Nowadays, sensitive data is in electronic form processed in every company. If the protection of this data is at risk, this poses an essential threat to the company’s operational business. The participants are given the tools to recognize and assess these risks and to initiate appropriate countermeasures.
The central idea of this course is to provide network administrators, security representatives, executives and employees who process sensitive data with the basics for their work in handling confidential information and the basics of network security. General principles, best practices and attack techniques are presented. Numerous “live hacking” examples illustrate the theoretical explanations.
Content
- Basics of information security
- Essential terms of information security
- Network security
- Cryptography
- Safety principles
- Authentication models
- Attacker models
- Threats
- Infiltration of IT systems
- Known vulnerabilities
- Mobile device security
- Client security, malware, virus protection, Drive-By download, ransomware, Phishing
- Social engineering, psychology
- (Distributed) Denial of Service/(D)DoS
- Organisational security measures
- Risk management
- ISO27001, BSI basic protection
- ISMS
- PDCA
- security economy, ideal investment
- Technical security measures
- Network security, filter elements, firewall / WAF, IDS, IPS, honeypots
- Communication security
- Protection against DDoS
- Security checks, audits, penetration tests, sourcecode analysis
Target Audience
- Decision makers
- Manager
- Project managers
Duration
One day
Prerequesites
none
Trainer
![]() |
Dr. Benjamin Kellermann Experienced penetration tester and IT security consultant |
Our training courses are aimed at companies and organisations. A training course can be economical with just three or more participants. The trainings take place at your premises or is organised by us in your desired environment.

Your Contact:
Dr.-Ing. Benjamin Kellermann
Contact us via email.
Or call us or use our special contact form.