60 MIN
Lunch & Learn
Compact live session on a single topic – for example current ransomware TTPs or MFA-bypass techniques. Ideal as an entry point or recurring pulse.
SECURITY TRAINING
Our trainings are not mandatory compliance hours. We demonstrate live how a current attack unfolds – from initial pretext to domain admin – and translate it into concrete actions for the exact role sitting in front of us.
01 / APPROACH
When a developer watches a SQL injection turn into a shell on the database server inside forty seconds in a realistic staging environment, she understands the topic differently than after a slide full of bullet points. When a CFO sees a voice-cloning attack nearly convince his own assistant in real time, he thinks differently about approval processes. Our trainers are active pentesters – what they show on stage is what they applied in real projects over the last few months.
We work on three principles: current (examples from the last 90 days), role-specific (what do participants do with it tomorrow?), and honest (our own mistakes in projects show up too). No consulting speak, no finger-wagging. Sessions run in German or English, on-site or remote.
02 / FORMATS
60 MIN
Compact live session on a single topic – for example current ransomware TTPs or MFA-bypass techniques. Ideal as an entry point or recurring pulse.
½ DAY
Role-specific half-day workshop with live demos, Q&A, and a short hands-on segment. Example: social engineering for reception and office teams.
2 DAYS
Intensive training with lab access. Participants solve scenarios on their own while we guide them. Example: secure development for product teams or incident response for IT ops.
03 / AUDIENCES
OWASP Top 10 against real code examples, secure authentication, dependency hygiene, secrets handling, realistic code reviews. Stack-specific for your tooling.
Active Directory hardening, credential hygiene, lateral-movement detection, logging and detection engineering. Hands-on in a prepared lab environment.
BEC, invoice fraud, CEO fraud, deepfake calls. Concrete approval processes, clear escalation paths, staying calm under pressure. Role-play instead of lecturing.
Executive briefing on the current threat landscape, liability questions, NIS2, the decisions that actually matter in an incident. Ninety minutes, direct, without FUD.
04 / TOPICS
Every module is tailored to your context before delivery – tech stack, industry, active projects, internal policies. If you need a topic not listed here, ask – most can be prepared within two or three weeks.
NEXT STEP
Tell us who will be in the room and what should happen. We propose format, duration, and content – and on request offer a short intro call with the trainer before you book.