We are all connected and data is flowing around like never before. Keeping data secure and safe is a key component of every modern organisation and with ever more digital opportunities the bigger the challenge of securing an organisation becomes. That’s why the demand for security experts is ever increasing and one of the most important job profiles of the future.
In this program you will learn how to identify security risks and vulnerabilities in cybersystems. The program focuses not only on the technical aspects but also on user threats and risks. This program teaches you how to design secure systems and gives you a holistic understanding of cybersecurity.
Career Development Opportunities (Roles): CTO, Security Architect, Penetration Tester, Freelancer, IT Consultant, System Administrator
Academic Content
Modul 1: Cybersecurity Foundations
In the first module, we will talk about the fundamentals that you need to become a security expert. We will setup your workstation and learn the fundamentals of python programming. The aim of the first module is to create a common knowledge base of the tools of a pentester.
- How a server architecture is workingeur
- Linux fundamentals
- Programming fundamentals
Module 2: Web app security
In the second module we address web applications. The difficult part of these applications is the arbitrary user input in a lot of places. We will learn what a malicious hacker is capable of doing there to be able to fix errors we made in coding.
- SQL injection
- Cross site scripting
- Command injection
- Xml external entity
- Tools
Module 3: Foundations of Cryptography
The third module shall teach the important aspects of Cryptography. Without Cryptography there is no security, hence it is a powerful weapon against adversaries when used correctly. We will learn about the concepts and how to use them.
- Symmetrical and asymmetrical encryption
- Digital signatures
- Public key infrastructure
- Hashing
- Hands onto cryptography
Module 4: Networking security
Module 4 addresses the wire. A hacker with access to the data on the wire seems quite mighty, however it is a common scenario. Therefore a cybersecurity engineering needs to know the technologies that can be used to secure communication to and from servers.
- ISO osi
- TCP ip
- Key exchange
- Tls
- Ipsec and Kerberos
Module 5: Password security
The last module in this course will address the weakest element in security – the human. Since humans are bad at randomness, it is important to still secure their passwords. However, given a specific attack scenario, this might be quite hard. Here, we will cover how attackers work and what we can do to make their work as hard as possible.
- How passwords are stored
- Wordlists
- Cracking
Meet the Master:
Objetives of the program
- Understand security threats and how to defeat them
- Learn how to do security assessments and identify system vulnerabilities
- Penetrate systems and develop security strategies
- Develop security measures to protect systems

Cedric Mössner
Youtube Content Creator
Concepts, platforms and techniques in the course.
- NMAP
- SQLMAP
- HASHCAT
- HYDRA
- PYTHON
- Cryptography
- Network Management
- App Security
- Security Engineering