Become a HeroLab Professional

23. October 2018

usd Launches Student Training Program for Security Analysis & Pentests

Two student classes completed the five-day “Summer School” training program in September. The program has been specifically designed for students working at usd by experienced usd security experts. It was held at the CST Academy.

The program is based on a basic IT security training with a focus on security analysis & pentests, practical exercises and a final exam. The basic training covers the requirements for a pentest, the procedures and processes. In numerous practical exercises, the participating students also gained sound insights into professional pentesting and were familiarized with usd internal tools and processes. This training block focused on vulnerabilities at the system level, e.g. in connection with common protocols such as TLS, HTTP, SNMP, etc.

During the final exam, the students were able to prove their acquired knowledge in teams. The examination result was a final pentest report according to usd quality standards. All participants were issued a certificate attesting to successful participation in the Summer School.

The two weeks ended with a two-day joint team workshop with all students and usd pentest professionals. Lectures and best practices as well as joint practical exercises were part of the workshop.

We are excited about the newest additions to our usd HeroLab Team.

Also interesting:

DORA Deep Dive: Threat-Led Penetration Testing (TLPT)

DORA Deep Dive: Threat-Led Penetration Testing (TLPT)

Since the publication of the original blog post in May 2024, the final version of the RTS for TLPT has been released. The blog post has been updated accordingly and now covers the current requirements. The Digital Operational Resilience Act (DORA) came into force on...

Red Teaming: 5 Questions Every IT Leader Wants Answered

Red Teaming: 5 Questions Every IT Leader Wants Answered

Many companies invest in firewalls, endpoint protection, and awareness training, assuming that this puts them in a strong position. But the reality is different: attackers do not think in terms of tools, but in terms of targets. They combine technical vulnerabilities...

Categories

Categories