Security Cycle
Security Hub Vulnerabilities Analyze Pentecost sting Darknet research Additional exams
IT security
Security Analysis
in circulation
Continuous protective measures that reinforce each other — from the initial vulnerability to ongoing monitoring.
External vulnerability analysis
Automated Scanning, CVE Mapping & Prioritization of Open Vulnerabilities
Level 1
External & Internal Pentesting
Simulated attacks from a hacker's perspective — internal as well as external
Level 2
Darknet research
Leak Monitoring, Stolen Credentials & OSINT Analysis
Level 3
Additional tests
Compliance Audits, Phishing Tests & Individual Security Checks
Level 4