Course length:
Training language:
24 lessons
Course fee:

321 500 HUF + VAT (cca. 850 EUR + VAT)

Course dates and application

First training day: 29 July 2024, Further training days: 30., 31.

on working days (09.00 - 16.30)
Application deadline:
19 July 2024
Training language:
Course fee:

321 500 HUF + VAT (cca. 850 EUR + VAT)

First training day: 7 October 2024, Further training days: 8., 9.

on working days (09.00 - 16.30)
Application deadline:
27 September 2024
Training language:
Course fee:

321 500 HUF + VAT (cca. 850 EUR + VAT)

Applying for closed-group training

If you and your colleagues are attending a closed group training course and you have a training date code, you can apply here.

Application without a date

If none of the dates is right for you, but you are interested in the course, please submit your application without a date. When we announce a new date you will be notified.

The course is recommended for testers wishing to take the ISTQB Advanced Level Security Tester exam and learn the methodology of security testing. The course gives students a comprehensive picture about the approaches to security testing, its planning and realisation.

For software testers dealing with security testing who wish to take the related ISTQB exam and broaden their knowledge of the subject.

Successful ISTQB Certified Tester Foundation Level exam and at least 3 years of experience in security testing or a similar field, as well as English language skills, as both the course material and the exam are in English.

Our new course, which is unique both globally and in Hungary, deals with the methodology, background, planning, implementing, techniques, metrics, risks and further development of security testing.

Besides exam questions we also place great emphasis on practice, where we do tasks related to the various phases of security testing. The course is vendor- and device- independent, we do not do any exercises on the computer. The course is accredited by ISTQB, and is thus held as an official exam preparation course.

The course is realised in conjunction with the University of Szeged. 


Course Outline:



1.1 Security Risks
1.1.1 The Role of Risk Assessment in Security Testing
1.1.2 Asset Identification
1.1.3 Analysis of Risk Assessment Techniques
1.2 Information Security Policies and Procedures
1.2.1 Understanding Security Policies and Procedures
1.2.2 Analysis of Security Policies and Procedures
1.3 Security Auditing and Its Role in Security Testing
1.3.1 Purpose of a Security Audit
1.3.2 Risk Identification, Assessment and Mitigation
1.3.3 People, Process and Technology


2.1 Introduction
2.2 The Purpose of Security Testing
2.3 The Organizational Context
2.4 Security Testing Objectives
2.4.1 The Alignment of Security Testing Goals
2.4.2 The Identification of Security Test Objectives
2.4.3 The Difference Between Information Assurance and Security Testing
2.5 The Scope and Coverage of Security Testing Objectives
2.6 Security Testing Approaches 
2.6.1 Analysis of Security Test Approaches
2.6.2 Analysis of Failures in Security Test Approaches
2.6.3 Stakeholder Identification
2.7 Improving the Security Testing Practices


3.1 Security Test Process Definition 
3.1.1 ISTQB Security Testing Process
3.1.2 Aligning the Security Testing Process to a Particular Application Life-cycle Model
3.2 Security Test Planning
3.2.1 Security Test Planning Objectives
3.2.2 Key Security Test Plan Elements
3.3 Security Test Design
3.3.1 Security Test Design
3.3.2 Security Test Design Based on Policies and Procedures
3.4 Security Test Execution
3.4.1 Key Elements and Characteristics of an Effective Security Test Environment 
3.4.2 The Importance Of Planning and Approvals in Security Testing
3.5 Security Test Evaluation
3.6 Security Test Maintenance


4.1 The Role of Security Testing in a Software Life-cycle 
4.1.1 The Life-cycle View of Security Testing
4.1.2 Security-Related Activities in the Software Life-cycle
4.2 The Role of Security Testing in Requirements
4.3 The Role of Security Testing in Design
4.4 The Role of Security Testing in Implementation Activities
4.4.1 Security Testing During Component Testing
4.4.2 Security Test Design at the Component Level
4.4.3 Analysis of Security Tests at the Component Level
4.4.4 Security Testing During Component Integration Testing
4.4.5 Security Test Design at the Component Integration Level
4.5 The Role of Security Testing in System and Acceptance Test Activities
4.5.1 The Role of Security Testing in System Testing 
4.5.2 The Role of Security Testing in Acceptance Testing
4.6 The Role of Security Testing in Maintenance




