{"id":39615,"date":"2024-07-04T09:38:22","date_gmt":"2024-07-04T07:38:22","guid":{"rendered":"https:\/\/www.itech-progress.com\/isaqb-advanced-level\/isaqb-websec\/"},"modified":"2026-05-05T15:38:31","modified_gmt":"2026-05-05T13:38:31","slug":"isaqb-websec","status":"publish","type":"page","link":"https:\/\/www.itech-progress.com\/en\/isaqb-advanced-level\/isaqb-websec\/","title":{"rendered":"iSAQB WEBSEC"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_header title=&#8221;iSAQB CPSA Advanced Level Modul WEBSEC&#8221; subhead=&#8221;Hacker think in vulnerabilities \u2013 architects think in security.&#8221; _builder_version=&#8221;4.27.6&#8243; title_font=&#8221;|700|||||||&#8221; title_line_height=&#8221;2em&#8221; content_quote_border_color=&#8221;#444444&#8243; subhead_font=&#8221;|700|||||||&#8221; subhead_text_align=&#8221;left&#8221; subhead_font_size=&#8221;28px&#8221; content_quote_font=&#8221;|600|||||||&#8221; content_quote_text_color=&#8221;#444444&#8243; content_quote_font_size=&#8221;22px&#8221; content_quote_line_height=&#8221;0.9em&#8221; background_enable_color=&#8221;off&#8221; background_color_gradient_stops=&#8221;rgba(250,135,13,0.83) 0%|#f98100 100%&#8221; background_image=&#8221;https:\/\/www.itech-progress.com\/wp-content\/uploads\/2024\/07\/network-3472956_1920.jpg&#8221; parallax=&#8221;on&#8221; custom_padding=&#8221;100px||100px||true|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;60px||40px||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; hover_enabled=&#8221;0&#8243; title_font_size_tablet=&#8221;35px&#8221; title_font_size_phone=&#8221;35px&#8221; title_font_size_last_edited=&#8221;on|desktop&#8221; title_line_height_tablet=&#8221;1em&#8221; title_line_height_phone=&#8221;1em&#8221; title_line_height_last_edited=&#8221;on|phone&#8221; subhead_font_size_tablet=&#8221;21px&#8221; subhead_font_size_phone=&#8221;21px&#8221; subhead_font_size_last_edited=&#8221;on|tablet&#8221; subhead_line_height_tablet=&#8221;&#8221; subhead_line_height_phone=&#8221;1em&#8221; subhead_line_height_last_edited=&#8221;on|desktop&#8221; content_quote_font_size_tablet=&#8221;18px&#8221; content_quote_font_size_phone=&#8221;18px&#8221; content_quote_font_size_last_edited=&#8221;on|desktop&#8221; content_quote_line_height_tablet=&#8221;&#8221; content_quote_line_height_phone=&#8221;1em&#8221; content_quote_line_height_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221; title_font_size=&#8221;40px&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><strong>Format: Face-to-Face and Online Training<\/strong><br \/><strong>Duration: 3 days<\/strong><\/p>\n<p>[\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; disabled_on=&#8221;off|off|on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;#Termine_WEBSEC_EN&#8221; button_text=&#8221;Directly to the dates&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;22px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#fa870d&#8221; button_border_width=&#8221;0px&#8221; button_letter_spacing=&#8221;0px&#8221; button_font=&#8221;|600|||||||&#8221; button_icon=&#8221;&#xf073;||fa||400&#8243; button_icon_color=&#8221;#ffffff&#8221; button_icon_placement=&#8221;left&#8221; button_on_hover=&#8221;off&#8221; custom_margin=&#8221;-4px||9px||false|false&#8221; custom_padding=&#8221;4px|20px|4px|40px|false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_bg_color__hover=&#8221;#fa870d&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#f3f3f3&#8243; background_enable_image=&#8221;off&#8221; parallax=&#8221;on&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text module_id=&#8221;Termine_CPSA-F_DE&#8221; _builder_version=&#8221;4.27.4&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#fa870d&#8221; text_font_size=&#8221;29px&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#fa870d&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_text_color=&#8221;#fa870d&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||||false|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Recognize dangers and counter them effectively![\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; text_line_height=&#8221;1.5em&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_text_color=&#8221;#fa870d&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;16px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;21px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span>Web security is a fundamental pillar for protecting sensitive data and ensuring the stability of digital systems. In an increasingly connected world, cybercriminals specifically target vulnerabilities in web applications and services to compromise systems, disrupt services, or steal confidential information. Inadequate security measures can have severe consequences, ranging from financial losses and legal repercussions to a significant loss of trust from customers and partners.