IT-security strategies, IT-security-analysis, IT-concepts incl. IT-security, Penetration-testing, Net-tranfer security features, Hardening of OS, Intrusion detection, prevention, Firewall rules, policies, Systemmanagement, workflow checking, Hotline, user help desks, trouble tickets, Plannning and construction of high security networks, multi layer security methods
Validation, verfication, controlling of IT-systems concerning security-strategies
Web-security, content-security
Validation, verfication, controlling of IT-systems concerning security-strategies
Web-security, content-security