SEKurity GmbH

SECURITY TRAINING

Hack live.Don't read slides.

Our trainings are not mandatory compliance hours. We demonstrate live how a current attack unfolds – from initial pretext to domain admin – and translate it into concrete actions for the exact role sitting in front of us.

01 / APPROACH

Demonstration beats presentation.

When a developer watches a SQL injection turn into a shell on the database server inside forty seconds in a realistic staging environment, she understands the topic differently than after a slide full of bullet points. When a CFO sees a voice-cloning attack nearly convince his own assistant in real time, he thinks differently about approval processes. Our trainers are active pentesters – what they show on stage is what they applied in real projects over the last few months.

We work on three principles: current (examples from the last 90 days), role-specific (what do participants do with it tomorrow?), and honest (our own mistakes in projects show up too). No consulting speak, no finger-wagging. Sessions run in German or English, on-site or remote.

02 / FORMATS

From lunch break to deep dive.

60 MIN

Lunch & Learn

Compact live session on a single topic – for example current ransomware TTPs or MFA-bypass techniques. Ideal as an entry point or recurring pulse.

½ DAY

Workshop

Role-specific half-day workshop with live demos, Q&A, and a short hands-on segment. Example: social engineering for reception and office teams.

2 DAYS

Deep Dive

Intensive training with lab access. Participants solve scenarios on their own while we guide them. Example: secure development for product teams or incident response for IT ops.

03 / AUDIENCES

Content for the role, not for everyone.

  1. ROLE · 01

    Development

    OWASP Top 10 against real code examples, secure authentication, dependency hygiene, secrets handling, realistic code reviews. Stack-specific for your tooling.

  2. ROLE · 02

    Administration & IT Ops

    Active Directory hardening, credential hygiene, lateral-movement detection, logging and detection engineering. Hands-on in a prepared lab environment.

  3. ROLE · 03

    Finance & Office

    BEC, invoice fraud, CEO fraud, deepfake calls. Concrete approval processes, clear escalation paths, staying calm under pressure. Role-play instead of lecturing.

  4. ROLE · 04

    Leadership

    Executive briefing on the current threat landscape, liability questions, NIS2, the decisions that actually matter in an incident. Ninety minutes, direct, without FUD.

04 / TOPICS

Modules we deliver regularly.

  • SOCIAL ENGINEERING
  • SECURE DEVELOPMENT
  • INCIDENT REPORTING
  • AD HARDENING
  • CLOUD SECURITY
  • EXECUTIVE BRIEFING

Every module is tailored to your context before delivery – tech stack, industry, active projects, internal policies. If you need a topic not listed here, ask – most can be prepared within two or three weeks.

NEXT STEP

Training that sticks.

Tell us who will be in the room and what should happen. We propose format, duration, and content – and on request offer a short intro call with the trainer before you book.