<\/span><\/p>\n<p style=\"text-align: justify;\"><span>Modern attack techniques are constantly evolving, requiring companies to continuously adapt their security strategies and regularly assess their web applications for vulnerabilities. Effective security measures, such as secure authentication and authorization concepts, encryption, firewalls, and proactive vulnerability analysis, are essential to minimize risks and enhance system resilience. Only by consistently integrating security principles into architecture and development can sustainable protection mechanisms be established.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;Termine_CPSA-F_DE&#8221; _builder_version=&#8221;4.27.4&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#fa870d&#8221; text_font_size=&#8221;29px&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#fa870d&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_text_color=&#8221;#fa870d&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||||false|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>What can you expect?<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; text_line_height=&#8221;1.5em&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_text_color=&#8221;#fa870d&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;16px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;21px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span>The iSAQB-certified training on web security provides essential knowledge and skills to effectively protect web applications from cyberattacks. In addition to the fundamentals of web security, the focus is on implementing robust protection mechanisms, analyzing and mitigating vulnerabilities, and applying strong authentication and authorization procedures. The training demonstrates how firewalls and encryption techniques can be effectively utilized, attack points identified early, and security measures seamlessly integrated into existing systems \u2013 ensuring maximum protection and resilience.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;Termine_CPSA-F_DE&#8221; _builder_version=&#8221;4.27.4&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#fa870d&#8221; text_font_size=&#8221;29px&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#fa870d&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_text_color=&#8221;#fa870d&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||||false|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Participant Requirements<\/p>\n<p>[\/et_pb_text][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>You should have an understanding of HTML, CSS, and JavaScript.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Basic knowledge of protocols and data transmission is required.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>You should have experience in developing or contributing to web applications.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>A fundamental understanding of IT security is helpful.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>You should be open to new security concepts and best practices.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Practical experience with software or system architecture is an advantage.<\/p>\n<p>[\/et_pb_blurb][et_pb_text module_id=&#8221;Termine_CPSA-F_DE&#8221; _builder_version=&#8221;4.27.4&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#fa870d&#8221; text_font_size=&#8221;29px&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#fa870d&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_text_color=&#8221;#fa870d&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||||false|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Technical Requirements<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; text_line_height=&#8221;1.5em&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_text_color=&#8221;#fa870d&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;16px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;21px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span>There are no specific requirements for the training environment, as the exercises are conducted using cloud- and web-based tools like Miro, Draw.io, and platforms such as Jupyter or HuggingFace. Only a stable and sufficiently fast internet connection is required.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;Termine_CPSA-F_DE&#8221; _builder_version=&#8221;4.27.4&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#fa870d&#8221; text_font_size=&#8221;29px&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#fa870d&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_text_color=&#8221;#fa870d&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||||false|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Your Added Value<\/p>\n<p>[\/et_pb_text][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>You will identify risks, threat models, and security gaps early.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>You will develop applications according to security-by-design principles.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>You will understand common attack vectors and implement protection measures.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>You will securely apply encryption, hashing, and trust models.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>You will secure systems with firewalls, IDS, and secure protocols.