1. basics of cyber security
2. initial infections
3. Infrastructure security
4. linux security
4. windows security
5. Active Directory security
6. post exploitation
7. defense-in-depth
8. ransomware
9. case studies and practical exercises
This course offers a curriculum that consists largely of practical exercises and case studies. As a result, the essential safety concepts are covered in depth. Each topic has been carefully selected to provide participants with both the necessary knowledge and practical skills that can be immediately applied in their daily work.
You can make sensible decisions in your daily work environment to improve IT security efficiently and sustainably.
Numerous practical exercises will enable you to recognize and fend off attacks and close existing security gaps.
You will learn how to fend off 0-day and 1-day attacks and meet the technical and organizational requirements of the GDPR and NIS2 regulations.
You will gain an overview and in-depth knowledge of attack vectors as well as response and protection measures.
You will learn how to deal with the constantly changing challenges in the field of cyber security.
This training training is conducted in a group of a maximum of 15 participants using the Zoom video conferencing software.
Individual support from the trainers is guaranteed - in the virtual classroom or individually in break-out sessions.
every participant is given access to an IT security lab, a virtual environment in which a company network is simulated - with various operating systems (Windows, Linux, BSD), servers, clients, firewalls, PDCs, proxies, NG firewalls, IPS, WAF and endpoint protection. Various security exercises are carried out in the lab. The IT Security Lab can be accessed online via a web browser.
This course is aimed at IT security officers, IT administrator (client, server, network), programmers, IT engineers and Employees in Security Operations Centers (SOC) as well as anyone who wants to view security risks through the eyes of the attacker and develop better solution scenarios.
Initial experience in the operation and administration of IT systems (Windows and Linux) and basic knowledge of IT security are required.
Form of learning
Learning form
No filter results