Curriculum at a glance
The most up-to-date, effective tech stack on the market:
Learn the fundamental principles, frameworks, and tools of information security management and develop practical skills to establish, implement, and further develop an ISMS in accordance with ISO 27001—including modern topics such as cloud security, AI, business continuity management (BCM), and governance, risk, and compliance (GRC).



After completing this program, you’ll be fully qualified for a role at the intersection of IT, security, and compliance. You’ll learn how to strategically assess modern ICT and cloud infrastructures (Course 1) and protect them against current cyber threats using technical expertise (Course 2). Your core strength lies in building and managing a certification-ready Information Security Management System (ISMS) in accordance with ISO 27001 and BSI IT-Grundschutz (Course 4), while ensuring compliance with strict regulatory and data protection requirements such as GDPR and BCM (Course 3).
Core competency: Designing, implementing, and auditing digital resilience
You combine technical defense mechanisms such as firewalls, cryptography, and cloud security with strategic management frameworks. You’re able to assess risks holistically – from technical vulnerabilities (Course 2) to legal and organizational consequences in critical situations (Course 3). You take responsibility for information security, audit processes, and continuously improve them. This combination makes you an ideal fit for roles such as Information Security Officer (ISO), IT Compliance Manager, or Business Continuity Manager, helping organizations maintain digital sovereignty and strengthen stakeholder trust.
For this profile, you need above all a strong interest in technology, IT infrastructures, and legal frameworks. In-depth IT knowledge is not necessary—all relevant basics of IT and the cloud will be taught during training.
However, it is important to have an analytical and structured way of thinking in order to set up management systems in a meaningful way and systematically assess risks. You should also be prepared to continuously deal with new threat scenarios (e.g., AI security) and changing legal requirements (e.g., NIS2) in order to strengthen the resilience of organizations in the long term.
What you'll learn at our Cyber Security & ISMS Management Bootcamp
You’ll learn the fundamentals of information and communication technology (ICT). This includes modern end devices, their structure and functionality, operating systems, application software, folder and file structures, as well as the basics of networks and cloud environments.ICT Fundamentals – Hardware, Operating Systems, and Networks
You’ll learn how to use digital communication and collaboration tools securely and in compliance with data protection requirements. Topics include email communication, calendar management, browser functionality, search strategies, cookies, data protection principles, and audience-focused digital communication.
You’ll identify common threats such as malware, phishing, and unauthorized access, and apply basic security measures like strong passwords, multi-factor authentication, updates, and antivirus solutions. You’ll also learn how to securely use cloud, email, and web services.
You’ll understand network topologies such as star, bus, ring, and mesh, as well as key network components like routers, switches, and access points. Using tools like ping, traceroute, and ipconfig/ifconfig, you’ll identify common issues and interpret routing and name resolution problems.
You’ll analyze firewall rules, interpret log entries, and map encryption technologies such as TLS, VPNs, and disk encryption to real-world use cases.
You’ll differentiate between on-premise and cloud-based data storage, understand cloud deployment models and role-based access concepts, and assess risks in infrastructure and AI environments. You’ll apply best practices for identity and access management as well as security measures for AI systems.
You’ll learn the phases of incident response – detection, analysis, containment, eradication, and recovery. You’ll interpret logs, SIEM data, and alerts, and apply vulnerability management to real-world scenarios. Awareness measures are placed in the appropriate security context.
You’ll understand regulatory requirements, governance structures, and role models. You’ll conduct risk assessments, evaluate data protection and compliance requirements, and apply regulations such as GDPR, NIS2, IT Security Act 2.0, and the EU AI Act in practice.
You’ll create Business Impact Analyses (BIAs), derive RTO and RPO values, and develop emergency and recovery plans. You’ll understand emergency response organizations (BAO), conduct BCM tests, and document audit-relevant evidence.
You’ll learn ISO 27001/27002 and BSI IT-Grundschutz, define protection requirements, model organizational structures, create control catalogs and policies, and implement Annex A requirements as well as the Statement of Applicability (SoA).
In the capstone project, you’ll apply everything you’ve learned: defining scope, identifying stakeholders, conducting full risk analyses and BIAs, documenting Annex A controls, and creating ISMS policies. You’ll consolidate all results into a complete, audit-ready ISMS documentation set.