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>You will directly apply learned security concepts in development.<\/p>\n<p>[\/et_pb_blurb][et_pb_text module_id=&#8221;Termine_CPSA-F_DE&#8221; _builder_version=&#8221;4.27.4&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#fa870d&#8221; text_font_size=&#8221;29px&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#fa870d&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_text_color=&#8221;#fa870d&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||||false|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Training Content in Detail<\/p>\n<p> [\/et_pb_text][et_pb_blurb title=&#8221;Basics of Web Security&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe03c;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; header_level=&#8221;h3&#8243; header_text_color=&#8221;#FA870D&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;2em&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;||0px|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>\u27a4 Protection goals such as confidentiality, integrity, and availability.<br \/>\u27a4 Threat analysis and risk management.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Firewalls and Encryption&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe03c;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; title_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.27.5&#8243; header_level=&#8221;h3&#8243; header_text_color=&#8221;#FA870D&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;2em&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;||0px|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>\u27a4 Use of packet filters, Web Application Firewalls, and Intrusion Detection Systems.<br \/>\u27a4 Utilization of symmetric and asymmetric encryption methods.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Vulnerability Analysis&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe03c;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; title_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.27.5&#8243; header_level=&#8221;h3&#8243; header_text_color=&#8221;#FA870D&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;2em&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;||0px|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>\u27a4 Identifying security gaps through penetration testing and fuzzing.<br \/>\u27a4 Use of tools for automated security analysis.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Authentication and Authorization&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe03c;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; title_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.27.5&#8243; header_level=&#8221;h3&#8243; header_text_color=&#8221;#FA870D&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;2em&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;||0px|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>\u27a4 Concepts such as multi-factor authentication and single sign-on.<br \/>\u27a4 Implementation of OAuth, OpenID Connect, and SAML.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Security Policies and Standards&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe03c;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; title_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.27.5&#8243; header_level=&#8221;h3&#8243; header_text_color=&#8221;#FA870D&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;2em&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;||0px|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>\u27a4 Introduction to ISO 27000, OWASP, BSI Basic Protection, and PCI-DSS.<br \/>\u27a4 Creation and implementation of secure development guidelines.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Data Protection and GDPR-Compliant Development&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe03c;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; title_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.27.5&#8243; header_level=&#8221;h3&#8243; header_text_color=&#8221;#FA870D&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;2em&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;||0px|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>\u27a4 Protection of personal data and legal storage.<br \/>\u27a4 Measures to comply with GDPR requirements.<\/p>\n<p>[\/et_pb_blurb][et_pb_text module_id=&#8221;Termine_CPSA-F_DE&#8221; _builder_version=&#8221;4.27.4&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#fa870d&#8221; text_font_size=&#8221;29px&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#fa870d&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_text_color=&#8221;#fa870d&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||||false|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Your Benefits at a Glance<\/p>\n<p>[\/et_pb_text][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>\u00a0In-depth web security: Recognize and effectively minimize security risks.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Practical methods: Directly apply proven security concepts.