Back from the Versenkung

After nearly a year of writing nothing, I am writing my first blog article. The last months i was very busy in my job and also in my private life. Last year i did my CCNA Routing and Switching in paralell to a Windows 10 Migration and Rollout project for swiss energy company. In October I started with my Master studies in IT-Governance, Risk and Compliance Management, which is very interesting. In this studies, i learned a lot about digital platforms and how to ensure IT-GRC for them, Digital Forensics, Cloud Security and so on. This studies keep me very busy as I am doing this studies in parallel to my job. At the moment i am preparing a project thesis with the title “Einführung von technischen und Organisatorischen Maßnahmen gemäß DSGVO mit Hilfe von ISO 27001”.

In December last year i renewed my BSI IT-Sicherheitsbeauftragter/ Chief Information Security Officer Certificate. At the 28th September 2018 I was a public speaker at the ISC² Switzerland Chapter Security Conference 2018. This conference was amazing with a lot of interesting topics and for me it was an honer to speak there. I spoke there about Cybersecurity for Healthcare facilities. This is very tricky, because most healthcare facility have not the money to protect and safeguard our medical information as they should be. An example for this is, should a doctor by a new CT or a new firewall. The Firewall protects him/her against some cyber attacks, but the CT brings the money. In this sector good and affordable solutions are the way to go. Open Source can be a good way, when you know how to implement and use them.

From November until Mid-of-May i was on a laboratory equipment qualification project for new revolutionary gene therapeutics medicine from a Swiss based Parma company. This project was very interesting, but also a lot work to do as it was the first product of its kind for this company. For all of you, who want to work in Computer System Validation, i have a little advice for you: Learn the Drug Development Cycle and how GxP fits into it, because this knowledge helps you to deal with project pressure in my opinion. You even know, why the client is so pushy on some projects. This project is an example for the old sentence “no plan survives the first contact with the enemy”.

Since mid-of-may i working currently on an IT upgrade project for a residential home for the elderly. At this client i upgrade the whole IT Infrastructure from Windows 7 and Windows Server 2008 R2 to Windows 10 (1809/1903) and Windows Server 2019. In addition the whole network is redone, new ThinClient Solution from IGEL is also rolled-out and the Cybersecutrity of this residential home for the elderly is improved. If whished, i can do maybe a little blog series in a more general way about this. For this project I have the same conflict as described above in the healthcare sector.

I am planning to write more often blog article about how you can ensure good cybersecurity with open source and/or free tools. This includes also how to implement a solid IT infrastructure for SMEs with open source technology like ProxmoxVE.


Dear all, at the moment i am learning for my CCENT and have developed following lab for me as challange. If you like, you can use it also to improve your skills or as idea for your own lab exercise.

Following Devices are required for this Lab:

– 3 Cisco ISR Router with two Ethernet and two Serial Interfaces (IOS 15), e.g.: Cisco 1921, 1941, 2811, etc.
– 2 Cisco Catalyst Switches (IOS 15), e.g.: Cisco Catalyst 2960, 3750-G, 3750V2, 2960-X, etc.
– 1 Cisco Catalyst PoE Switch (IOS 15), e.g.: Cisco Catayst 2960, 3750-G, 3750v2, 2960-X, etc.
– 2 Cisco IP Phones, e.g. Cisco 7962
– 3 PCs/Laptops
– 1 Raspberry Pi as DNS Server.

Network Map:


























Completed the Book “Cyber Operations” as Training

In the last few month, I made my way through the book “Cyber Operations” from Apress. This is blog article reflects my personal opinion.

From my point of view, it is a good start to go deeper into Cybersecurity, IT-Security and application security. It shows you how to build, attack and defend such systems. E.g.: How to attack some wordpress versions, but also how to defend such versions against attacks. This books teaches you, how to use certain modules of Kali Linux to perform different attacks and which scripts you can use to perform and mitigate attacks. For me it was a good help to go deeper into IT and Cyber Security. I learned in addition some new tricks and hints for Operating Systems i use since years. This book shows, that keep your system up-to-date is very good advice.

One recommendations for those of you, who would like to use the book in the same way as me, ensure, that you use a Quad-Core Systems with minimum 16 GB RAM. Also keep in mind, that windows VMs occupies directly all associated memory (this was the case on my Manjaro system with Virtual Box).

From my point of view, this book can help to improve your knowledge in following areas, if you doing nearly all exercises in paralel on a host with Virtual Box or VmWare:

  • Kali-Linux
  • Hardening Server and Desktop Operating Systems
  • Enterprise Network Setup on host-level (Router, Server, Workstations)
  • Windows Active Directory setup and attacking
  • Windows network services setup and attacking
  • BIND DNS-Server setup and attacking
  • Web server setup and attacking
  • DB server setup and attacking
  • network services setup and attacking
  • Intrusion Detection System setup and attacking
  • Logging
  • Application Security
  • Web application Security
  • Virtualization
  • Penetration Testing Test Lab setup
  • Defending strategies against Web Application, Web server, DB Server, DNS, Windows Domain and other attacks

In Summary, this book was a good investment for me to move on into a career in Cyber/Information Security and gave me a lot of impressions to setup my own Hack/penetration testing Lab at Home.

I am moving now on to the Book: “Pro Linux System Administration” to improve my skills in the administration of Linux. In addition, i start studying for my CCENT and “CCNA Routing&Switching” Certificates. The Cisco Certificates are for me, to understand Computer networks better and also to be a better Penetration Tester and IT-Security Auditor. The Cisco Lab at Home is already deployed. Hot to set up a Pentesting/Hack Lab, i will show you in another blog article.

My first post

This is my first blog post here. I will use this blog to write about different things in the area of IT-Security, Cyber Security, IT-Infrastructure, Raspberry PI, GxP and Society. In today’s world talking/writing only about technical things is okay depending on the topic, but the social/ethical component is also important. In the end we are all human beings. The blog articles on this website will be in english and/or german. Maybe even in french.

Upcomming event, where i will be the presenter: IT-Security/Cyber Security Breakfast 


Here are Links to blog articles i wrote already for my employer:

In English:

In German: