usd AG to Again Teach at TU Darmstadt

21. October 2020

During the 2020/2021 winter semester, experienced usd HeroLab security analysts will once again teach the course “Hacker Contest” at the Technical University of Darmstadt (TU Darmstadt).

In joint remote sessions students will have the opportunity to experience IT security in practice. In the secure environment of the usd PentestLab, they will try out tools, attack methods and protective measures for networks, systems and applications. The practical course includes pentest-specific topics, such as a selection of OWASP Top 10 web vulnerabilities.

Matthias Göhring, Head of usd HeroLab and Markus Schader, usd Senior Security Consultant IT Security, will host the course at TU Darmstadt. “Sharing our knowledge and experience as pentesters with students is extremely important for us. The feedback has been overwhelmingly positive, which proves that we are doing a lot of things right by teaching IT security in a practical manner”, says Göhring.

Visit the website of TU Darmstadt to learn more: https://www.cryptoplexity.informatik.tu-darmstadt.de/teaching_cryptoplexity/hacker_contest/index.de.jsp

Also interesting:

DORA Countdown: One Month Left Until the Deadline

DORA Countdown: One Month Left Until the Deadline

DORA, the Digital Operational Resilience Act, will fully apply as of 17 January 2025. We have summarized everything you need to know about the EU regulation, preparation and best practices from our news blog.

Sunset of PCI DSS v4.0 on 31 December 2024: Get Ready!

Sunset of PCI DSS v4.0 on 31 December 2024: Get Ready!

PCI DSS v4.0: In March 2024, version 4.0 of the Payment Card Industry Data Security Standard became mandatory after a two-year transition phase. Just a few months later, version 4.0.1 was released as a minor update of the standard, which will become mandatory on...

Top 3 Vulnerabilities in SSO Pentests

Top 3 Vulnerabilities in SSO Pentests

During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant risks to corporate security. They increasingly encounter the same vulnerabilities. Our blog series "Top 3 Vulnerabilities" presents...

Categories

Categories