Hacker Contest with TU Darmstadt and h_da enters the next round

29. April 2021

„This semester we had more registrations for our Hacker Contest than ever before," Markus Schader, Senior Security Consultant at usd HeroLab, is pleased to say. „So my colleague Matthias Göhring and I have the opportunity to share our knowledge and experience as pentesters with many prospective IT security experts again.”

In the summer semester, our security analysts are once again offering the „Hacker Contest” course at TU Darmstadt and Hochschule Darmstadt.

In joint remote sessions, the students deal with IT security topics in a practical way. For this purpose, the usd HeroLab opens its PentestLab, which provides the technical basis for the Hacker Contest. In this controlled environment, the participants learn how to search for vulnerabilities, can try out tools and attack methods for networks and systems and apply the appropriate protective measures.

We wish the participants and our two colleagues a lot of fun and success at the Hacker Contest.

Also interesting:

DORA Countdown: One Month Left Until the Deadline

DORA Countdown: One Month Left Until the Deadline

DORA, the Digital Operational Resilience Act, will fully apply as of 17 January 2025. We have summarized everything you need to know about the EU regulation, preparation and best practices from our news blog.

Sunset of PCI DSS v4.0 on 31 December 2024: Get Ready!

Sunset of PCI DSS v4.0 on 31 December 2024: Get Ready!

PCI DSS v4.0: In March 2024, version 4.0 of the Payment Card Industry Data Security Standard became mandatory after a two-year transition phase. Just a few months later, version 4.0.1 was released as a minor update of the standard, which will become mandatory on...

Top 3 Vulnerabilities in SSO Pentests

Top 3 Vulnerabilities in SSO Pentests

During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant risks to corporate security. They increasingly encounter the same vulnerabilities. Our blog series "Top 3 Vulnerabilities" presents...

Categories

Categories