Description
2 Tage
€ 1.620,- zzgl. VAT
8 persons
Experience in web technologies
What you can expect from
SEC.321 Security Testing Foundation
Targeted development of expertise for secure (I)IoT products
You will learn how to avoid vulnerabilities early on—through solid security knowledge and clear “dos and don’ts” for development and project work.
Practical learning with real attack scenarios
Our experienced trainers demonstrate how attackers operate—and which protective measures really work in practice. Theory and hands-on exercises are seamlessly integrated.
Customizable for your product range
The training can be tailored to your technologies, challenges, and issues—for maximum benefit in your business context.
What you will learn during this training course
The web topics are then replaced by relevant security testing topics from firmware, hardware and system hardening, as well as content for testing proprietary protocols and interfaces.
Day 1
Introduction
- Guidelines and standards
- Threat modeling
- Definition of scope and test cases
- Preparation of the testing environment
Security testing for cryptography
- Encryption
- Hashes
- Digital signatures
- TLS
Security testing for web applications
- OWASP Top 10 and OWASP ASVS
- Testing with Burp Suite
- Other tools for web application testing
Security testing for mobile applications
- Exposed components
- Locally stored data
Day 2
Security testing for authentication
- Bypassing authentication schemes
- Brute-forcing attacks
- Directory traversal attacks
- Privilege escalation
Security testing of propriety interfaces and protocols
- Fuzzing
- Analysis and testing tools
Security testing for system hardening
- Hardening system
- Discovery tools
- Automatic vulnerability scans
- Configuration testing
Collection and processing of results
- What information is important?
- Vulnerability management
After the training, participants will:
- understand how attacks work and begin to think like an attacker.
- master the use of automated testing tools in order to efficiently cover recurring test cases.
- be able to document identified vulnerabilities in a meaningful way to simplify traceability and retesting.
What others say
Is your company or product
protected against hacker attacks?
With our penetration tests, we help you to identify vulnerabilities in your IT and OT environment and develop appropriate countermeasures.
Get to know our
trainers

Kerstin Reisinger
is an Offensive Security Certified Professional and trainer for Industrial Security. As a long-standing, experienced project manager in complex OT security projects, she supports industrial companies and energy suppliers with a great deal of technical knowledge. She likes to incorporate this experience into her classes as war stories.

Sixtus Leonhardsberger
is an OT Security Specialist with a focus on penetration testing of OT environments and embedded devices/IoT devices. In addition to his passion for technical OT security topics, he also shares his experience from consulting projects on securing networks and architectures with the training participants.