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Recognized certification: Demonstrate expertise and enhance career opportunities.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text module_id=&#8221;Termine_WEBSEC_DE&#8221; _builder_version=&#8221;4.27.4&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#fa870d&#8221; text_font_size=&#8221;29px&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#fa870d&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_text_color=&#8221;#fa870d&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||||false|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Open dates and registration<\/p>\n<p>[\/et_pb_text][et_pb_shop type=&#8221;product_category&#8221; include_categories=&#8221;737&#8243; columns_number=&#8221;1&#8243; show_image=&#8221;off&#8221; show_rating=&#8221;off&#8221; module_id=&#8221;test_produkt_ro&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; title_font=&#8221;||||||||&#8221; title_text_align=&#8221;center&#8221; title_line_height=&#8221;1.3em&#8221; price_text_align=&#8221;center&#8221; price_text_color=&#8221;#5e5e5e&#8221; price_font_size=&#8221;18px&#8221; custom_margin=&#8221;29px|||36px|false|false&#8221; custom_margin_tablet=&#8221;|||0px|false|false&#8221; custom_margin_phone=&#8221;|||0px|false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;16px|||||&#8221; animation_style=&#8221;fade&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_shop][et_pb_text _builder_version=&#8221;4.16&#8243; text_font_size=&#8221;15px&#8221; custom_margin=&#8221;|||40px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>*Plus VAT, less discounts where applicable. Discounts are automatically deducted in the shopping cart. Please enter the number of participants in the shopping cart.<\/p>\n<p>[\/et_pb_text][et_pb_blurb title=&#8221;-150\u20ac&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe0e1;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; image_icon_background_color=&#8221;rgba(255,255,255,0.75)&#8221; image_icon_width=&#8221;30px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#444444&#8243; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.5em&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.3em&#8221; image_icon_custom_padding=&#8221;25px|25px|25px|25px|false|false&#8221; text_orientation=&#8221;center&#8221; custom_padding=&#8221;|30px||30px|false|true&#8221; border_radii_image=&#8221;on|100%|100%|100%|100%&#8221; icon_font_size=&#8221;30px&#8221; use_circle=&#8221;on&#8221; circle_color=&#8221;rgba(255,255,255,0.75)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; image_icon_background_color__sticky_enabled=&#8221;#86cbed&#8221; image_icon_background_color__sticky=&#8221;#86cbed&#8221;]<\/p>\n<p>up to 6 weeks before the start of training.<\/p>\n<p>[\/et_pb_blurb][et_pb_text _builder_version=&#8221;4.27.4&#8243; text_font_size=&#8221;15px&#8221; custom_margin=&#8221;|||40px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\"><span style=\"color: #fa870d;\">Time and place don&#8217;t fit?<\/span><\/h2>\n<p style=\"text-align: center;\">We would be happy to organize an online training course for your team or come directly to your company!<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=&#8221;+49 621 595702 41&#8243; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.2&#8243; custom_button=&#8221;on&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#fa870d&#8221; button_border_width=&#8221;0px&#8221; button_letter_spacing=&#8221;0px&#8221; button_font=&#8221;|600|||||||&#8221; button_icon=&#8221;&#xe090;||divi||400&#8243; button_icon_color=&#8221;#ffffff&#8221; button_icon_placement=&#8221;left&#8221; button_on_hover=&#8221;off&#8221; custom_margin=&#8221;||15px||false|false&#8221; custom_padding=&#8221;4px|31px|4px|51px|false|false&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_bg_color__hover=&#8221;#fa870d&#8221;][\/et_pb_button][et_pb_button button_url=&#8221;https:\/\/www.itech-progress.com\/en\/portfolio-item\/in-house\/&#8221; button_text=&#8221;Write a request&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; custom_button=&#8221;on&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#fa870d&#8221; button_border_width=&#8221;0px&#8221; button_letter_spacing=&#8221;0px&#8221; button_font=&#8221;|600|||||||&#8221; button_icon=&#8221;&#x68;||divi||400&#8243; button_icon_color=&#8221;#ffffff&#8221; button_icon_placement=&#8221;left&#8221; button_on_hover=&#8221;off&#8221; custom_margin=&#8221;-4px||36px||false|false&#8221; custom_padding=&#8221;4px|20px|4px|40px|false|false&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_bg_color__hover=&#8221;#fa870d&#8221;][\/et_pb_button][et_pb_cta