-
Digital networking is advancing in various areas of our society. Cyber criminals are exploiting this fact on a large scale to carry out their sometimes highly complex attacks. Conventional protective measures are reaching their limits in this environment. More modern cyber security methods, on the other hand, offer more effective protection, but also allow the digital world to develop. Participants in this seminar will be able to assess cyber risks and plan protective measures and their implementation.
-
Course Contents
-
- Espionage, sabotage, misuse
- Different types of attackers
- Cyber risks
- Various attack techniques
- Phishing, mass vs. spear attacks
- Ransomware
- Denial of Service (DoS and DDoS)
- Internet of Things and Industry 4. 0
- Cloud Security
- Advanced Persistent Threats
- Social Engineering
- Security Awareness
- Information Security Management Systems (ISMS)
- BSI-Grundschutz
- KRITIS, NiS and RCE
- CERT
- Next Generation Firewalls
- VPN
- Proxies
- Intrusion Detection and Prevention
- Sandboxing
- Identity Based Access
- First Hop Security
- Endpoint Security
- Bring Your Own Device
- Cyber Security Vulnerability Assessments
- Penetration Tests
- Digital forensics
- Security Information and Event Management (SIEM)
- Computer Security Incident Response Team (CSIRT)
The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.
Premium Course Documents
In addition to the digital documentation package, the exclusive Premium Print Package is also available to you.
- High-quality color prints of the ExperTeach documentation
- Exclusive folder in an elegant design
- Document pouch in backpack shape
- Elegant LAMY ballpoint pen
- Practical notepad
The Premium Print Package can be added during the ordering process for € 150,- plus VAT (only for classroom participation). -
Target Group
-
This course is aimed at people in a company who are responsible for protecting against the dangers of the modern digital world in the area of security.
-
Knowledge Prerequisites
-
Ideally, participants will already have basic knowledge of network technology and data communication, especially in the areas of LAN and TCP/IP. The course Modern IP & Network Concepts - Everything Essential for Sales & Marketing! is a good preparation for this.
1 Assessing the threat situation |
1.1 Targets of the attackers |
1.1.1 Sabotage |
1.1.2 Espionage |
1.1.3 Abuse |
1.2 Types of attackers |
1.2.1 Recreational hackers |
1.2.2 Professional attackers |
1.2.3 Political motives |
1.2.4 Economic interests |
1.2.5 Cyberterrorism |
1.3 Knowing threats |
2 Identifying points of attack |
2.1 Attack on networks |
2.2 Attack on servers |
2.2.1 Exploitation Attacks |
2.2.2 Password attacks |
2.2.3 Application attacks |
2.3 Client site attacks |
2.3.1 Delivering malicious code |
2.3.2 QR codes |
2.3.3 Attack via malicious documents |
2.3.4 Ransomware - DoS on clients |
2.3.5 Cryptojacking |
2.4 Attacking mobile devices |
2.5 Social engineering |
2.5.1 Phishing |
2.5.2 Using a web server |
2.6 Attacks on the Internet of Things |
2.7 Cloud security |
2.7.1 Data protection and compliance |
2.7.2 Account hijacking |
2.8 Advanced Persistent Threats |
2.8.1 Concept of an APT |
2.8.2 Multi-stage attack |
2.8.3 Attacking from the inside |
2.8.4 APT protective measures |
2.8.5 Watering hole attacks |
3 Planning protective measures |
3.1 Disclose communication channels |
3.1.1 Identifying communication partners |
3.1.2 Question motives |
3.2 Create security guidelines |
3.2.1 Questioning user rights |
3.2.2 Secure clients |
3.2.3 Monitor communication paths |
3.2.4 Secure servers |
3.3 Security awareness measures |
3.3.1 Involve users |
3.3.2 Reveal reasons |
3.3.3 Making restrictions comprehensible |
3.4 Information security management systems |
3.4.1 Background to ISMS |
3.4.2 Phases of the ISMS |
3.4.3 ISMS in BSI basic protection |
4 Implementing protective measures |
4.1 Firewalls and Next Generation Firewalls |
4.1.1 Creating rules and regulations |
4.1.2 Virtual Private Networks - VPN |
4.1.3 Tasks of next generation firewalls |
4.1.4 Content awareness |
4.1.5 URL filtering |
4.1.6 SSL inspection |
4.1.7 Identity Based Access |
4.1.8 Firewalls in virtualized environments |
4.2 Proxy server |
4.3 IDS and IPS systems |
