We enjoy helping companies on their way to defend and protect themselves, but even more so when we know that the achieved goals are left in good hands. We don't keep our knowledge to ourselves, in fact, we love sharing it. That's why we hold talks, participate in meetups, write blog posts and organize workshops. But more than that, we offer custom trainings, group workshops and coaching and help people achieve their next level in security, from beginner to expert.
Awareness trainings lay the very foundation of any security program. Whether your employees already have some understanding on security practices or are completely new to the game, we will show them what to look out for and how to handle incidents properly.
Nobody knows better as to what qualifies as normal than your company's own employees. By training them how to detect and handle behavioral anomalies, your employees become part of your security solution to prevent social engineering attacks and to minimize the risk of accidentally causing vulnerabilities.
Awareness trainings are important, but have you ever tested how effective your training sessions actually are? If not, then it's time to put that knowledge to the test and see if there are any weak spots left. With a targeted social engineering attack we are able to reveal this flaws.
Your administrators do a good job at keeping everything running, but need help at hardening your systems and enable a better protection? Our Blue Team can of course help, but sometimes it's better to train your staff instead and keep the knowledge in the company.
Web apps have become very powerful and versatile, which unfortunately doesn't always apply to their security. Luckily administrators can do a lot to avoid breaches through vulnerabilities and flawed web applications.
Whether you run Linux or Windows servers, the default settings shouldn't be considered safe as their intended to work in many scenarios and not to provide maximum, or in some cases even reasonable protection.
Network access control, protocol headers, switch settings and firewalls. There is a lot that can be done to harden your network and protect your business assets.
Besides defending your systems, we also train new offensive experts to run your own penetration tests. Take a look at our following course topics, which we teach to both beginners and advanced users.
Learn to attack and find flaws in big and small web applications, explain and summarize your findings, create a detailed penetration test report or improve your web hacking skills in an advanced course.
Want to test your network and hosts but don't know how to enumerate and fingerprint running services, discover forgotten servers, sniff credentials and pass the hash? Then this course is for you – or your next penetration test specialists!
Beside the defense and offense courses, we offer personal coaching and secure coding trainings. Whether you need your own security experts or want to code secure applications, this is the right choice.
Trainings are great to gain new or refresh stale knowledge, however, if you're looking to hone your skills and get to the next level, our coaching might be better suited. One of our experts will accompany you on your daily routine and help you become the best at what you do, wether it' penetration testing, defense and recovery or both.
If your company is developing applications, teaching your developers how attackers think can greatly improve the security of their code from the ground up. With the knowledge gained in this training, vulnerabilities can be spotted and fixed or outright avoided long before testing begins.