title=&#8221;Curriculum&#8221; button_url=&#8221;https:\/\/public.isaqb.org\/curriculum-websec\/curriculum-websec-en.pdf&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Download&#8221; _builder_version=&#8221;4.27.4&#8243; header_font=&#8221;|600|||||||&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.8em&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.itech-progress.com\/wp-content\/uploads\/2020\/08\/AGILA_heller.jpg&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#fa870d&#8221; button_bg_color=&#8221;#ffffff&#8221; button_border_width=&#8221;0px&#8221; button_font=&#8221;|600|||||||&#8221; button_use_icon=&#8221;off&#8221; button_custom_margin=&#8221;15px||||false|false&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;40px||40px||true|false&#8221; header_font_size_tablet=&#8221;&#8221; header_font_size_phone=&#8221;22px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; body_font_size_tablet=&#8221;&#8221; body_font_size_phone=&#8221;16px&#8221; body_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_text_color__hover_enabled=&#8221;on|hover&#8221; button_text_color__hover=&#8221;#ffffff&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#86cbed&#8221; button_bg_enable_color__hover=&#8221;on&#8221;]<\/p>\n<p>You can find out more about the learning objectives and training content in the iSAQB syllabus<\/p>\n<p>[\/et_pb_cta][et_pb_slider _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_slide heading=&#8221;Our Trainers&#8221; button_link=&#8221;https:\/\/www.itech-progress.com\/en\/our-trainers\/#websec&#8221; use_bg_overlay=&#8221;off&#8221; use_text_overlay=&#8221;off&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h3&#8243; header_font=&#8221;|600|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;38px&#8221; background_enable_color=&#8221;off&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;rgba(250,135,13,0.5) 0%|rgba(250,135,13,0.73) 100%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_image=&#8221;https:\/\/www.itech-progress.com\/wp-content\/uploads\/2022\/08\/Vortag-3-scaled.jpg&#8221; background_enable_image=&#8221;on&#8221; background_position=&#8221;top_left&#8221; custom_button=&#8221;on&#8221; button_alignment=&#8221;left&#8221; width=&#8221;100%&#8221; link_option_url=&#8221;https:\/\/www.itech-progress.com\/en\/our-trainers\/#websec&#8221; hover_enabled=&#8221;0&#8243; border_radii_image=&#8221;on|NaNpx|NaNpx|NaNpx|NaNpx&#8221; box_shadow_style_image=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221; sticky_transition=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_slide][\/et_pb_slider][et_pb_text _builder_version=&#8221;4.27.4&#8243; header_2_font=&#8221;|600|||||||&#8221; header_2_text_color=&#8221;#fa870d&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Credit Points for CPSA-A Certification<\/h2>\n<div style=\"text-align: justify;\">\n    With the WEBSEC training, participants earn 20 technical and 10 methodological credit points according to the iSAQB Advanced Level program.\n<\/div>\n<p>[\/et_pb_text][et_pb_circle_counter title=&#8221;Technical competence&#8221; number=&#8221;20&#8243; percent_sign=&#8221;off&#8221; bar_bg_color=&#8221;#fa870d&#8221; _builder_version=&#8221;4.25.1&#8243; title_level=&#8221;h4&#8243; title_text_color=&#8221;#4c4c4c&#8221; title_font_size=&#8221;20px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_circle_counter][et_pb_circle_counter title=&#8221;Methodical competence&#8221; number=&#8221;10&#8243; percent_sign=&#8221;off&#8221; bar_bg_color=&#8221;#fa870d&#8221; _builder_version=&#8221;4.25.1&#8243; title_level=&#8221;h4&#8243; title_text_color=&#8221;#4c4c4c&#8221; title_font_size=&#8221;20px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_circle_counter][et_pb_text module_id=&#8221;Termine_CPSA-F_DE&#8221; _builder_version=&#8221;4.27.6&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#fa870d&#8221; text_font_size=&#8221;29px&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#fa870d&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_text_color=&#8221;#fa870d&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||||false|true&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]Face-to-face training[\/et_pb_text][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Includes training materials and exercise resources<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Cold and hot drinks, snacks, and lunch on all training days<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Modern and spacious training rooms for a pleasant learning atmosphere<\/p>\n<p>[\/et_pb_blurb][et_pb_text module_id=&#8221;Termine_CPSA-F_DE&#8221; _builder_version=&#8221;4.27.6&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#fa870d&#8221; text_font_size=&#8221;29px&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#fa870d&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_text_color=&#8221;#fa870d&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||||false|true&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]Live-Online-Training[\/et_pb_text][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Includes training materials and exercise resources<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Visual collaboration through, for example, whiteboarding<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>High level of interactivity through tailored exercises and breakout rooms<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x45;||divi||400&#8243; icon_color=&#8221;#fa870d&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;640px&#8221; _builder_version=&#8221;4.27.5&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Ideal