From penetration testing and cloud security to practical hacking courses: Here you will find concentrated security know-how for every perspective.
Register once, benefit multiple times.
(After requesting your first document, you will have free access to all further resources.)
This practical checklist shows how to identify misconfigurations in Microsoft Entra ID and specifically minimize security risks.
With clear checklists and practical examples, it helps you analyze your cloud environment yourself, check permissions, and immediately implement hardening measures. A direct entry point to greater cloud security expertise.
Do you want to know what to expect from a red teaming session or check whether the methodology fits your requirements?
The sample report illustrates the complete assessment process: from attack path and kill chain analysis to recommendations for action and presentation of results. This gives you a realistic impression of the scope, depth, and added value of a professional red team report.
IT admins who want to efficiently process findings from a penetration test can see here how this works in practice.
The video shows how the Action Plan helps to prioritize weaknesses, define responsibilities, and implement measures in a targeted manner.
This will teach you how to process security findings in a structured manner, without any loss of information, extra work, or chaos in your daily routine.
The whitepaper shows how financial companies should deal with the DORA regulation and how classic penetration testing and TLPT differ in terms of objective, methodology and documentation.
You will learn how to align your cyber resilience program to meet regulatory requirements while simultaneously creating real added value.
How a company successfully implemented ISO/IEC 27001 certification with the support of ProSec: from the first audit to ongoing ISMS operation.
The case study shows which steps are truly crucial, which mistakes you can avoid, and how you can plan and prioritize your own project more effectively.
From the initial overview to the audit: this document guides you step by step through the process of building an effective Information Security Management System (ISMS).
With clear examples, tips from project experience and recommendations for action, it helps you to establish information security sustainably in your company.
What does getting started with ethical hacking really look like?
This brochure explains how the course will guide you step by step through practical attack scenarios – with realistic hacking labs, direct application instead of dry theory, and personal mentoring by experienced penetration testers.
An overview of content, course structure and prerequisites.
The brochure explains the structure and focus of the course – from Advanced Exploitation to Post-Exploitation and Reporting – and shows how practical labs, complex attack scenarios and personal mentoring are part of the teaching format.
This will give you a clear impression of how the course systematically leads you to becoming a professional penetration tester and enables measurable progress.
Learning in a real attack scenario:
The brochure shows you how to configure firewalls, detect attacks and secure networks in interactive labs – step by step, practically and accompanied by experienced security engineers.
The course format combines theory, simulation and mentoring into a realistic, professional-level defense training.
Deepen your practical and security-focused knowledge of Linux.
The brochure shows how the intensive seminar will prepare you in highly realistic labs: from SSH security to DNS and server hardening to automation with Docker and Ansible.
All accompanied by experienced professionals.
Gain insight into the virtual hacking lab included in the course Junior Penetration Tester is used.
The video provides a concise overview of the lab structure and shows how training at ProSec works: try it out, fail, understand it, and repeat until you get it right.
This is what real learning-by-doing feels like.
We use cookies, and Google reCAPTCHA, which loads Google Fonts and communicates with Google servers. By continuing to use our website, you agree to the use of cookies and our privacy policy.