Curriculum at a glance
The most up-to-date, effective tech stack on the market:
Build a solid foundation in IT, cybersecurity, and information security management, and develop practical skills for implementing an ISMS according to ISO 27001. The course covers secure IT infrastructures, cloud and AI risks, as well as governance, compliance, and business continuity management.



Upon completion of this program, you will be qualified for roles at the intersection of IT, security, and compliance. You will combine technical safeguards such as firewalls, cryptography, and cloud security with strategic management frameworks and assess risks holistically—from technical vulnerabilities to organizational and legal impacts. This will qualify you for roles such as Information Security Officer (ISO), IT Compliance Manager, or Business Continuity Manager. The program teaches you how to evaluate modern ICT and cloud infrastructures and protect them against current cyber threats. A key focus is on establishing and managing a certifiable Information Security Management System (ISMS) according to ISO 27001 and BSI IT Baseline Protection, as well as ensuring compliance with data protection requirements such as GDPR and BCM.
For this profile, you primarily need an interest in technology, IT infrastructures, and legal frameworks. Prior knowledge is not required, as all relevant fundamentals are covered in the training. However, continuous analytical work and a willingness to address new threats and regulatory requirements are important.
What you'll learn at our Cyber Security & ISMS Management Bootcamp
You’ll learn the fundamentals of information and communication technology (ICT). This includes modern end devices, their structure and functionality, operating systems, application software, folder and file structures, as well as the basics of networks and cloud environments.ICT Fundamentals – Hardware, Operating Systems, and Networks
You’ll learn how to use digital communication and collaboration tools securely and in compliance with data protection requirements. Topics include email communication, calendar management, browser functionality, search strategies, cookies, data protection principles, and audience-focused digital communication.
You’ll identify common threats such as malware, phishing, and unauthorized access, and apply basic security measures like strong passwords, multi-factor authentication, updates, and antivirus solutions. You’ll also learn how to securely use cloud, email, and web services.
You’ll understand network topologies such as star, bus, ring, and mesh, as well as key network components like routers, switches, and access points. Using tools like ping, traceroute, and ipconfig/ifconfig, you’ll identify common issues and interpret routing and name resolution problems.
You’ll analyze firewall rules, interpret log entries, and map encryption technologies such as TLS, VPNs, and disk encryption to real-world use cases.
You’ll differentiate between on-premise and cloud-based data storage, understand cloud deployment models and role-based access concepts, and assess risks in infrastructure and AI environments. You’ll apply best practices for identity and access management as well as security measures for AI systems.
You’ll learn the phases of incident response – detection, analysis, containment, eradication, and recovery. You’ll interpret logs, SIEM data, and alerts, and apply vulnerability management to real-world scenarios. Awareness measures are placed in the appropriate security context.
You’ll understand regulatory requirements, governance structures, and role models. You’ll conduct risk assessments, evaluate data protection and compliance requirements, and apply regulations such as GDPR, NIS2, IT Security Act 2.0, and the EU AI Act in practice.
You’ll create Business Impact Analyses (BIAs), derive RTO and RPO values, and develop emergency and recovery plans. You’ll understand emergency response organizations (BAO), conduct BCM tests, and document audit-relevant evidence.
You’ll learn ISO 27001/27002 and BSI IT-Grundschutz, define protection requirements, model organizational structures, create control catalogs and policies, and implement Annex A requirements as well as the Statement of Applicability (SoA).
In the capstone project, you’ll apply everything you’ve learned: defining scope, identifying stakeholders, conducting full risk analyses and BIAs, documenting Annex A controls, and creating ISMS policies. You’ll consolidate all results into a complete, audit-ready ISMS documentation set.
The most up-to-date, effective tech stack on the market:
You’ll learn the fundamentals of information and communication technology (ICT). This includes modern end devices, their structure and functionality, operating systems, application software, folder and file structures, as well as the basics of networks and cloud environments.
You’ll learn how to use digital communication and collaboration tools securely and in compliance with data protection requirements. Topics include email communication, calendar management, browser functionality, search strategies, cookies, data protection principles, and audience-focused digital communication.