4.3.1 Types of IDS/IPS |
4.3.2 Signature Based Protection |
4.3.3 Protocol Analysis |
4.3.4 Anomaly Detection |
4.3.5 Protection against Advanced Evasion Techniques |
4.4 Advanced Threat Protection |
4.4.1 Threat Emulation - Sandboxing |
4.4.2 Threat Extraction |
4.5 First Hop Security |
4.5.1 Security in LAN and WLAN |
4.5.2 Traditional security features |
4.5.3 IEEE 802.1X - Port-based authentication |
4.6 Endpoint Security |
4.6.1 Personal firewalls |
4.6.2 Malware Protection |
4.6.3 Data Loss Prevention |
4.6.4 Disk Encryption |
4.6.5 Patch management |
4.7 Implementing BYOD securely |
5 Questioning security |
5.1 Monitoring security measures |
5.1.1 Evaluating logging data |
5.1.2 Monitor security systems |
5.2 Review IT processes - IS revision |
5.2.1 Guideline of the BSI |
5.2.2 IS Revision - Procedure |
5.3 Vulnerability checks |
5.3.1 Background of vulnerability analysis |
5.3.2 Types of vulnerability analysis |
5.3.3 Internal vs. external tests |
5.3.4 Compliance checks |
5.3.5 Questioning results |
5.4 Penetration tests |
5.4.1 Simulating an attack |
5.4.2 Objectives of penetration tests |
5.4.3 Legal considerations |
5.4.4 Social engineering tests |
5.4.5 Black box vs. white box tests |
6 Detecting attacks |
6.1 Behavioral analysis |
6.1.1 Internal communication to suspicious sites |
6.1.2 Unusual log activities |
6.1.3 Unusual communication paths |
6.1.4 Suspicious behavior |
6.1.5 Accumulation of alert messages |
6.1.6 Suspicious login attempts |
6.2 Security Information and Event Management - SIEM |
6.2.1 Detecting relevant data |
6.2.2 Correlating messages |
6.3 Digital forensics |
6.3.1 Computer forensics |
6.3.2 Network Forensics |
6.3.3 Cloud Forensics |
6.4 Computer Security Incident Response Team - CSIRT |
6.4.1 Tasks of the CSIRT |
6.4.2 Define security relevant areas |
6.4.3 Skills of the employees |
6.5 Response |
6.5.1 Eliminate problems |
6.5.2 Adjust security settings |
6.5.3 Train employees |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.

-
Digital networking is advancing in various areas of our society. Cyber criminals are exploiting this fact on a large scale to carry out their sometimes highly complex attacks. Conventional protective measures are reaching their limits in this environment. More modern cyber security methods, on the other hand, offer more effective protection, but also allow the digital world to develop. Participants in this seminar will be able to assess cyber risks and plan protective measures and their implementation.
-
Course Contents
-
- Espionage, sabotage, misuse
- Different types of attackers
- Cyber risks
- Various attack techniques
- Phishing, mass vs. spear attacks
- Ransomware
- Denial of Service (DoS and DDoS)
- Internet of Things and Industry 4. 0
- Cloud Security
- Advanced Persistent Threats
- Social Engineering
- Security Awareness
- Information Security Management Systems (ISMS)
- BSI-Grundschutz
- KRITIS, NiS and RCE
- CERT
- Next Generation Firewalls
- VPN
- Proxies
- Intrusion Detection and Prevention
- Sandboxing
- Identity Based Access
- First Hop Security
- Endpoint Security
- Bring Your Own Device
- Cyber Security Vulnerability Assessments
- Penetration Tests
- Digital forensics
- Security Information and Event Management (SIEM)
- Computer Security Incident Response Team (CSIRT)
The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.
Premium Course Documents
In addition to the digital documentation package, the exclusive Premium Print Package is also available to you.
- High-quality color prints of the ExperTeach documentation
- Exclusive folder in an elegant design
- Document pouch in backpack shape
- Elegant LAMY ballpoint pen
- Practical notepad
The Premium Print Package can be added during the ordering process for € 150,- plus VAT (only for classroom participation). -
Target Group
-
This course is aimed at people in a company who are responsible for protecting against the dangers of the modern digital world in the area of security.
-
Knowledge Prerequisites
-
Ideally, participants will already have basic knowledge of network technology and data communication, especially in the areas of LAN and TCP/IP. The course Modern IP & Network Concepts - Everything Essential for Sales & Marketing! is a good preparation for this.
