We enjoy helping companies on their way to defend and protect themselves, but even more so when we know that the achieved goals are left in good hands. We don't keep our knowledge to ourselves, in fact, we love sharing it. That's why we hold talks, participate in meetups, write blog posts and organize workshops. But more than that, we offer custom trainings, group workshops and coaching and help people achieve their next level in security, from beginner to expert.
Awareness trainings lay the very foundation of any security program. Whether your employees already have some understanding on security practices or are completely new to the game, we will show them what to look out for and how to handle incidents properly.
Nobody knows better as to what qualifies as normal than your company's own employees. By training them how to detect and handle behavioral anomalies, your employees become part of your security solution to prevent social engineering attacks and to minimize the risk of accidentally causing vulnerabilities.
Awareness trainings are important, but have you ever tested how effective your training sessions actually are? If not, then it's time to put that knowledge to the test and see if there are any weak spots left. With a targeted social engineering attack we are able to reveal this flaws.
Your administrators do a good job at keeping everything running, but need help at hardening your systems and enable a better protection? Our Blue Team can of course help, but sometimes it's better to train your staff instead and keep the knowledge in the company.
Web apps have become very powerful and versatile, which unfortunately doesn't always apply to their security. Luckily administrators can do a lot to avoid breaches through vulnerabilities and flawed web applications.
Whether you run Linux or Windows servers, the default settings shouldn't be considered safe as their intended to work in many scenarios and not to provide maximum, or in some cases even reasonable protection.
Network access control, protocol headers, switch settings and firewalls. There is a lot that can be done to harden your network and protect your business assets.
Besides defending your systems, we also train new offensive experts to run your own penetration tests. Take a look at our following course topics, which we teach to both beginners and advanced users.
Learn to attack and find flaws in big and small web applications, explain and summarize your findings, create a detailed penetration test report or improve your web hacking skills in an advanced course.
Want to test your network and hosts but don't know how to enumerate and fingerprint running services, discover forgotten servers, sniff credentials and pass the hash? Then this course is for you – or your next penetration test specialists!
Our online course (german) offers an easy entry into ethical web hacking for anyone interested in web security. The course teaches, how common vulnerabilities work, how to detect and exploit them and which counter measures can be used to effectively close these weak points. It is ideal for anyone aspiring to become a penetration tester or bug bounty hunter, as well as administrators and developers who want to secure their web applications.