5.1 System Hardening
5.1.1 Understanding System Hardening
5.1.2 Testing the Effectiveness of System Hardening Mechanisms
5.2 Authentication and Authorization
5.2.1 The Relationship Between Authentication and Authorization
5.2.2 Testing the Effectiveness of Authentication and Authorization Mechanisms
5.3 Encryption
5.3.1 Understanding Encryption
5.3.2 Testing the Effectiveness of Common Encryption Mechanisms
5.4 Firewalls and Network Zones
5.4.1 Understanding Firewalls 
5.4.2 Testing Firewall Effectiveness
5.5 Intrusion Detection 
5.5.1 Understanding Intrusion Detection Tools
5.5.2 Testing the Effectiveness of Intrusion Detection Tools
5.6 Malware Scanning
5.6.1 Understanding Malware Scanning Tools
5.6.2 Testing the Effectiveness of Malware Scanning Tools 
5.7 Data Obfuscation
5.7.1 Understanding Data Obfuscation
5.7.2 Testing the Effectiveness of Data Obfuscation Approaches
5.8 Training
5.8.1 The Importance of Security Training
5.8.2 How to Test the Effectiveness of Security Training


6.1 Understanding the Attackers
6.1.1 The Impact of Human Behavior on Security Risks 
6.1.2 Understanding the Attacker Mentality 
6.1.3 Common Motivations and Sources of Computer System Attacks
6.1.4 Understanding Attack Scenarios and Motivations
6.2 Social Engineering 
6.3 Security Awareness
6.3.1 The Importance Of Security Awareness
6.3.2 Increasing Security Awareness


7.1 Security Test Evaluation
7.2 Security Test Reporting
7.2.1 Confidentiality of Security Test Results
7.2.2 Creating Proper Controls and Data Gathering Mechanisms for Reporting Security Test Status
7.2.3 Analyzing Interim Security Test Status Reports


8.1 Types and Purposes of Security Testing Tools
8.2 Tool Selection
8.2.1 Analyzing and Documenting Security Testing Needs
8.2.2 Issues with Open Source Tools
8.2.3 Evaluating a Tool Vendor’s Capabilities


9.1 Understanding Security Testing Standards
9.1.1 The Benefits of Using Security Testing Standards
9.1.2 Applicability of Standards in Regulatory Versus Contractual Situations
9.1.3 Selection of Security Standards
9.2 Applying Security Standards
9.3 Industry Trends
9.3.1 Where to Learn of Industry Trends in Information Security
9.3.2 Evaluating Security Testing Practices for Improvements 



Do you have any questions about the training?


Don't have enough knowledge to complete this training yet? Then get the basics you need with these courses.

ISTQB Certified Tester Foundation Level live course

24 lessons

219 500 HUF + VAT (cca. 595 EUR + VAT)

Training dates:
Aug 21
Oct 14
Dec 16
ISTQB Certified Tester Foundation Level e-learning

89 500 HUF + VAT
This hands-on course provides test engineers and test managers with the essential ideas, processes, tools and skills they need in order to set themselves on a path for true testing professionalism.  Course is accredited by the ASTQB in 2024 and follows the ISTQB Foundation Level Syllabus - CTFL 4.0.

You may also be interested in these courses and e-learning packages

You may find the courses below interesting

ISTQB Foundation Level - Agile Tester Extension course

16 lessons
129 500 HUF + VAT
Training dates:
Aug 01
ISTQB Foundation Level - Agile Tester Extension e-learning

69 500 HUF + VAT
This course provides testers and test managers with an understanding of the fundamentals of testing on agile projects. Attendees will learn how agile software development projects are organized and the various types of agile development practices in common use. They will understand how agile development differs from traditional approaches, how to position testers in an agile organisation, the fundamental agile testing principles, practices and processes and the skills they’ll need to excel in an agile environment.
ISTQB Certified Tester Advanced Level Test Manager e-learning

109 500 HUF + VAT
This course provides test managers with advanced skills in test estimation, test planning, test monitoring and test control. Attendees will learn how to define the overall testing goals and strategy for the systems being tested. They will gain hands-on experience in planning, scheduling and tracking these tasks. The attendees will be able to describe and organize the necessary activities. They will return to work able to select, acquire and assign adequate resources for testing tasks. They will know how to form, organize and lead testing teams. Test manager attendees will be able to organize communication between the members of the testing teams and between the testing teams and all the other stakeholders. Further, they’ll learn how to justify their decisions and provide adequate reporting information where applicable.
ISTQB Certified Tester Advanced Level Test Analyst e-learning

109 500 HUF + VAT
This course provides Test Analysts with advanced skills in test analysis, design, and execution.  This hands-on course provides Test Analysts with the ability to define and carry out the tasks required to put the test strategy into action.  The course will teach attendees how to analyze the system, taking into account the organization’s and user’s quality expectations.  They will learn how to evaluate system requirements as part of formal and informal reviews, leveraging their understanding of the business domain to determine requirement validity.  Attendees will learn how to analyze, design, implement, and execute tests, using risk considerations to determine the appropriate effort and priority for tests. Attendees will learn how to implement a testing effort that supports the explicit and implicit testing objectives.
ISTQB Advanced Level Technical Test Analyst e-learning

