Information Security
from a Single Source
from a Single Source
Trainings
- Company
- Services
- Topics
- Protection against Targeted Attacks (APTs) und Modern Malware
- Security in the cloud
- Vulnerability and Risk Management
- Zero Trust
- EDR und XDR
- Security of Smartphones, Tablets and Apps
- Audits and Penetration Tests
- 360-degree analyses
- Protection of Web Applications, Portals and Web Services
- ISO 27001, Risk Management, Processes, Policies, Guidelines
- Privileged Identity Management
- IoT and Industry 4.0
- Trainings
- Overview
- Malware and Ransomware – Background, Detection, Protection
- Security in Microsoft Office 365
- Hacking and Hardening of Windows Operating Systems
- Hacking and Hardening of Windows Infrastructures
- Hacking Extreme
- Hacking Extreme Web Applications
- Crash Course IT and Information Security
- NIS2: Information Security for Chief Executive Officers
- Incident Handling & Response
- Security in AWS Cloud Environments
- Security in Azure Cloud Environments
- Certified ISO 27001 Lead Implementer
- Certified ISO 27001 Lead Auditor
- Forensics Extreme
- IT Security for Strategists and Managers
- IT Security for Developers
- Hacking Extreme Buffer Overflows
Trainings > Hagen Molzer