trainer support, even in the breakout rooms<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; custom_margin=&#8221;10px|auto||auto|false|false&#8221; custom_padding=&#8221;||5px|||&#8221; animation_style=&#8221;fade&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#ffffff&#8221; custom_padding=&#8221;50px|50px|50px|50px|true|true&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;|20px||20px||true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;10px&#8221; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(10,45,97,0.1)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text module_id=&#8221;Termine_CPSA-F_DE&#8221; _builder_version=&#8221;4.27.4&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#fa870d&#8221; text_font_size=&#8221;29px&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#fa870d&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_text_color=&#8221;#fa870d&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||||false|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Feedback from the Training<\/p>\n<p>[\/et_pb_text][et_pb_blurb alt=&#8221;cpsa-f training&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;80px&#8221; image_icon_width_tablet=&#8221;80px&#8221; image_icon_width_phone=&#8221;60px&#8221; image_icon_width_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.27.5&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;||||||||&#8221; body_font_size=&#8221;16px&#8221; text_orientation=&#8221;center&#8221; custom_padding=&#8221;|||3px||&#8221; border_radii_image=&#8221;on|10px|10px|10px|10px&#8221; image_max_width=&#8221;80px&#8221; image_max_width_tablet=&#8221;&#8221; image_max_width_phone=&#8221;60px&#8221; image_max_width_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<blockquote>\n<p style=\"text-align: left;\"><em>&#8220;The training was really good! The section on vulnerability analysis was exciting, and I got new ideas for our web security. The instructor explained encryption and authentication clearly. It was also great that we could ask our own questions. I definitely enjoyed it!&#8221;<\/em><\/p>\n<p style=\"text-align: left;\"><strong>Participants from N\u00fcrnberg<\/strong><\/p>\n<\/blockquote>\n<p>[\/et_pb_blurb][et_pb_image src=&#8221;https:\/\/www.itech-progress.com\/wp-content\/uploads\/2022\/01\/cyber-security-16.png&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; custom_margin=&#8221;|||72px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_blurb alt=&#8221;cpsa-f training&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;80px&#8221; image_icon_width_tablet=&#8221;80px&#8221; image_icon_width_phone=&#8221;60px&#8221; image_icon_width_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.27.5&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;||||||||&#8221; body_font_size=&#8221;16px&#8221; text_orientation=&#8221;center&#8221; custom_padding=&#8221;|||3px||&#8221; border_radii_image=&#8221;on|10px|10px|10px|10px&#8221; image_max_width=&#8221;80px&#8221; image_max_width_tablet=&#8221;&#8221; image_max_width_phone=&#8221;60px&#8221; image_max_width_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<blockquote>\n<p style=\"text-align: left;\"><em>&#8220;The web security training was great. It covered exactly the important topics we need. Firewalls, encryption, authentication\u2014all explained clearly and practically. The exercises on vulnerability analysis were excellent, I learned a lot. The instructor was knowledgeable and allowed enough time for questions.&#8221;<\/em><\/p>\n<p style=\"text-align: left;\"><strong>Participants from Eschborn<\/strong><\/p>\n<\/blockquote>\n<p>[\/et_pb_blurb][et_pb_image src=&#8221;https:\/\/www.itech-progress.com\/wp-content\/uploads\/2022\/01\/cyber-security-16.png&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; custom_margin=&#8221;|||72px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; saved_specialty_column_type=&#8221;2_3&#8243; _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text module_id=&#8221;Termine_CPSA-F_DE&#8221; _builder_version=&#8221;4.27.4&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#fa870d&#8221; text_font_size=&#8221;29px&#8221; header_font=&#8221;|600|||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#fa870d&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_text_color=&#8221;#fa870d&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||||false|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Explore More Trainings!<\/p>\n<p>[\/et_pb_text][et_pb_code _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<pee><div class=\"_df_book df-container df-loading \" id=\"df_42205\"  title=\"itech-academy-brochure\" _slug=\"itech-academy-broschuere-10-2024-en\" wpoptions=\"true\" thumb=\"https:\/\/www.itech-progress.com\/wp-content\/uploads\/2025\/02\/Academy_Portfolio_2025_EN.jpg\" thumbtype=\"bg\" ><\/div><script data-cfasync=\"false\">var option_df_42205 = {\"outline\":[],\"forceFit\":\"true\",\"autoEnableOutline\":\"false\",\"autoEnableThumbnail\":\"false\",\"overwritePDFOutline\":\"false\",\"direction\":\"1\",\"pageSize\":\"0\",\"source\":\"https:\\\/\\\/www.itech-progress.