
IT Forensics for System Administrators – Part 2
IT forensics have become a vital part in handling security incidents,…

Market Research Training
Training Summary The development and provisioning of services…

School of Software Engineering SSE2021
Introduction In its core, Domain Driven Design (DDD) consists…

Local Vulnerability scanning
Join WP8 T1 team for the "Local vulnerability scanning" live…

IT Forensics for System Admins – Acquisition of Other Evidence
Join WP8 T1 team for the "IT Forensics for System Admins - Acquisition…

Penetration Tests
Join WP8 T1 team for the "Penetration Tests" live online session.…

Break and Attack Simulation – matching attacker behaviour with vulnerabilities
Join WP8 T1 team for the "Break and Attack Simulation - matching…

Responsible Disclosure – Letting the cat out of the bag
Join WP8 T1 team for the "Responsible Disclosure – Letting…

Code audits – how to improve the quality of the code
Join WP8 T1 team for the "Code audits - how to improve the quality…

IT Forensics for System Admins – Organisation
Join WP8 T1 team for the "IT Forensics for System Admins - Organisation"…

IT Forensics for System Admins – From Suspicion to Detection I
Join WP8 T1 team for the "IT Forensics for System Admins - From…

IT Forensics for System Admins – From Suspicion to Detection II
Join WP8 T1 team for the "IT Forensics for System Admins - From…