Education voucher at hand? Step into the fast lane: Contact us
Get started
Next course: May 26, 2026

Cloud, Cyber and Information Security Bootcamp

Build a solid foundation in IT, cybersecurity, and information security management, and develop practical skills for implementing an ISMS according to ISO 27001. The course covers secure IT infrastructures, cloud and AI risks, as well as governance, compliance, and business continuity management.

Course report rating 4.8
Woman working on a laptop in an office.
Woman smiling blue background

Do you see yourself as a cyber security expert? So do we!

Upon completion of this program, you will be qualified for roles at the intersection of IT, security, and compliance. You will combine technical safeguards such as firewalls, cryptography, and cloud security with strategic management frameworks and assess risks holistically—from technical vulnerabilities to organizational and legal impacts. This will qualify you for roles such as Information Security Officer (ISO), IT Compliance Manager, or Business Continuity Manager. The program teaches you how to evaluate modern ICT and cloud infrastructures and protect them against current cyber threats. A key focus is on establishing and managing a certifiable Information Security Management System (ISMS) according to ISO 27001 and BSI IT Baseline Protection, as well as ensuring compliance with data protection requirements such as GDPR and BCM.

For this profile, you primarily need an interest in technology, IT infrastructures, and legal frameworks. Prior knowledge is not required, as all relevant fundamentals are covered in the training. However, continuous analytical work and a willingness to address new threats and regulatory requirements are important.

Course Overview

What you'll learn at our Cyber Security & ISMS Management Bootcamp

ICT Fundamentals – Hardware, Operating Systems, and Networks

Digital Communication, Collaboration & Browser Skills

IT Security Fundamentals and Awareness

Networks, Topologies, and Tools

Cryptography, Firewalls, and Encryption

Cloud and AI Security

Incident Response and Logging

Governance, Data Protection, and Compliance

Business Continuity Management (BCM) & Emergency Planning

ISMS Fundamentals and Systematic Implementation

Capstone Project & Audit Documentatio

Curriculum at a glance

The most up-to-date, effective tech stack on the market:

ICT Fundamentals – Hardware, Operating Systems, and Networks

You’ll learn the fundamentals of information and communication technology (ICT). This includes modern end devices, their structure and functionality, operating systems, application software, folder and file structures, as well as the basics of networks and cloud environments.

Digital Communication, Collaboration & Browser Skills

You’ll learn how to use digital communication and collaboration tools securely and in compliance with data protection requirements. Topics include email communication, calendar management, browser functionality, search strategies, cookies, data protection principles, and audience-focused digital communication.

IT Security Fundamentals and Awareness

You’ll identify common threats such as malware, phishing, and unauthorized access, and apply basic protection measures like strong passwords, multi-factor authentication, patching/updates, and antivirus solutions. You’ll also learn safe usage of cloud, email, and web services.

Networks, Topologies, and Tools

You’ll understand network topologies (star, bus, ring, mesh), key network components (routers, switches, access points), and basic protocols. You’ll use tools like ping, traceroute, and ipconfig/ifconfig to troubleshoot issues and interpret routing and name-resolution problems.

Cryptography, Firewalls, and Encryption

You’ll analyze firewall rules, interpret logging entries, and connect encryption concepts (TLS, VPNs, disk encryption) to real-world use cases.

Cloud and AI Security

You’ll distinguish on-premise vs. cloud data storage, understand cloud deployment models and role/permission concepts, and assess risks in infrastructure and AI environments. You’ll apply best practices for identity & access management and security measures for AI systems.

Incident Response and Logging

You’ll learn incident response phases (detection, analysis, containment, eradication, recovery), interpret logs and SIEM signals, and apply vulnerability management to practical scenarios. You’ll also place awareness measures into the right security context.

Governance, Data Protection, and Compliance

You’ll understand regulatory requirements, governance structures, and role models. You’ll conduct risk assessments and map requirements from GDPR, NIS2, IT Security Act 2.0, and the EU AI Act to practical security and compliance work.

Business Continuity Management (BCM) & Emergency Planning

You’ll create Business Impact Analyses (BIA), derive RTO and RPO values, and develop emergency and recovery plans. You’ll understand emergency response organizations, run BCM tests, and document audit-relevant evidence.

ISMS Fundamentals and Systematic Implementation

You’ll learn ISO 27001/27002 and BSI IT-Grundschutz, define protection needs, model structures, create control catalogs and policies, and implement Annex A requirements as well as the Statement of Applicability (SoA).

Capstone Project & Audit Documentation

You’ll apply everything in practice: define scope, identify stakeholders, run full risk assessments and a BIA, document Annex A controls, create ISMS policies, and consolidate results into a complete, audit-ready ISMS documentation set.

Download curriculum
Career Service Image

Career Service

Ready for the real world.

What good are skills without getting a foot in the door? We focus extensively on helping you ace real world technical interviews.

Coaching built for you.

We believe that development is continuous, so we offer up-to-date career coaching sessions to help you progress professionally.

Beyond the technical.

Changing careers is more than learning new tech skills. We additionally provide you with spot on soft skills to ace your application process.

Your next step.

Wondering ‘what’s next’? We're connected with exciting startups and companies in Germany.

Where Spicedlings work

Spicedlings are getting hired by your favourite companies:

Klarna
Facebook
Soundcloud
Wework
Infarm
Google
Ebay
Zalando
Accenture
Audible
BCG
Deloitte

Financing Options

Invest in your future

Bildungsgutschein

Deferred Payment

Full Payment

Application & Dates

20 weeks | Full-time | Remote

May

26th May – 19th Oct ‘26

Full-Time
Remote
German

FAQ

Who is this training for?

What will I be able to do after the training?

What career opportunities will I have after the training?

How does the application process work?

What our participants say

Join our community and kick-start your career in information security and ISMS management.

Do not miss out.
Subscribe to our newsletter.

Email address

I would like to receive email updates from SPICED Academy. This decision can be revoked at any time. Information on how we handle your data can be found in our privacy policy.