Hackmanit IT security training courses offer you a high-quality mix of scientifically based content and practical, proven know-how. Our IT security training courses are appreciated by participants and companies from various industries, be it in the automotive industry, finance, critical infrastructures, public institutions, software development and many more.
Our Classroom and Online Training Courses as an Overview
➤ Transport Layer Security |
---|
TLS 1 – Introduction to TLS |
TLS 2 – TLS Security |
TLS 3 – Deep Dive into TLS Attacks |
➤ Web Security |
---|
WEB 1 – Secure Web Development |
WEB 2 – Web Service Security |
➤ More IT Security Training Courses |
---|
ITS 1 – Customized Introduction Training – Wide variety of Topics |
➤ Fixed Online Training Dates 2024 – Perfect for Individual Participants >> |
We are not only experts in our fields, but also dedicated and enthusiastic mentors who pass on their knowledge and expertise to train other specialists. Our premium IT security training courses are designed to develop you into an indispensable security expert in your field. Take the opportunity to specialize with us.
- Choose between training courses in German or English.
- Benefit from the flexibility of arranging individual appointments from as few as 5 participants.
- Whether online team training or classroom training, we adapt to your requirements and wishes.
For individual participants, we offer a selection of fixed annual dates ➤ Online Training Dates 2024
Do you have questions about our training courses?
For a non-binding and professional consultation, please contact Dr. Christian Mainka, your contact person for our IT security training courses – christian.mainka@hackmanit.de
Become familiar with the two single sign-on standards OAuth and OpenID Connect and learn what opportunities the two methods offer you to improve the login of your application.
Understand the complexity of single sign-on standards and potential threats when using OAuth and OpenID Connect to log in. Interactive exercises will help you understand serious attacks and appropriate countermeasures to optimally secure your own SSO implementations.
Master the design and implementation of your complex Identity and Access Management (IAM) scenarios thanks to this interactive training. Learn which standards from the OAuth and OpenID Connect universe will help you. Realize secure, future-oriented and interoperable solutions.
The use of the widely used single sign-on procedure SAML allows to simplify the login of your application. In this training course, you will learn how to optimize your implementation and prevent attacks which allow hackers to gain access to confidential data.
Learn to configure and analyze your existing TLS servers. The goal of this training is to enable you to securely and efficiently encrypt your application’s communication using TLS.
Learn to analyze your existing TLS implementations (e.g., web, mail, or VPN) and understand current attacks on TLS. The goal of this training is to enable you to securely and efficiently encrypt your application's communication using TLS.
Successful attacks that target TLS can have severe impacts on the confidentiality and integrity of the protected data. This training provides you with in-depth analyses of complex attacks and enables you to secure your critical TLS implementations properly.
Using real-life examples, you will learn about critical topics such as SQL injections, remote file inclusion and cross-site scripting. The goal of this comprehensive seminar is to enable you to understand and evaluate common attacks and to perform small audits on your own. This will allow you to secure your web application for the future.
During this training, you will learn which risks your web services are exposed to and how you can prevent attackers from extracting and decrypting confidential data. Complex XML standards offer hackers a large attack surface if they are incorrectly configured and can lead to serious attacks.
In this interactive online training course, you will gain the necessary knowledge for the correct use of security technologies in your area of application. Learn about relevant attacks and security best practices and protect your web application from hackers.