Highly trained employees are half the battle

Do you want to build up internal expertise, train on specific topics or a project, or increase the security awareness of your employees? We provide training in all our key performance areas. Our offers are developed and led by our safety specialists - they are practical and easy to understand. We create training that is tailored to your requirements and target group - for groups or individuals, anywhere in the world. Or hire external specialists - for your project or your company.

Selected references on the subject

Our Services

  • Live Hacking Events

    «You are the target!» People are the targets of modern attacks.

    Besides technical security measures, it is essential that your employees possess a high level of security awareness. Our live hacking presentations are practical demonstrations of how simple it is to mount an attack and that effective protection is only possible if each individual employee makes a contribution. This means that employees need to realize that attackers looking to access sensitive data are focusing on them.

    More Information

  • OWASP Top 10 E-Learning

    The Open Web Application Security Project (OWASP) regularly publishes the ten most critical security risks associated with web applications (OWASP Top 10).

    In our OWASP Top 10 E-Learning your employees will learn from our security experts with practical examples how these risks can be exploited, but also avoided.

    E-learning is aimed at all employees involved in the software development process, from developers to Scrum Masters. The scalable training helps to ensure that security aspects are taken into account early and comprehensively.

    More Information

  • Container Security & Kubernetes Security

    Standardization and flexibility are taken to a new level through the use of application containers. Software is used to model infrastructure components and to ensure their rapid adaptability. This makes ICT flexible and scalable and enables its modification to suit your business needs at any time. In this course, we introduce you to the topic of dockers with a particular emphasis on security. You learn how dockers work and how container technologies and SecDevOps approaches produce a secure and more efficient ICT environment.

    In this training, we highlight the security aspect of using (Docker) containers and Kubernetes. Participants will learn how container technologies basically work, what threats exist and how to address them effectively. This allows you not only to use container technologies securely, but even to increase the security level compared to the classic infrastructure.

    More Information

  • Secure Development

    Web applications are often exposed to attacks. We train your software architects, developers and project managers so that you can take this into account during the development of your application. Benefit from methods for sustainable secure applications with hands-on exercises.

    More Information

  • Metasploit

    The Metasploit framework is one of the most comprehensive and powerful tools in the area of security testing and exploiting. Administrators can use the sophisticated tool to check and rectify system vulnerabilities. In this training, we introduce you to the basics of this framework and show which tests you can apply.

    More Information

  • Custom Training

    Are you looking for training that is not listed? We provide training in all our key performance areas. We will be pleased to design a specific offer for you. We look forward to hearing from you.

    Train your employees specifically in areas where your team still lacks expertise. Ask for a consultation and find out what makes sense for your company.