
How does recon work in cybercrime?
How does detection work in cybercrime and how can we defend against it? Before a cyber attack, hackers often spend weeks gathering information about their target. This hidden, preparatory

How does detection work in cybercrime and how can we defend against it? Before a cyber attack, hackers often spend weeks gathering information about their target. This hidden, preparatory

Extortionist viruses in the digital world: what is ransomware and how to defend against it? Ransomware is one of the most dangerous forms of cybercrime. One wrong click or missed update

The meaning of cyber attack: what types are there and how can we defend against them? As digitalisation evolves, the threats in cyberspace are becoming more sophisticated and targeted. The sophistication and sophistication of cyber-attacks are becoming more sophisticated and sophisticated.

The meaning of social engineering in the world of cyber attacks In the world of cyber security, the focus is often on technical protection: firewalls, antivirus, encryption and strong passwords. But there are

Scrum Guide Expansion Pack: why is it essential literature for organisations? The Scrum Guide Expansion Pack is not just a new document, it is a niche, free resource,

White hat hackers: who are the mysterious white hats? With the rapid evolution of the digital world, the issue of information security is becoming increasingly important. Although the word "hacker"

Managing emotions differently in coaching: "Leading with heart" as a solution-focused brief coach This article was written by: Enikő Tegyi I start with a provocative quote from Pilinszky, Peter Popper, the helper

Grey-box testing step-by-step: techniques, tools, benefits Software testing is not just about debugging, it's also about getting to know the system inside and out

Black-box testing: simulating external attacks in practice In security testing, it is essential to evaluate a system from multiple perspectives. One of the most common and most realistic ways to assess a system is to assess its performance from several different angles.

All about the pentest: the penetration test process and benefits With the rapid advances in digitalisation, cybersecurity threats are becoming increasingly sophisticated. A single vulnerability is all it takes,

OWASP Top 10: The biggest cybersecurity risks and their solutions As the digital world continues to evolve, online services have become part of our everyday lives, but so have cyber threats

How do ethical hackers support cybersecurity? With the rapid evolution of the digital world, information security is becoming an increasingly important issue. Every day hackers try to
To provide you with the best user experience, we and our partners use technologies such as cookies to store and/or access device information. We do this to improve your browsing experience and to display (non) personalised ads. Consenting to these technologies allows us to process data such as browsing behaviour or unique identifiers on this website. Refusal or withdrawal of consent may adversely affect certain features and services.
Click on the button below to agree to the above or to make more detailed decisions. Your choice only applies to this page. You can change your preferences at any time, including withdrawing your consent, by using the switches in the cookie policy or by clicking on the Manage consent button at the bottom of the screen.

Our office will be closed from 22 December 2025 to 5 January 2026, so during this period, confirmation of training applications and responses to enquiries may take longer than usual. Thank you for your understanding!