The Redguard courses and training seminars address all aspects of our main services and are specifically organized and conducted to suit your requirements. Redguard training is highly practical and is developed and taught by our security specialists.
Supporting you in your projects is important to us. Moreover, we want to transfer to you the skills of the Redguard specialists so that you can build and maintain your internal know-how in the long term. This is why we only use practically experienced coaches and tailor the Redguard courses precisely to suit your real challenges.
“You are the target!” People are the targets of modern attacks.
Besides technical security measures, it is essential that your employees possess a high level of security awareness. Our live hacking presentations are practical demonstrations of how simple it is to mount an attack and that effective protection is only possible if each individual employee makes a contribution. This means that employees need to realize that attackers looking to access sensitive data are focusing on them.
Web applications are frequently exposed to attack. Informing and sensitizing employees involved in their development (software architects and developers, project managers etc.) help to address security aspects at an early stage. This course shows which methods can be developed to create sustainably secure applications. Practical examples demonstrate the important dos and don’ts.
The Open Web Application Security Project (OWASP) regularly publishes the ten most critical security risks associated with web applications (OWASP Top 10).
In our OWASP Top 10 E-Learning your employees will learn from our security experts with practical examples how these risks can be exploited, but also avoided.
E-learning is aimed at all employees involved in the software development process, from developers to Scrum Masters. The scalable training helps to ensure that security aspects are taken into account early and comprehensively.
The Metasploit framework is one of the most comprehensive and powerful tools in the area of security testing and exploiting. Administrators can use the sophisticated tool to check and rectify system vulnerabilities. In this training, we introduce you to the basics of this framework and show which tests you can apply.
Standardization and flexibility are taken to a new level through the use of application containers. Software is used to model infrastructure components and to ensure their rapid adaptability. This makes ICT flexible and scalable and enables its modification to suit your business needs at any time. In this course, we introduce you to the topic of dockers with a particular emphasis on security. You learn how dockers work and how container technologies and SecDevOps approaches produce a secure and more efficient ICT environment.
In this training, we highlight the security aspect of using (Docker) containers and Kubernetes. Participants will learn how container technologies basically work, what threats exist and how to address them effectively. This allows you not only to use container technologies securely, but even to increase the security level compared to the classic infrastructure.