You’ll identify common threats such as malware, phishing, and unauthorized access, and apply basic protection measures like strong passwords, multi-factor authentication, patching/updates, and antivirus solutions. You’ll also learn safe usage of cloud, email, and web services.
You’ll understand network topologies (star, bus, ring, mesh), key network components (routers, switches, access points), and basic protocols. You’ll use tools like ping, traceroute, and ipconfig/ifconfig to troubleshoot issues and interpret routing and name-resolution problems.
You’ll analyze firewall rules, interpret logging entries, and connect encryption concepts (TLS, VPNs, disk encryption) to real-world use cases.
You’ll distinguish on-premise vs. cloud data storage, understand cloud deployment models and role/permission concepts, and assess risks in infrastructure and AI environments. You’ll apply best practices for identity & access management and security measures for AI systems.
You’ll learn incident response phases (detection, analysis, containment, eradication, recovery), interpret logs and SIEM signals, and apply vulnerability management to practical scenarios. You’ll also place awareness measures into the right security context.
You’ll understand regulatory requirements, governance structures, and role models. You’ll conduct risk assessments and map requirements from GDPR, NIS2, IT Security Act 2.0, and the EU AI Act to practical security and compliance work.
You’ll create Business Impact Analyses (BIA), derive RTO and RPO values, and develop emergency and recovery plans. You’ll understand emergency response organizations, run BCM tests, and document audit-relevant evidence.
You’ll learn ISO 27001/27002 and BSI IT-Grundschutz, define protection needs, model structures, create control catalogs and policies, and implement Annex A requirements as well as the Statement of Applicability (SoA).
You’ll apply everything in practice: define scope, identify stakeholders, run full risk assessments and a BIA, document Annex A controls, create ISMS policies, and consolidate results into a complete, audit-ready ISMS documentation set.

What good are skills without getting a foot in the door? We focus extensively on helping you ace real world technical interviews.
We believe that development is continuous, so we offer up-to-date career coaching sessions to help you progress professionally.
Changing careers is more than learning new tech skills. We additionally provide you with spot on soft skills to ace your application process.
Wondering ‘what’s next’? We're connected with exciting startups and companies in Germany.
Spicedlings are getting hired by your favourite companies:
Invest in your future
If you’re registered as unemployed (or soon to be) in Germany, you could be eligible to have all your costs covered with a Bildungsgutschein (training voucher).
For more information on this option, check our page dedicated to financing your coding bootcamp with a Bildungsgutschein.
We want to make our best-in-class tech courses available to everyone with the motivation to complete them.
Our Deferred Payment Option enables those who aren’t in the position to pay upfront nor in instalments to participate, by offering the chance to pay back at a later date.
If you’re ready to cover the cost of our coding bootcamps immediately, this is the option for you. Pay 14 days before the course starts.
20 weeks | Full-time | Remote
This training is ideal for anyone aiming for a specialized career in information security, compliance, IT risk management, or Business Continuity Management (BCM). Deep technical IT knowledge is not required, as all fundamentals are covered during the program. It’s especially suitable for career switchers and professionals looking to expand their profile with management systems such as ISO 27001.
You’ll be able to build and maintain an audit-ready Information Security Management System (ISMS) in line with ISO 27001 and BSI IT-Grundschutz. You’ll conduct risk analyses (ISO 27005) and Business Impact Analyses (BIA), assess technical security measures, ensure GDPR compliance, and integrate new regulatory requirements such as NIS2 and the EU AI Act.
You’ll be well prepared for demanding roles at the intersection of IT, security, and management. Typical positions include Information Security Officer, ISMS Manager, IT Compliance Manager, Business Continuity Manager, or IT Risk Consultant.
You submit your online application and then take part in a personal interview with us. We’ll talk about your motivation, your interest in governance topics, and your career goals. If everything’s a match, you’ll receive your acceptance shortly after.
Join our community and kick-start your career in information security and ISMS management.
Email address
I would like to receive email updates from SPICED Academy. This decision can be revoked at any time. Information on how we handle your data can be found in our privacy policy.