{"id":2153,"date":"2022-03-05T00:28:54","date_gmt":"2022-03-04T23:28:54","guid":{"rendered":"https:\/\/kalweit-its.de\/services\/seminars\/"},"modified":"2023-02-24T13:09:28","modified_gmt":"2023-02-24T12:09:28","slug":"seminars","status":"publish","type":"page","link":"https:\/\/kalweit-its.de\/en\/services\/seminars\/","title":{"rendered":"Seminars"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px|||||” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding=”||10px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/image-25.jpg” title_text=”image (25)” _builder_version=”4.16″ _module_preset=”5556ca2a-c406-479f-b7c7-1a37901659d5″ global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px|||||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_font=”|||on|||||” global_colors_info=”{}”]<\/p>\n

Seminars<\/h1>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

Websecurity Workshop<\/h2>\n

[\/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” max_width=”480px” global_colors_info=”{}”]<\/p>\n

We would be happy to support you with a workshop on specific topics in the area of IT security. Our workshops are individually tailored to your company’s needs and are aimed at IT experts, IT security experts and IT and IT security managers .<\/p>\n

Below you will find an exemplary agenda for a web security workshop.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n\n\n\n\n\n\n
Day 1<\/th>\n\n
    \n
  • Introduction to the topic<\/li>\n
  • IT and information security – information on the DSGVO<\/li>\n
  • Technical and organizational security – protocols on the web (HTTP, WebSocket)<\/li>\n
  • Principles on the Web (DOM, SOP)<\/li>\n
  • Coding principles<\/li>\n
  • Session attacks (man-in-the-middle, cookie replay attacks)<\/li>\n
  • Session Hijacking & Session Fixation<\/li>\n
  • Cross Site Request Forgery (CSRF)<\/li>\n
  • Protective measures (encryption, session IDs, CSRF tokens)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n
Day 2<\/th>\n\n
    \n
  • Cross Site Scripting (XSS)<\/li>\n
  • Persistent XSS, reflexive XSS, DOM-based XSS, flash-based XSS<\/li>\n
  • uXSS, social-engineered XSS, self-XSS<\/li>\n
  • Protective measures (filter, XSS filter in browser, http-only flag, content security policy)<\/li>\n
  • Injection errors such as SQL, OS and LDAP injection \/ SMTP header injection \/ HTTP header injection<\/li>\n
  • Backup of downstream database systems<\/li>\n
  • Local File Inclusion (LFI) \/ Remote File Inclusion (RFI) \/ Path Traversal \/ Nullbyte Injection<\/li>\n
  • XML External Entities (XXE)<\/li>\n
  • File Inclusions Safeguards<\/li>\n
  • Broken Access Control<\/li>\n
  • Insecure Deserialization<\/li>\n
  • UI Redressing \/ Clickjacking<\/li>\n
  • Cursor hacking<\/li>\n
  • Advanced UI redressing attacks<\/li>\n
  • Protective measures (X-Frame-Options (XFO), Framebusting, Content-Security-Policy)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n
Day 3<\/th>\n\n
    \n
  • Code Audits – .NET Security Code Scan – Security of Authentication Mechanisms<\/li>\n
  • Dictionary attacks \/ brute force method \/ unsafe comparisons – Rainbow Tables \/ password cracking<\/li>\n
  • Protection measures: Password hashing, password policies, rate limits<\/li>\n
  • Kerberos authentications<\/li>\n
  • Kerberos authentication security<\/li>\n
  • Certificate infrastructure<\/li>\n
  • Certificate authentication security<\/li>\n
  • Information Pricing (Sensitive Data Exposure)<\/li>\n
  • Default values \/ publicly available information<\/li>\n
  • Misconfigurations (directory listing, error messages, referrer leak)<\/li>\n
  • “Hidden subdomains” \/ unchecked redirects and forwardings<\/li>\n
  • Using Components with Known Vulnerabilities<\/li>\n
  • Race Conditions<\/li>\n
  • Attacks against business logic<\/li>\n
  • DNS attacks<\/li>\n
  • Subdomain Hijacking<\/li>\n
  • Typosquatting<\/li>\n
  • Vulnerability identification tools<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n
Day 4<\/th>\n\n