Cyber security learning lab "Secure cloud computing"

Application-oriented training in an innovative learning environment

"Almost 23% of cloud security incidents are a result of cloud misconfiguration, and 27% of businesses have encountered security breaches in their public cloud infrastructure." 1

Using and operating cloud services securely

There is a cross-industry trend for more and more companies to rely on cloud services or migrate their own solutions to the cloud in order to benefit from their flexibility, scalability and cost efficiency. According to Gartner, global spending on public cloud services is expected to increase by 20.7% to USD 591.8 billion in 20242. As the protection of sensitive information is key for companies, issues such as cyber security and data sovereignty are particularly important in this context.

In the cyber security learning lab "Secure Cloud Computing", the Fraunhofer Institute for Experimental Software Engineering (IESE) in Kaiserslautern is pooling its expertise with Worms University of Applied Sciences in the field of "Secure Cloud Computing" in order to improve education and training and transfer research knowledge on cloud computing in a practical way.

Secure departure to the cloud

In the seminar, we will work out a common definition for the cloud and which basic requirements (including risk analysis and cost estimation) are important for the use of cloud architectures.

You will also learn about the advantages, disadvantages and possible application scenarios of cloud architectures from various perspectives (development, security, social components) and gain an insight into possible technical implementations. The implementations include essential security measures and concepts (e.g. VPNs, encryption).

Finally, we will take a look at DevSecOps as a method for secure software development and operation in the cloud and will examine it from the perspective of those responsible and users and discuss it using specific practical examples.

This training offers you a vendor-independent introduction to the topic of the cloud, in which we deliberately want to look at the different perspectives of executives and developers together in order to get a holistic perspective and thus the best decision for or against cloud use.

© Fraunhofer IESE

Our seminars are aimed across all sectors at

  • Cloud DevOps,
  • Cloud users and the
  • middle management

from cloud solution providers. Small and medium-sized enterprises (SMEs) in particular benefit significantly from our offerings.

Our training courses (yellow) use a unique combination of cloud infrastructure (white), defense lab (blue) and attack labs (red).

 In our seminars you will learn ...

  • assess the opportunities and risks of the transition to the cloud.
  • understand the security-related differences between traditional applications and cloud applications.
  • understand the relevance and impact of various regulations, such as NIS-2, on your company.
  • Know methods, strategies and applications that ensure the protection of cloud infrastructures and applications.
  • how to set up and configure your own cloud environment securely.
  • Optimally harmonize security and user-friendliness in the cloud.
  • Implement Kubernetes securely and efficiently in small and medium-sized enterprises (SMEs).
  • to promote a strong security awareness among your users.
  • check and strengthen the security of your cloud applications through targeted penetration tests.

Seminars

Open seminars

Our basic training courses are aimed at mixed groups of participants from different companies. These seminars take place regularly online, on site at Fraunhofer IESE or at Worms University of Applied Sciences and are suitable for individuals or small teams.

In-house seminars

These seminars are ideal for groups of up to 15 employees from your company. They offer tailor-made training content that is delivered directly on site by our trainers.

Intensive training in the distributed learning lab

We offer intensive courses in small groups of up to 8 people from your company at our locations in Kaiserslautern or Worms. The focus is on practical exercises using our specialized Cloud and PenTest environments.

Events

Hackathons

Once a year, we organize a hackathon in the style of a capture-the-flag competition (CTF) at Fraunhofer IESE, where interested cloud DevOps can network and try out their skills in practical scenarios.

Networking event

At networking events, we organize specialist presentations and demos on various topics as well as numerous opportunities for networking with management, project leaders and political players.

Jens Kohler

  • Professor for secure software and system development
  • 4 years of practical experience as a software architect in the banking sector
  • 6 years of scientific experience in the field of cloud security with 19 peer-reviewed publications related to secure cloud computing
  • PhD in the field of "Secure, distributed data structures in the cloud" 


Worms University of Applied Sciences
Erenburgerstraße 19
67549 Worms

+49(0)6241.509-425
jens.kohler@hs-worms.de
https://www.hs-worms.de/kohler

Our services and measures for cloud security

Carrying out penetration tests for your cloud solution

Our comprehensive penetration tests identify vulnerabilities in your cloud environment. Experienced security experts simulate targeted attacks to uncover potential security gaps before they are exploited. On request, we can test in an isolated environment to avoid any impact on ongoing operations.

Evaluation of the effectiveness, efficiency and user-friendliness of your cloud security measures

We evaluate not only the technical effectiveness of your security measures, but also their user-friendliness. Together, we develop solutions that are secure, intuitive and easy to use - for consistent use by employees and customers.

Access to our laboratory environment

Use our state-of-the-art, isolated laboratory environment for your own security analyses, tests or experiments. Ideal for further developing your security strategies or for testing new technologies.

 

Get in touch with us!

 

 We look forward to hearing from you and discussing your requirements in an appointment.

 

Our expertise in the field of information security at a glance.