Information Technology

Course Offer

Information Technolog Training Program is organized and could be selected according to the provided modules. It is a training mix of theory, practice and professional excursions.

The SCI customized courses below are 2 weeks programs. If you are interested to join one of the courses, please use the corresponding registration button in the table below. Make sure to read our General Terms and Conditions before registration.

C1IT
CodeC1IT
TopicInformation Technology
SAP Training and Cyber Security
Training ProviderChappe Institute Leipzig
Time frame18.08.2019 - 31.08.2019
Capacity, Pers.8 - 12
Price / Pers.2680 € (incl. accommodation in DR by BB)

Included: group management, course fees, airport group transfer, professional excursions, Accident & Liability Insurance and accommodation in DR by BB, intercultural introduction and an international recognized certificate.

Not included: Flight Ticket, Visa cost and Health Insurance

Fair pricing is one of SCI principles.

Training Program Modules

Below you will find the detailed description of the offered Information Technology training modules.

C1IT

SAP Business Suite

SAP Business Suite is a bundle of business applications that provide

  • integration of information and processes
  • collaboration
  • industry-specific functionality
  • scalability

SAP Business Suite is based on SAP‘s technology platform called NetWeaver. Thanks to its modular structure, SAP Business Suite gives customers a wide variety of applications. SAP Business Suite not only offers end-to-end processes for all industries, but also provides industry-specific applications. These applications are based on business processes that occur regularly in certain industries. Together with partners and customers, SAP integrated value scenarios into the suite and preconfigured certain applications.

Cyber Security

  • Applied Cryptography: This topic will focus on cryptographic algorithms (symmetrical and asymmetrical), their strengths and weaknesses, implementations and choosing the correct cryptographic algorithm for a specific task.
  • Multi-Language Secure Coding: In this topic, we will focus on coding and design techniques to reduce security exposure. Special consideration will be given to buffer overflows and input sanitizing. (Coding experience in C, PHP and JavaScript is required)
  • Penetration Testing and Vulnerability Assessment: This topic will focus on planning, executing and evaluating penetration tests. The course will introduce basic concepts and will focus on hands-on work with penetration testing tools used in the real world.
  • Digital Forensics: After a short introduction to the secure-analyze-present model that’s standard in digital forensics, student will start with dead-disk forensics and its standard techniques such as file carving.
  • Incident Handling & Response: In this topic, we will focus on recognizing incidents, detecting, analyzing and mitigating attacks, as well es gathering critical information.
  • Malware Analysis/Reverse Engineering: Techniques, tools and methods for reverse engineering will be taught in this topic. Students will learn to perform static and dynamic code analysis as well as analysis of network communications.
  • Wireless Networks Security: This topic will focus on wireless security protocols, their known weaknesses and attacks, as well as general threats and risks.
  • Social Engineering: Techniques for obtaining passwords and other protected data by social manipulation will be taught in this topic. Special consideration will be given to spear phishing attacks, i.e. fake e-mails tailored to one recipient or a small group of recipients.