usd AG to Again Teach at TU Darmstadt

21. October 2020

During the 2020/2021 winter semester, experienced usd HeroLab security analysts will once again teach the course “Hacker Contest” at the Technical University of Darmstadt (TU Darmstadt).

In joint remote sessions students will have the opportunity to experience IT security in practice. In the secure environment of the usd PentestLab, they will try out tools, attack methods and protective measures for networks, systems and applications. The practical course includes pentest-specific topics, such as a selection of OWASP Top 10 web vulnerabilities.

Matthias Göhring, Head of usd HeroLab and Markus Schader, usd Senior Security Consultant IT Security, will host the course at TU Darmstadt. “Sharing our knowledge and experience as pentesters with students is extremely important for us. The feedback has been overwhelmingly positive, which proves that we are doing a lot of things right by teaching IT security in a practical manner”, says Göhring.

Visit the website of TU Darmstadt to learn more: https://www.cryptoplexity.informatik.tu-darmstadt.de/teaching_cryptoplexity/hacker_contest/index.de.jsp

Also interesting:

usd PCI Best Practice Workshop 2021

usd PCI Best Practice Workshop 2021

For many years, the usd PCI Best Practice Workshop has brought together responsible PCI personnel from companies of all sizes and from all industries to discuss current topics from the world of payment card industry together with PCI experts from usd. The interactive...

3 Reasons for a Cloud Security Audit

3 Reasons for a Cloud Security Audit

Outsourcing applications and data to the cloud brings significant benefits for companies, but at the same time also new challenges for the corresponding IT departments. The technologies and processes of a cloud environment differ from those of local data centers....

usd HeroLab Top 5 Vulnerabilities 2020: SMB 1.0 & SMB Signing

usd HeroLab Top 5 Vulnerabilities 2020: SMB 1.0 & SMB Signing

During penetration tests our security analysts repeatedly uncover gateways in IT systems and applications that pose significant risks to corporate security. They increasingly identify the same vulnerabilities in different IT assets, some of which have been known for...

Categories

Categories