Training sessions

Interactive skills development

Training sessions

“People need to understand why they should do what they should do.”
Raising employee awareness and taking preventive measures.

IT security protects your own profitability and ensures a positive and sustainable image among your customers. However, deploying the latest security technologies and implementing them in existing infrastructure is not only a complex but also resource-intensive task. But what many decision-makers within the company do not pay attention to:

The greatest security problem is the human individual.

These training units teach your employees to be prepared for the challenges of IT.

Although simple safety instructions represent the central way of communicating information, they do not in any way sensitize to real dangers. They are considered to have little potential for success because people do not understand why they should do, what they should do. Kalweit ITS GmbH therefore offers you and your company only training sessions that are individually tailored to your company.

Practical relevance. Interactive. Well founded.

Raising awareness in the field of information security is a lengthy process. Our training units can provide initial impulses, sensitize competences and encourage reflection. Training sessions are individually designed.
  • Employee sensitization
  • Data protection
  • One-Day-Hacker
  • Safety in conception
  • Management, done securely
Security in high standards.

If IT is the basis of our functioning society, then it is also clear that this elementary basis and thus the flawless functioning of our society's structure must be vulnerable, because IT is so in any case. But how can an entrepreneurial alliance protect itself from such a trivial danger as the erroneous use of information technology systems?
The answer is simple: knowing and being able to assess the danger. This is the only way to be able to take preventive measures at an early stage and effectively minimize possible downtimes of your IT.

Many companies have their IT infrastructures designed and implemented from an administrator's point of view. Many companies only realize that this is not the most effective way to prevent security vulnerabilities when it is usually too late. Many security technologies are provided in a cost-intensive manner, but are administrated and managed with errors due to a lack of competence.

This training unit not only teaches you the actual approach of potential attackers, but also lets you experience it live. Not only will you be shown established attack techniques, but you will also be able to perform them live and independently.

Numerous demonstrations, interactions and independent work not only round off this training unit, but also shed light on the topic of information security from a practical perspective - making information security tangible.

As a participant in this training session, you will become a "real" hacker. Experience information security tangible.

You will learn how to classify and evaluate safety-relevant questions realistically.

Added value:
- Recognizing, identifying and classifying potential hazards.
- Practical introduction into the subject area of information security
- Live execution of established hacking methods, detailed explanation of the techniques in a comprehensible English
- Motivation for behavioral change: "People need to understand why they should do what they should do."
- Specific recommendations for action, first-hand experience reports, tips and information
Data protection is not a regulation, but a right.

Data protection is not only a question of legal regulations, but also a solid basis for trustworthy and responsible handling of customer information. It is therefore all the more important that internal data protection officers of your company have the "required specialist knowledge" (according to §4f paragraph 3 clause 1 of the German Federal Data Protection Act). This course deals with the basic elements of data protection.

- Introduction into the subject of data protection [History]
- Fundamental basics [Personal data, legal classification etc.]
- Data protection review bodies
- Data protection aspects within your company [employee control, handling of customer data, etc.]
- Data protection officer
- Impact of data protection on business processes
- Data protection concepts
- Data protection in the area of marketing as well as trends
Take a look behind the scenes.

This course provides IT executives with insight into the world of practical information security. Become part of an interactive workshop - because education is the best protection.

Create your own malware, take IT into your own hands and learn how to use Linux.

- Legal classification of cyber attacks and penetration tests
- Introduction to the fundamental building blocks of information security
- Introduction to the world of practical information security
- Typing of stereotypes
- Basic ethical values
- Introduction to "Kali Linux"
- Mindset of potential attackers
- Procedure of a penetration test
- Attacks against Windows systems
- Creation of malware (Trojan construction kit, exploits etc.)
- Port scanning and fingerprinting
- Wireless Hacking
- Attacks against portable devices
- Attacks against network structures
- Ethical classification
Security right from the start.

Digitization is increasingly becoming an integral part of everyday life and has long since become an indispensable prerequisite for technological progress and economic prosperity. At the same time, digitization is constantly posing new challenges, which especially the professionals in the software development industry - which requires digitization as a matter of course - must be made aware of.

The increasing complexity of IT, the relocation of business processes to the Internet and not least the extensive technological achievements of our society create not only technological advances but also socially relevant effects. More and more often, there are vast opportunities to manipulate information technology systems.

That's why it is all the more important to inspire prospective software developers with regard to security in conception and to make them aware of why they should do what they should do. After all, it is the programmer himself who has the power to decide on the exact conception of a software solution. Particularly because the current trend is towards user-friendly systems while safety only plays a minor role, it is a personal concern of ours to sensitize in this subject.

- Introduction to the topic of information security
- Fundamental basics
- Common security vulnerabilities
- Common mistakes in practice
- Eradicate misconceptions
- Testing bodies
- Security technologies
- Secure architecture
Security in high standards.

The company management represents the most important and highest hierarchical level of a company.
Therefore, it is therefore all the more important to point out to the management board the dangers of their own IT environment. Sensitization is an indispensable component, especially because we have been able to establish through our daily work that insufficient safety precautions prevail, especially at the management level.

Numerous demonstrations, interactions and independent work not only round off this training unit, but also shed light on the topic of information security from a practical perspective - making information security tangible.

As a participant in this training session, you will become a "real" hacker. Experience information security tangible.

You will learn how to classify and evaluate safety-relevant questions realistically.

Added value:
- Recognizing, identifying and classifying potential hazards within the scope of its field of action.
- Practical introduction to the topic of information security
- Live execution of established hacking methods and detailed explanation of the techniques in comprehensible English
- Motivation for behavioral change: "People need to understand why they should do what they should do."
- Specific recommendations for action, first-hand experience reports, tips and information
By accessing this site, you consent to the use of cookies in accordance with our Privacy Policy. Additional information