1 Assessing the threat situation |
1.1 Targets of the attackers |
1.1.1 Sabotage |
1.1.2 Espionage |
1.1.3 Abuse |
1.2 Types of attackers |
1.2.1 Recreational hackers |
1.2.2 Professional attackers |
1.2.3 Political motives |
1.2.4 Economic interests |
1.2.5 Cyberterrorism |
1.3 Knowing threats |
2 Identifying points of attack |
2.1 Attack on networks |
2.2 Attack on servers |
2.2.1 Exploitation Attacks |
2.2.2 Password attacks |
2.2.3 Application attacks |
2.3 Client site attacks |
2.3.1 Delivering malicious code |
2.3.2 QR codes |
2.3.3 Attack via malicious documents |
2.3.4 Ransomware - DoS on clients |
2.3.5 Cryptojacking |
2.4 Attacking mobile devices |
2.5 Social engineering |
2.5.1 Phishing |
2.5.2 Using a web server |
2.6 Attacks on the Internet of Things |
2.7 Cloud security |
2.7.1 Data protection and compliance |
2.7.2 Account hijacking |
2.8 Advanced Persistent Threats |
2.8.1 Concept of an APT |
2.8.2 Multi-stage attack |
2.8.3 Attacking from the inside |
2.8.4 APT protective measures |
2.8.5 Watering hole attacks |
3 Planning protective measures |
3.1 Disclose communication channels |
3.1.1 Identifying communication partners |
3.1.2 Question motives |
3.2 Create security guidelines |
3.2.1 Questioning user rights |
3.2.2 Secure clients |
3.2.3 Monitor communication paths |
3.2.4 Secure servers |
3.3 Security awareness measures |
3.3.1 Involve users |
3.3.2 Reveal reasons |
3.3.3 Making restrictions comprehensible |
3.4 Information security management systems |
3.4.1 Background to ISMS |
3.4.2 Phases of the ISMS |
3.4.3 ISMS in BSI basic protection |
4 Implementing protective measures |
4.1 Firewalls and Next Generation Firewalls |
4.1.1 Creating rules and regulations |
4.1.2 Virtual Private Networks - VPN |
4.1.3 Tasks of next generation firewalls |
4.1.4 Content awareness |
4.1.5 URL filtering |
4.1.6 SSL inspection |
4.1.7 Identity Based Access |
4.1.8 Firewalls in virtualized environments |
4.2 Proxy server |
4.3 IDS and IPS systems |
4.3.1 Types of IDS/IPS |
4.3.2 Signature Based Protection |
4.3.3 Protocol Analysis |
4.3.4 Anomaly Detection |
4.3.5 Protection against Advanced Evasion Techniques |
4.4 Advanced Threat Protection |
4.4.1 Threat Emulation - Sandboxing |
4.4.2 Threat Extraction |
4.5 First Hop Security |
4.5.1 Security in LAN and WLAN |
4.5.2 Traditional security features |
4.5.3 IEEE 802.1X - Port-based authentication |
4.6 Endpoint Security |
4.6.1 Personal firewalls |
4.6.2 Malware Protection |
4.6.3 Data Loss Prevention |
4.6.4 Disk Encryption |
4.6.5 Patch management |
4.7 Implementing BYOD securely |
5 Questioning security |
5.1 Monitoring security measures |
5.1.1 Evaluating logging data |
5.1.2 Monitor security systems |
5.2 Review IT processes - IS revision |
5.2.1 Guideline of the BSI |
5.2.2 IS Revision - Procedure |
5.3 Vulnerability checks |
5.3.1 Background of vulnerability analysis |
5.3.2 Types of vulnerability analysis |
5.3.3 Internal vs. external tests |
5.3.4 Compliance checks |
5.3.5 Questioning results |
5.4 Penetration tests |
5.4.1 Simulating an attack |
5.4.2 Objectives of penetration tests |
5.4.3 Legal considerations |
5.4.4 Social engineering tests |
5.4.5 Black box vs. white box tests |
6 Detecting attacks |
6.1 Behavioral analysis |
6.1.1 Internal communication to suspicious sites |
6.1.2 Unusual log activities |
6.1.3 Unusual communication paths |
6.1.4 Suspicious behavior |
6.1.5 Accumulation of alert messages |
6.1.6 Suspicious login attempts |
6.2 Security Information and Event Management - SIEM |
6.2.1 Detecting relevant data |
6.2.2 Correlating messages |
6.3 Digital forensics |
6.3.1 Computer forensics |
6.3.2 Network Forensics |
6.3.3 Cloud Forensics |
6.4 Computer Security Incident Response Team - CSIRT |
6.4.1 Tasks of the CSIRT |
6.4.2 Define security relevant areas |
6.4.3 Skills of the employees |
6.5 Response |
6.5.1 Eliminate problems |
6.5.2 Adjust security settings |
6.5.3 Train employees |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
