Methodology

Penetrationstests
External and internal penetration tests and a review of the Active Directory environment

Red teaming
Realistic hacking attacks to test your organisation's defence capabilities

Phishing campaigns
How well do your employees react to phishing attacks

Presentations
Presentations on IT security and hacking to raise awareness among managers and employees
How does a cooperation look like?
Get to know my expertise in person in a virtual consultation
1. Consulting
We look at your situation and clarify which measures make sense for you
2. Planning
We plan the implementation and organization
3. Execution
OSINT, execution of attacks, documentation
4. Presentation
Results are presented and discussed


