepts, Architecture and Design​

Cloud Data Security

​Cloud Platform and Infrastructure Security

​Cloud Application Security

​Cloud Security Operations

​​Legal, Risk and Compliance

​

CISM

CISM

As a CISM, you manage complex information security programs, develop risk management programs, build corporate security governance and lead incident response teams. The certificate is a pioneer from consulting to management. Certificate holders have a good overview of standards, frameworks, and best practices and are highly acclaimed.

​

The participants of this 3-day course will be prepared intensively and exam-oriented in German language by an experienced trainer for the exam "Certified Information Systems Manager" (CISM). Using the official ISACA documents and test examinations, the seminar conveys all knowledge areas of the CISM Job Practice in a detailed and interactive form:

 

 

Information Security Governance

​Information Risk Management and Compliance

Information Security Program Development and Management

​Information Security Incident Management

​

CISA

CISA

As auditor you check the controls for information systems, processes and data and make sure that your customers are on the right track. Your qualifications and work experience enables you to assess technology, risks, threats, and vulnerabilities, and to understand how to secure business processes, data, and systems. Your work ensures that the assumptions made in business are met, that data, systems and processes are secure and that the company's employees are working compliant to law, regulation and policies.

 

The certificate is traded globally as the Gold Standard for "IS Audits, Controls and Assurance Professionals".

​

The participants of this 4-day course will be prepared intensively and exam-oriented in German language by an experienced trainer for the exam "Certified Information Systems Auditor" (CISA). Using the official ISACA documents and test examinations, the seminar conveys all knowledge areas of the CISA Certification Job Practice in a detailed and interactive form:

​

​

The Process of Auditing Information Systems​​

Governance and Management of IT

​Information Systems Acquisition, Development and Implementation

Information Systems Operations, Maintenance and Service Management

​Protection of Information Assets

​

INFORMATION SECURITY TRAININGS

Information Security Training

The participants of this 5-day intensive course will be comprehensively introduced to all important areas of information security and privacy by an experienced trainer. Participants will gain an in-depth overview of the content below and understand the key security measures involved in developing and securing software:

​

​

Information Security

​​Risk Management

Asset Security

​Security Engineering

Cryptography

Physical Security

​Network Communication

​​Identity Management and Access Controls

​​Web Applications

Secure software development

Operations and Maintenance

​Business Continuity 

​​Disaster Recovery 

​

SECURITY AWARENESS

Security Awareness Seminar

The participants of this one-day seminar will be informed comprehensively about common social engineering attacks ("human hacking") and their impact. Numerous examples and scenarios illustrate how attackers bypass the technical security measures in a company by moving people to provide information or access.

​

The most effective security measure is to sensitize employees and managers and to create an appropriate security culture within the organization. Take the next step, protect yourself, and immunize your business!

​

 
Human Hacking

Social Engineering Scenarios

Psychological Aspects

Corporate Security Culture

​

bottom of page