Training produces know-how.

Redguard trainings cover all of our services. Our trainings are flexible and fully adjusted to your needs. This enables us to guarantee sustainable learning success. All of our traingins contain hands-on exercises, real-world scenarios and they are developed and delivered by our consultants and security testers who bring in their field experience.

It is important to us, to support you from a project perspective. Further, we want to transfer the competencies of Redguard specialists to you in a sustainable way so that you can build up your internal know-how. This is why, without exception, courses are given by presenters with direct practice experience and are tailored to your specific challenges. Thus, you will not waste time attending standardized courses.

We do not offer standardized trainings and the following are just examples. If you're interested in any kind of security training (e.g. attack and defense techniques, secure development, awareness, network security), please don't hesitate to contact us.

Sven Vetsch

Sven Vetsch

Partner & Head of Security Research
Questions? Contact us

Redguard-Trainings

This training is for beginners. It shows, from the perspective of a penetration tester, how secure web applications really are and how common vulnerabilities (cross-site scripting, SQL injection, etc.) can be identified, and with which measures they can be protected. Numerous freely available tools are presented that can be deployed to identify and verify vulnerabilities.

Level: Beginner
Duration: +/- 3 days

How can web applications become even more secure? This training for advanced practitioners provides an in-depth look at security-relevant topics such as Web Application Firewall and Filter Bypassing, DOM-based XSS, Blind SQL Injections, Padding Oracle Attacks and attacks on mobile applications. This training is for those who have attended the beginners’ course, “Web Application Testing”, or who have a good basic knowledge of web application security.

Level: Advanced
Duration: +/- 3 days

Modern web applications are vulnerable to numerous security risks – but which are the most dangerous ones? In this training we present the top 10 security risks according to the OWASP (Open Web Application Security Project) including appropriate countermeasure strategies. This training is for developers and technicians who work with web technologies and applications, and who want to protect those from the OWASP Top 10 risks.

Level: Beginner
Duration: +/- 3 days

The human being is the key success factor in the protection of information. Our Awareness Training offers pre-packaged example campaigns or we can deliver customized solutions. We prepare training courses according to your specific requirements and measure the results. We also support companies that wish to create such campaigns themselves.

Level: Beginner – for a variety of different target groups
Duration: depends on the target group and topic

Web applications are often highly vulnerable to attacks. So the necessary security aspects are taken into account during application design phases, the employees responsible (software architects and developers, project managers, etc.) need to be sensitized and informed. This course shows with which methods secure applications can be sustainably developed. Practical examples demonstrate the Do’s and Don’ts.

Level: Intermediate
Duration: +/- 2 days

The Metasploit Framework is one of the most comprehensive and powerful tools available in security testing and exploiting. Administrators can deploy this refined tool in order to identify computer systems vulnerabilities and to close them. This training introduces the framework and shows how to apply it in tests. Topics are, among others, MSF Basics, Meterpreter, Encoders, Backdooring, Anti-Virus Bypassing, Data Extraction and Pivoting.

Level: Intermediate
Duration: +/- 3 days