​Your path to cybersecurity architecture begins here
Explore a structured learning journey through the full cybersecurity architecture, designed to build your expertise from foundational principles to advanced strategies. Each step equips you with essential skills, guiding you to grow into a strategic thinker and architect of secure systems.

Cybersecurity training pathway
Enterprise security architecture
Enterprise security architecture is the blueprint that protects an organization’s critical assets by integrating security across all systems and processes.
Core foundations
Web security
Web Security is aimed at increasing the security of web applications and web services. It is essential for developers.
Attacks such as SQL injection, JavaScript injection, authentication bypasses, HTTPS, etc. are discussed. More importantly, defenses to protect web applications against these types of attacks are shown as well.
Security for analysts
Analysts, either functional or business analysts, often have a hard time understanding cyber security concepts.
They do not need to know all the details so instead of diving deep, we learn people how to swim in a pool of complex concepts.
This course explains them in human language, focusing on the functional business impact some security concepts may have.
Network security
Network security is important. But it is a complex and broad topic. Layer 7 firewalls, intrusion detection systems, DDOS attacks, MITM attacks, network access controls, … Many important concepts that every network administrator should know.
This course introduces the main topics in Network Security. We show common attacks and how you can protect against them.
Computer networks with TCP/IP
In this course you will get to know the most important contemporary developments and the specific terminology in the field of computer networks. Today, most networks use the TCP/IP protocol. In this course you will acquire an understanding on the internal operation of the TCP/IP protocol. You will also learn how to compare this protocol with the ISO/OSI model.
Cybersecurity for SMEs
Cyber security is important for all companies, both large and small. Large companies often have sufficient resources to tackle it, but what protection measures do you have to take as an SME?
This training offers you a practical overview of the must-have cybersecurity measures for an SME.
Cybersecurity awareness for end users
Raising security awareness among your end users is of critical importance to keep your organization secure. Most of the contemporary attacks exploit the weakest link, which often is the end user.
This training provides a bit of theory and a lot of demoes and examples. It is usually provided in a complete security awareness campaign to increase cyber security awareness.
Introduction to NIS2 and DORA
The EU has taken significant legislative efforts to better protect EU citizens in the digital realm. This course deep-dives into three of the most important regulations: NIS2, DORA and GDPR.
After the course, participants will understand the building blocks of cybersecurity and risk management, they can connect those to the current legislative landscape, they understand the core concepts of NIS2, DORA, and GDPR, and they know how to become compliant.
SecDevOps
This course explains SecDevOps in a clear and practical manner. It dives into the different activities that are part of a SecDevOps lifecycle and provides valuable tips and tricks for each of these steps. After this course you are ready to set up your own SecDevOps lifecycle or, even better, integrate security in an existing DevOps process.
This course is best combined with our ‘Web application security’ course.
Advanced topics
Threat modeling
In many companies threat modelling still is very new and not part of the development lifecycle.
We present a layered threat modeling approach that improves the ability of solutions to fulfill the security requirements. We show how threats can be defined at an architectural level, how to use threat libraries, and how threats can be modeled and documented using ArchiMate. We show analogies between threat modeling in software development and its place in business risk management.
Modern access control
OpenID Connect, OAuth2, and SAML are three flexible and secure protocols that realize access control in web and mobile applications.
The course exposes the details of these authentication and authorization methods, both conceptually and with the help of some practical examples. Concepts such as claims, federation, bearer tokens, security token service, access tokens, identity tokens, JWT, single sign on, etc. are no longer mysterious concepts after completing this course.
Coming soon:
cryptography
Cryptography is the foundation of secure communication, data integrity, and privacy. This course provides a comprehensive introduction to the principles, algorithms, and applications of modern cryptography. Participants will explore fundamental cryptographic techniques and key protocols.
Through hands-on exercises and case studies, participants will learn how cryptographic mechanisms protect against cyber threats.
Coming soon:
security architecture
Enterprise security architecture provides a structured approach to designing and implementing security in an organization, starting from the threats that your company is facing.
In this course we touch upon the fundamentals of security: attack frameworks and design principles, and move on to understanding (security) architecture frameworks. We’ll also use the maturity model of the Cyber Security Coalition, to dive into the methodology of enterprise security architecture.
General interest topics
Introduction to blockchain
Bitcoin, Ethereum, Monero, ... These coins are an indispensable part of everyday life. Cryptocurrencies, however, are just one example of blockchain technology. This introductory course reveals the underlying functioning of the blockchain.
We look at how transactions work, at the details of blocks, miners, and other concepts that are important. Finally, we also take a brief look at advanced blockchain applications.
To be continued...
We are always expanding our knowledge base with the current advances in cybersecurity. Keep aan eye out for our future courses!