The most up-to-date, effective tech stack on the market:
You’ll learn the fundamentals of information and communication technology (ICT). This includes modern end devices, their structure and functionality, operating systems, application software, folder and file structures, as well as the basics of networks and cloud environments.
You’ll learn how to use digital communication and collaboration tools securely and in compliance with data protection requirements. Topics include email communication, calendar management, browser functionality, search strategies, cookies, data protection principles, and audience-focused digital communication.
You’ll identify common threats such as malware, phishing, and unauthorized access, and apply basic protection measures like strong passwords, multi-factor authentication, patching/updates, and antivirus solutions. You’ll also learn safe usage of cloud, email, and web services.
You’ll understand network topologies (star, bus, ring, mesh), key network components (routers, switches, access points), and basic protocols. You’ll use tools like ping, traceroute, and ipconfig/ifconfig to troubleshoot issues and interpret routing and name-resolution problems.
You’ll analyze firewall rules, interpret logging entries, and connect encryption concepts (TLS, VPNs, disk encryption) to real-world use cases.
You’ll distinguish on-premise vs. cloud data storage, understand cloud deployment models and role/permission concepts, and assess risks in infrastructure and AI environments. You’ll apply best practices for identity & access management and security measures for AI systems.
You’ll learn incident response phases (detection, analysis, containment, eradication, recovery), interpret logs and SIEM signals, and apply vulnerability management to practical scenarios. You’ll also place awareness measures into the right security context.
You’ll understand regulatory requirements, governance structures, and role models. You’ll conduct risk assessments and map requirements from GDPR, NIS2, IT Security Act 2.0, and the EU AI Act to practical security and compliance work.
You’ll create Business Impact Analyses (BIA), derive RTO and RPO values, and develop emergency and recovery plans. You’ll understand emergency response organizations, run BCM tests, and document audit-relevant evidence.
You’ll learn ISO 27001/27002 and BSI IT-Grundschutz, define protection needs, model structures, create control catalogs and policies, and implement Annex A requirements as well as the Statement of Applicability (SoA).
You’ll apply everything in practice: define scope, identify stakeholders, run full risk assessments and a BIA, document Annex A controls, create ISMS policies, and consolidate results into a complete, audit-ready ISMS documentation set.

What good are skills without getting a foot in the door? We focus extensively on helping you ace real world technical interviews.
We believe that development is continuous, so we offer up-to-date career coaching sessions to help you progress professionally.
Changing careers is more than learning new tech skills. We additionally provide you with spot on soft skills to ace your application process.
Wondering ‘what’s next’? We're connected with exciting startups and companies in Germany.
Spicedlings are getting hired by your favourite companies:
Invest in your future
If you’re registered as unemployed (or soon to be) in Germany, you could be eligible to have all your costs covered with a Bildungsgutschein (training voucher).
For more information on this option, check our page dedicated to financing your coding bootcamp with a Bildungsgutschein.
We want to make our best-in-class tech courses available to everyone with the motivation to complete them.
Our Deferred Payment Option enables those who aren’t in the position to pay upfront nor in instalments to participate, by offering the chance to pay back at a later date.
If you’re ready to cover the cost of our coding bootcamps immediately, this is the option for you. Pay 14 days before the course starts.
This training is ideal for anyone aiming for a specialized career in information security, compliance, IT risk management, or Business Continuity Management (BCM). Deep technical IT knowledge is not required, as all fundamentals are covered during the program. It’s especially suitable for career switchers and professionals looking to expand their profile with management systems such as ISO 27001.
You’ll be able to build and maintain an audit-ready Information Security Management System (ISMS) in line with ISO 27001 and BSI IT-Grundschutz. You’ll conduct risk analyses (ISO 27005) and Business Impact Analyses (BIA), assess technical security measures, ensure GDPR compliance, and integrate new regulatory requirements such as NIS2 and the EU AI Act.
You’ll be well prepared for demanding roles at the intersection of IT, security, and management. Typical positions include Information Security Officer, ISMS Manager, IT Compliance Manager, Business Continuity Manager, or IT Risk Consultant.
You submit your online application and then take part in a personal interview with us. We’ll talk about your motivation, your interest in governance topics, and your career goals. If everything’s a match, you’ll receive your acceptance shortly after.
Join our community and kick-start your career in information security and ISMS management.
Email address
I would like to receive email updates from SPICED Academy. This decision can be revoked at any time. Information on how we handle your data can be found in our privacy policy.