Application-oriented training in an innovative learning environment
There is a cross-industry trend for more and more companies to rely on cloud services or migrate their own solutions to the cloud in order to benefit from their flexibility, scalability and cost efficiency. According to Gartner, global spending on public cloud services is expected to increase by 20.7% to USD 591.8 billion in 20242. As the protection of sensitive information is key for companies, issues such as cyber security and data sovereignty are particularly important in this context.
In the cyber security learning lab "Secure Cloud Computing", the Fraunhofer Institute for Experimental Software Engineering (IESE) in Kaiserslautern is pooling its expertise with Worms University of Applied Sciences in the field of "Secure Cloud Computing" in order to improve education and training and transfer research knowledge on cloud computing in a practical way.
In the seminar, we will work out a common definition for the cloud and which basic requirements (including risk analysis and cost estimation) are important for the use of cloud architectures.
You will also learn about the advantages, disadvantages and possible application scenarios of cloud architectures from various perspectives (development, security, social components) and gain an insight into possible technical implementations. The implementations include essential security measures and concepts (e.g. VPNs, encryption).
Finally, we will take a look at DevSecOps as a method for secure software development and operation in the cloud and will examine it from the perspective of those responsible and users and discuss it using specific practical examples.
This training offers you a vendor-independent introduction to the topic of the cloud, in which we deliberately want to look at the different perspectives of executives and developers together in order to get a holistic perspective and thus the best decision for or against cloud use.
Our seminars are aimed across all sectors at
from cloud solution providers. Small and medium-sized enterprises (SMEs) in particular benefit significantly from our offerings.
Our training courses (yellow) use a unique combination of cloud infrastructure (white), defense lab (blue) and attack labs (red).
In our seminars you will learn ...
Open seminars
Our basic training courses are aimed at mixed groups of participants from different companies. These seminars take place regularly online, on site at Fraunhofer IESE or at Worms University of Applied Sciences and are suitable for individuals or small teams.
In-house seminars
These seminars are ideal for groups of up to 15 employees from your company. They offer tailor-made training content that is delivered directly on site by our trainers.
Intensive training in the distributed learning lab
We offer intensive courses in small groups of up to 8 people from your company at our locations in Kaiserslautern or Worms. The focus is on practical exercises using our specialized Cloud and PenTest environments.
Hackathons
Once a year, we organize a hackathon in the style of a capture-the-flag competition (CTF) at Fraunhofer IESE, where interested cloud DevOps can network and try out their skills in practical scenarios.
Networking event
At networking events, we organize specialist presentations and demos on various topics as well as numerous opportunities for networking with management, project leaders and political players.
Worms University of Applied Sciences
Erenburgerstraße 19
67549 Worms
+49(0)6241.509-425
jens.kohler@hs-worms.de
https://www.hs-worms.de/kohler
Carrying out penetration tests for your cloud solution
Our comprehensive penetration tests identify vulnerabilities in your cloud environment. Experienced security experts simulate targeted attacks to uncover potential security gaps before they are exploited. On request, we can test in an isolated environment to avoid any impact on ongoing operations.
Evaluation of the effectiveness, efficiency and user-friendliness of your cloud security measures
We evaluate not only the technical effectiveness of your security measures, but also their user-friendliness. Together, we develop solutions that are secure, intuitive and easy to use - for consistent use by employees and customers.
Access to our laboratory environment
Use our state-of-the-art, isolated laboratory environment for your own security analyses, tests or experiments. Ideal for further developing your security strategies or for testing new technologies.