109 500 HUF + VAT
This training course presents a comprehensive overview of methods and techniques for deriving and specifying software tests based on the system’s implementation and structure (“white box tests”). On completing the course, attendees will be able to select and apply techniques for test case derivation, such as control flow or data flow testing as well as static and dynamic analysis. We will look at non-functional testing techniques, such as reliability testing, portability testing, performance, load and stress testing. We will also discuss how to succeed in building robust automation architectures and using a variety of tools to reach quality targets.
EC-Council Certified Chief Information Security Officer (CCISO) E-learning and Exam

499 500 HUF + VAT
The CCISO certification is an industry-leading program that recognises the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for C-Level positions, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development and the financial expertise vital for leading a highly successful IS program. The CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.
EC-Council Certified Secure Computer User v2 (CSCU) E-learning and Exam

79 500 HUF + VAT
The CSCU training program aims at equipping students with the necessary knowledge and skills to protect their information assets. This course covers the fundamentals of various computer and network security threats, such as identity theft, credit card fraud, phishing, virus and backdoors, email hoaxes, loss of confidential information, hacking attacks and social engineering.
EC-Council Certified Network Defender (CND) E-learning and Exam

429 500 HUF + VAT
The Certified Network Defender v3 (CND) credential is the most trusted network security certification that employers worldwide value and for good reasons. The comprehensive curriculum focuses on loT security, network virtualization practices for the remote workforce, enhanced cloud security, loT and operational technology (OT) modules, introduction to threat intelligence, in-depth attack surface analysis, and much more. 
EC-Council Certified Ethical Hacker (CEH) E-learning and Exam

499 500 HUF + VAT
CEH is the world’s most advanced certified ethical hacking course that covers 20 of the most current security domains any individual will ever want to know when they are planning to beef-up the information security posture of their organisation. This accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals. 
EC-Council Computer Hacking Forensic Investigator (CHFI) E-learning and Exam

429 500 HUF + VAT
CHFI v10 captures all the essentials of digital forensics analysis and evaluation required for the modern world — tested and approved by veterans and top practitioners of the cyber forensics industry. From identifying the footprints of a breach to collecting evidence for a prosecution, CHFI v10 handholds students through every step of the process with experiential learning. CHFI v10 is engineered by industry practitioners for professionals including those such as forensic analysts, cybercrime investigator, cyber defense forensic analyst, incident responders, information technology auditor, malware analyst, security consultant, chief security officers and aspirants alike.
EC-Council Disaster Recovery Professional (EDRP) E-learning and Exam

429 500 HUF + VAT
The EDRP v3 course identifies vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an orginization. It also provides the networking professional with a foundation in disaster recovery course principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies and procedures, an understanding of the roles and relationships of various members of organisation, implementation of a plan and recovering from a disaster.
EC-Council Certified Incident Handler v2 (ECIH) E-learning and Exam

229 500 HUF + VAT
The ECIH program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. The comprehensive training program will make students proficient in handling as well as responding to various security incidents, such as network security incidents, malicious code incidents and insider attack threats.
Certified Application Security Engineer (CASE).NET E-learning and Exam

229 500 HUF + VAT
CASE .NET goes beyond just the guidelines on secure coding practices but include secure requirement gathering, robust application design and handling security issues in post development phases of application development. This makes CASE one of the most comprehensive certifications for secure software development in the market today. It’s desired by software application engineers, analysts, testers globally and respected by hiring authorities. The hands-on training program encompasses security activities involved in all phases of the Secure Software Development Lifecycle (SDLC): planning, creating, testing and deploying an application.
Certified Application Security Engineer (CASE) Java E-learning and Exam Voucher

229 500 HUF + VAT
The CASE Java program is designed to be a hands-on, comprehensive application security training course that will help software professionals create secure applications. It trains software developers on the critical security skills and knowledge required throughout a typical software development lifecycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices required in today’s insecure operating environment.
Certified Threat Intelligence Analyst (C|TIA) E-learning and Exam

229 500 HUF + VAT
The Threat Intelligence training program was based on a rigorous Job Task Analysis (JTA) of the job roles involved in the field of threat intelligence. This program differentiates threat intelligence professionals from other information security professionals. It is a highly interactive, comprehensive, standards-based, intensive 3-day training program that teaches information security professionals to build professional threat intelligence.
Certified Blockchain Professional (C|BP) E-learning and exam

429 500 HUF + VAT
The Certified Blockchain Professional is fully vendor-agnostic and practical, focusing on the current state of blockchain technology as well as its future potential. The Certified Blockchain Professional course digs deep into the main characteristics and features of the distributed ledger technology (DLT) as well as introduces Blockchain’s new 3S (Secure-Scalable-Sustainable) proprietary framework. Students will also get a deep understanding of blockchain technology and mining of cryptocurrency.
EC-Council Certified SOC Analyst E-learning and Exam

279 500 HUF + VAT
The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations. CSA is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team. Being an intense 3-day program, it thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need.