Courses in the Affair of Information Security


Raise awareness, secure & control

Information security training

Today, IT security is a central success factor for companies, organizations and public institutions. Technological developments, new threat situations and increasing requirements for the secure operation of digital processes make it necessary not only to build up security knowledge selectively, but also to anchor it sustainably in the organization. With our lectures, training courses and practical formats in the area of ​​IT security, we support companies in increasing security awareness, classifying risks in an understandable manner and imparting relevant specialist knowledge in a targeted manner.

Our goal is to prepare complex IT security topics in such a way that they are technically sound, understandable and immediately applicable to practice. We align our content with the actual requirements, previous knowledge and objectives of the respective target group. This creates formats that not only provide information, but also provide orientation, promote certainty in action and create sustainable added value for the organization.

We attach particular importance to a practical and solution-oriented approach. IT security must not be taught in an abstract or purely technical way, but must be comprehensible and relevant for the participants. That's why we combine technical content with concrete examples, realistic scenarios and a clear reference to operational challenges, organizational issues and current security requirements.

Our training courses

Information security and IT security

  • Target group-specific information security training
  • Target group-specific IT security training
  • Target group-specific threat intelligence training
  • Awareness training

General Training Topics

  • Password security & authentication
  • Phishing & Social Engineering
  • Working safely in the home office
  • Network & Device Security
  • Use cloud & collaboration tools securely
  • Backup & Disaster Recovery
  • Malware & ransomware protection
  • Mobile Security & Devices
  • Internal threat awareness
  • Cyber-Intelligence
  • Threat-Intelligence

Advanced Training Topics

  • Advanced password & authentication strategies (e.g. passphrases, hardware tokens)
  • Advanced Phishing & Social Engineering Awareness Training
  • Data protection & compliance for special cases (e.g. international data transfers)
  • Working securely in hybrid and cloud-based infrastructures
  • Network & endpoint hardening (firewalls, IDS/IPS, zero trust concepts)
  • Cloud Security & Secure DevOps (DevSecOps)
  • Advanced Backup & Disaster Recovery Strategies
  • Malware & ransomware analysis and incident response
  • Mobile Security & Mobile Threat Defense
  • Insider Threat Detection & Response
  • Threat Intelligence: Threat analysis & monitoring
  • Cyber Intelligence: Detect and evaluate attacks
  • Penetration Testing & Ethical Hacking Basics
  • Security Monitoring & SIEM (Security Information and Event Management)
  • Security assessment of web applications & APIs
  • Cryptography & secure data transmission
  • Security architectures and Zero Trust implementation

Cyber-Intelligence

Cyber ​​intelligence training courses provide in-depth knowledge about the structured analysis and assessment of current cyber threats. The aim is to enable employees and security-relevant roles to systematically collect, analyze and integrate threat intelligence information into existing security processes. Training covers key concepts in cyber threat intelligence, including threat actors, attack vectors, and tactics, techniques, and procedures (TTPs). Participants learn to identify relevant sources of information and derive usable security information from them.

A particular focus is on the analysis and classification of Indicators of Compromise (IoC) for the early detection of potential security incidents. It also teaches how threat intelligence findings can be effectively integrated into security operations, incident response and risk management processes. Real-world examples show how threat intelligence is used to improve detection and response capabilities. In this way, cyber intelligence training supports organizations in identifying threats at an early stage and sustainably strengthening their cyber resilience.

Our Focus

We do not see IT security lectures and training as simply imparting knowledge, but rather as an important contribution to the security culture of an organization. That's why we value understandable language, a structured structure and content that is both technically convincing and remains applicable in everyday life.

Our approach is advice-oriented, practice-oriented and target-oriented. We do not teach IT security in isolation from the reality of your organization, but rather with a view to specific risks, typical questions and the actual challenges in the operational environment. In this way, we not only promote knowledge, but also awareness, responsibility and confidence in action.

Advantages when implemented

  • Greater understanding of risks, threats and protection measures
  • Greater awareness of IT security in everyday work
  • Communicating complex security content to target groups
  • Practical formats with direct application relevance
  • Sustainable support for an effective safety culture

If you have any questions or would like advice as an initial introduction, you can contact us at any time using our contact form.