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Academy_Portfolio_2026_EN-1.pdf\",\"wpOptions\":\"true\"}; if(window.DFLIP && DFLIP.parseBooks){DFLIP.parseBooks();}<\/script><\/pee>[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.27.0&#8243; animation_style=&#8221;fade&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_header title=&#8221;Interested in customized in-house training?&#8221; button_one_text=&#8221;Request&#8221; button_one_url=&#8221;https:\/\/www.itech-progress.com\/en\/portfolio-item\/in-house\/&#8221; button_two_text=&#8221;+49 621 595702 41&#8243; button_two_url=&#8221;tel:+4962159570241&#8243; background_overlay_color=&#8221;rgba(0,63,134,0.7)&#8221; _builder_version=&#8221;4.27.6&#8243; title_font=&#8221;|600|||||||&#8221; title_font_size=&#8221;33px&#8221; content_line_height=&#8221;1.5em&#8221; background_image=&#8221;https:\/\/www.itech-progress.com\/wp-content\/uploads\/2020\/03\/Inhouse_Schulung-1-scaled.jpg&#8221; parallax=&#8221;on&#8221; custom_button_one=&#8221;on&#8221; button_one_text_color=&#8221;#ffffff&#8221; button_one_bg_color=&#8221;#fa870d&#8221; button_one_border_width=&#8221;0px&#8221; button_one_font=&#8221;|600|||||||&#8221; button_one_icon=&#8221;&#x68;||divi||400&#8243; button_one_icon_color=&#8221;#ffffff&#8221; button_one_icon_placement=&#8221;left&#8221; button_one_on_hover=&#8221;off&#8221; button_one_custom_margin=&#8221;35px||||false|false&#8221; button_one_custom_padding=&#8221;|20px||40px|false|false&#8221; custom_button_two=&#8221;on&#8221; button_two_bg_color=&#8221;#fa870d&#8221; button_two_border_width=&#8221;0px&#8221; button_two_font=&#8221;|600|||||||&#8221; button_two_icon=&#8221;&#xe090;||divi||400&#8243; button_two_icon_color=&#8221;#ffffff&#8221; button_two_icon_placement=&#8221;left&#8221; button_two_on_hover=&#8221;off&#8221; button_two_custom_padding=&#8221;|20px||40px|false|false&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;120px||130px||false|false&#8221; link_option_url_new_window=&#8221;on&#8221; hover_enabled=&#8221;0&#8243; title_font_size_tablet=&#8221;&#8221; title_font_size_phone=&#8221;&#8221; title_font_size_last_edited=&#8221;on|desktop&#8221; button_one_bg_color_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221; button_one_bg_color__hover_enabled=&#8221;on|hover&#8221; button_one_bg_color__hover=&#8221;#86cbed&#8221; button_one_bg_enable_color__hover=&#8221;on&#8221; title_level=&#8221;h3&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Do you have a whole team that you would like to train, but none of our training courses meet the requirements? No problem! We would be happy to work with you to create a customized in-house training course, whether for beginners or advanced users. We look forward to your inquiry!<\/p>\n<p>[\/et_pb_fullwidth_header][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Format: Face-to-Face and Online TrainingDuration: 3 daysRecognize dangers and counter them effectively!Web security is a fundamental pillar for protecting sensitive data and ensuring the stability of digital systems. In an increasingly connected world, cybercriminals specifically target vulnerabilities in web applications and services to compromise systems, disrupt services, or steal confidential information. Inadequate security measures can [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":13596,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-39615","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>iSAQB WEBSEC<\/title>\n<meta name=\"description\" content=\"iSAQB WEBSEC Training in English focusing on secure web architectures, threats, best practices, and certification preparation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itech-progress.com\/en\/isaqb-advanced-level\/isaqb-websec\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"iSAQB WEBSEC\" \/>\n<meta property=\"og:description\" content=\"iSAQB WEBSEC Training in English focusing on secure web architectures, threats, best practices, and certification preparation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itech-progress.com\/en\/isaqb-advanced-level\/isaqb-websec\/\" \/>\n<meta property=\"og:site_name\" content=\"itech-progress.com\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ITech-Progress-GmbH-189935161030876\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-05T13:38:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itech-progress.com\/wp-content\/uploads\/2022\/01\/ITech_Logo_300dpi.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1244\" \/>\n\t<meta property=\"og:image:height\" content=\"249\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ITechProgress\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/isaqb-advanced-level\\\/isaqb-websec\\\/\",\"url\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/isaqb-advanced-level\\\/isaqb-websec\\\/\",\"name\":\"iSAQB WEBSEC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/#website\"},\"datePublished\":\"2024-07-04T07:38:22+00:00\",\"dateModified\":\"2026-05-05T13:38:31+00:00\",\"description\":\"iSAQB WEBSEC Training in English focusing on secure web architectures, threats, best practices, and certification preparation.