Become a HeroLab Professional

23. October 2018

usd Launches Student Training Program for Security Analysis & Pentests

Two student classes completed the five-day “Summer School” training program in September. The program has been specifically designed for students working at usd by experienced usd security experts. It was held at the CST Academy.

The program is based on a basic IT security training with a focus on security analysis & pentests, practical exercises and a final exam. The basic training covers the requirements for a pentest, the procedures and processes. In numerous practical exercises, the participating students also gained sound insights into professional pentesting and were familiarized with usd internal tools and processes. This training block focused on vulnerabilities at the system level, e.g. in connection with common protocols such as TLS, HTTP, SNMP, etc.

During the final exam, the students were able to prove their acquired knowledge in teams. The examination result was a final pentest report according to usd quality standards. All participants were issued a certificate attesting to successful participation in the Summer School.

The two weeks ended with a two-day joint team workshop with all students and usd pentest professionals. Lectures and best practices as well as joint practical exercises were part of the workshop.

We are excited about the newest additions to our usd HeroLab Team.

Also interesting:

3 Reasons for a Cloud Security Audit

3 Reasons for a Cloud Security Audit

Outsourcing applications and data to the cloud brings significant benefits for companies, but at the same time also new challenges for the corresponding IT departments. The technologies and processes of a cloud environment differ from those of local data centers....

usd HeroLab Top 5 Vulnerabilities 2020: SMB 1.0 & SMB Signing

usd HeroLab Top 5 Vulnerabilities 2020: SMB 1.0 & SMB Signing

During penetration tests our security analysts repeatedly uncover gateways in IT systems and applications that pose significant risks to corporate security. They increasingly identify the same vulnerabilities in different IT assets, some of which have been known for...

Categories

Categories