Education voucher at hand? Step into the fast lane: Contact us
Get started

Cyber Security & ISMS Management Bootcamp

Learn the fundamental principles, frameworks, and tools of information security management and develop practical skills to establish, implement, and further develop an ISMS in accordance with ISO 27001—including modern topics such as cloud security, AI, business continuity management (BCM), and governance, risk, and compliance (GRC).

Course report rating 4.8
Woman working on a laptop in an office.
Woman smiling blue background

Lerne die Grundlagen des Informationssicherheitsmanagements und entwickle praxisnahe Skills, um ein ISMS nach ISO 27001 aufzubauen und weiterzuentwickeln – inklusive Cloud-Sicherheit, KI, BCM sowie Governance, Risk & Compliance.

After completing this program, you’ll be fully qualified for a role at the intersection of IT, security, and compliance. You’ll learn how to strategically assess modern ICT and cloud infrastructures (Course 1) and protect them against current cyber threats using technical expertise (Course 2). Your core strength lies in building and managing a certification-ready Information Security Management System (ISMS) in accordance with ISO 27001 and BSI IT-Grundschutz (Course 4), while ensuring compliance with strict regulatory and data protection requirements such as GDPR and BCM (Course 3).

Core competency: Designing, implementing, and auditing digital resilience

You combine technical defense mechanisms such as firewalls, cryptography, and cloud security with strategic management frameworks. You’re able to assess risks holistically – from technical vulnerabilities (Course 2) to legal and organizational consequences in critical situations (Course 3). You take responsibility for information security, audit processes, and continuously improve them. This combination makes you an ideal fit for roles such as Information Security Officer (ISO), IT Compliance Manager, or Business Continuity Manager, helping organizations maintain digital sovereignty and strengthen stakeholder trust.

For this profile, you need above all a strong interest in technology, IT infrastructures, and legal frameworks. In-depth IT knowledge is not necessary—all relevant basics of IT and the cloud will be taught during training.

However, it is important to have an analytical and structured way of thinking in order to set up management systems in a meaningful way and systematically assess risks. You should also be prepared to continuously deal with new threat scenarios (e.g., AI security) and changing legal requirements (e.g., NIS2) in order to strengthen the resilience of organizations in the long term.

Course Overview

What you'll learn at our Cyber Security & ISMS Management Bootcamp

ICT Fundamentals – Hardware, Operating Systems, and Networks

Digital Communication, Collaboration & Browser Skills

IT Security Fundamentals and Awareness

Networks, Topologies, and Tools

Cryptography, Firewalls, and Encryption

Cloud and AI Security

Incident Response and Logging

Governance, Data Protection, and Compliance

Business Continuity Management (BCM) & Emergency Planning

ISMS Fundamentals and Systematic Implementation

Capstone Project & Audit Documentatio

Curriculum at a glance

The most up-to-date, effective tech stack on the market:

ICT Fundamentals – Hardware, Operating Systems, and Networks

You’ll learn the fundamentals of information and communication technology (ICT). This includes modern end devices, their structure and functionality, operating systems, application software, folder and file structures, as well as the basics of networks and cloud environments.

Digital Communication, Collaboration & Browser Skills

You’ll learn how to use digital communication and collaboration tools securely and in compliance with data protection requirements. Topics include email communication, calendar management, browser functionality, search strategies, cookies, data protection principles, and audience-focused digital communication.

IT Security Fundamentals and Awareness

You’ll identify common threats such as malware, phishing, and unauthorized access, and apply basic protection measures like strong passwords, multi-factor authentication, patching/updates, and antivirus solutions. You’ll also learn safe usage of cloud, email, and web services.

Networks, Topologies, and Tools

You’ll understand network topologies (star, bus, ring, mesh), key network components (routers, switches, access points), and basic protocols. You’ll use tools like ping, traceroute, and ipconfig/ifconfig to troubleshoot issues and interpret routing and name-resolution problems.

Cryptography, Firewalls, and Encryption

You’ll analyze firewall rules, interpret logging entries, and connect encryption concepts (TLS, VPNs, disk encryption) to real-world use cases.

Cloud and AI Security

You’ll distinguish on-premise vs. cloud data storage, understand cloud deployment models and role/permission concepts, and assess risks in infrastructure and AI environments. You’ll apply best practices for identity & access management and security measures for AI systems.

Incident Response and Logging

You’ll learn incident response phases (detection, analysis, containment, eradication, recovery), interpret logs and SIEM signals, and apply vulnerability management to practical scenarios. You’ll also place awareness measures into the right security context.

Governance, Data Protection, and Compliance

You’ll understand regulatory requirements, governance structures, and role models. You’ll conduct risk assessments and map requirements from GDPR, NIS2, IT Security Act 2.0, and the EU AI Act to practical security and compliance work.

Business Continuity Management (BCM) & Emergency Planning

You’ll create Business Impact Analyses (BIA), derive RTO and RPO values, and develop emergency and recovery plans. You’ll understand emergency response organizations, run BCM tests, and document audit-relevant evidence.

ISMS Fundamentals and Systematic Implementation

You’ll learn ISO 27001/27002 and BSI IT-Grundschutz, define protection needs, model structures, create control catalogs and policies, and implement Annex A requirements as well as the Statement of Applicability (SoA).

Capstone Project & Audit Documentation

You’ll apply everything in practice: define scope, identify stakeholders, run full risk assessments and a BIA, document Annex A controls, create ISMS policies, and consolidate results into a complete, audit-ready ISMS documentation set.

Career Service Image

Career Service

Ready for the real world.

What good are skills without getting a foot in the door? We focus extensively on helping you ace real world technical interviews.

Coaching built for you.

We believe that development is continuous, so we offer up-to-date career coaching sessions to help you progress professionally.

Beyond the technical.

Changing careers is more than learning new tech skills. We additionally provide you with spot on soft skills to ace your application process.

Your next step.

Wondering ‘what’s next’? We're connected with exciting startups and companies in Germany.

Where Spicedlings work

Spicedlings are getting hired by your favourite companies:

Klarna
Facebook
Soundcloud
Wework
Infarm
Google
Ebay
Zalando
Accenture
Audible
BCG
Deloitte

Financing Options

Invest in your future

Bildungsgutschein

Deferred Payment

Full Payment

FAQ

Who is this training for?

What will I be able to do after the training?

What career opportunities will I have after the training?

How does the application process work?

What our participants say

Join our community and kick-start your career in information security and ISMS management.

Do not miss out.
Subscribe to our newsletter.

Email address

I would like to receive email updates from SPICED Academy. This decision can be revoked at any time. Information on how we handle your data can be found in our privacy policy.