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/isaqb-advanced-level\\\/isaqb-websec\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/isaqb-advanced-level\\\/isaqb-websec\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/isaqb-advanced-level\\\/isaqb-websec\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Start\",\"item\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"iSAQB Advanced Level\",\"item\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/isaqb-advanced-level\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"iSAQB WEBSEC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/\",\"name\":\"itech-progress.com\",\"description\":\"IT-Consulting und zertifizierte iSAQB Softwarearchitektur Schulungen\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/#organization\",\"name\":\"itech-progress.com\",\"url\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.itech-progress.com\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/ITech_Logo_300dpi.png\",\"contentUrl\":\"https:\\\/\\\/www.itech-progress.com\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/ITech_Logo_300dpi.png\",\"width\":1244,\"height\":249,\"caption\":\"itech-progress.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ITech-Progress-GmbH-189935161030876\\\/\",\"https:\\\/\\\/x.com\\\/ITechProgress\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"iSAQB WEBSEC","description":"iSAQB WEBSEC Training in English focusing on secure web architectures, threats, best practices, and certification preparation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itech-progress.com\/en\/isaqb-advanced-level\/isaqb-websec\/","og_locale":"en_US","og_type":"article","og_title":"iSAQB WEBSEC","og_description":"iSAQB WEBSEC Training in English focusing on secure web architectures, threats, best practices, and certification preparation.","og_url":"https:\/\/www.itech-progress.com\/en\/isaqb-advanced-level\/isaqb-websec\/","og_site_name":"itech-progress.com","article_publisher":"https:\/\/www.facebook.com\/ITech-Progress-GmbH-189935161030876\/","article_modified_time":"2026-05-05T13:38:31+00:00","og_image":[{"width":1244,"height":249,"url":"https:\/\/www.itech-progress.com\/wp-content\/uploads\/2022\/01\/ITech_Logo_300dpi.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@ITechProgress","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.itech-progress.com\/en\/isaqb-advanced-level\/isaqb-websec\/","url":"https:\/\/www.itech-progress.com\/en\/isaqb-advanced-level\/isaqb-websec\/","name":"iSAQB WEBSEC","isPartOf":{"@id":"https:\/\/www.itech-progress.com\/en\/#website"},"datePublished":"2024-07-04T07:38:22+00:00","dateModified":"2026-05-05T13:38:31+00:00","description":"iSAQB WEBSEC Training in English focusing on secure web architectures, threats, best practices, and certification preparation.","breadcrumb":{"@id":"https:\/\/www.itech-progress.com\/en\/isaqb-advanced-level\/isaqb-websec\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itech-progress.com\/en\/isaqb-advanced-level\/isaqb-websec\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.itech-progress.com\/en\/isaqb-advanced-level\/isaqb-websec\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Start","item":"https:\/\/www.itech-progress.com\/en\/"},{"@type":"ListItem","position":2,"name":"iSAQB Advanced Level","item":"https:\/\/www.itech-progress.com\/en\/isaqb-advanced-level\/"},{"@type":"ListItem","position":3,"name":"iSAQB WEBSEC"}]},{"@type":"WebSite","@id":"https:\/\/www.itech-progress.com\/en\/#website","url":"https:\/\/www.itech-progress.com\/en\/","name":"itech-progress.com","description":"IT-Consulting und zertifizierte iSAQB Softwarearchitektur Schulungen","publisher":{"@id":"https:\/\/www.itech-progress.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itech-progress.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.itech-progress.com\/en\/#organization","name":"itech-progress.com","url":"https:\/\/www.itech-progress.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itech-progress.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.itech-progress.com\/wp-content\/uploads\/2022\/01\/ITech_Logo_300dpi.png","contentUrl":"https:\/\/www.itech-progress.com\/wp-content\/uploads\/2022\/01\/ITech_Logo_300dpi.png","width":1244,"height":249,"caption":"itech-progress.com"},"image":{"@id":"https:\/\/www.itech-progress.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ITech-Progress-GmbH-189935161030876\/","https:\/\/x.com\/ITechProgress"]}]}},"_links":{"self":[{"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/pages\/39615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/comments?post=39615"}],"version-history":[{"count":9,"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/pages\/39615\/revisions"}],"predecessor-version":[{"id":54976,"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/pages\/39615\/revisions\/54976"}],"up":[{"embeddable":true,"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/pages\/13596"}],"wp:attachment":[{"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/media?parent=39615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}