Penguin stands at a desk and a laptop, various tools and an open bug are lying in front of him.
Customized Linux & Security Trainings

You Choose, We Train.

Which skills do you wish for your team? Choose from a wide range of topics and customize them to your needs. We support you! Let's design the perfect Linux and security training for your team.

Tailored to Your Team's Needs
Practical Training for Real-World Success
Experienced Experts
Learn from Devs, Not Just Trainers
trainings@sigma-star.at

Get Started

Penguin looks down at three cards and is about to tap at one of them.
Choose your topic(s)
Choose from the list below or just write us! Maybe there's something we did't knew we know.
Penguin has a grey bottle in his right flapper and a red one in his left and looks curiously at the red one.
Mix and Match
Deep dive into theory, or get more hands-on examples and interactive exercises? It's up to you.
A small penguin stands opposite a large one.
Find your fit
From 3 hours up to 3 days, we prepare the training contents according to your schedule.

Topics

Engineering

Designing and Maintaining Secure Embedded Linux Systems
Best Practices for Designing and Implementing Linux Embedded Systems
Advanced Yocto Topics
systemd for Embedded Systems
Introduction to Real-Time on Linux
Design and Implementation of PREEMPT_RT, Xenomai
Linux Internals/Introspection
Container Internals

Security

Secure Coding Practices
Threat Modeling Techniques
Code Analysis for Security
Utilizing Secure Elements
Advanced Security Topics (e.g., SELinux, seccomp)
Network Security Technologies
In-Depth Analysis of Various VPN Technologies
Hardening Linux Systems
Sandboxing with Containers and Linux Namespaces
Kubernetes Hardening & Best Practices
AppSec: Application Security
Secure Mobile Development Best Practices

Assessment

Firmware Extraction and Analysis
Filesystem Forensics
Post-Mortem Analysis of Linux Systems
Filesystem Forensics for Embedded and General Purpose Systems
Embedded System Forensics
Monitoring Linux Systems for Embedded Systems and Data Centers

Not sure about any of these?

If you have just a rough outline of what you want but can't decide what's right for you, just contact us! We can help you out and together decide on a training, that is best for you and your team.

Get inspired?

By the way: We also have prepared Linux and security trainings. Check them out to get an idea of how your training could look. Maybe there's already one that fits your team's needs!

Benefits

Penguin with glasses and a document in his arms.
Experienced Experts
We are seasoned experts in Linux and cryptography. Benefit from our long years of experience and get valuable insights on latest developements.
Penguin behind a laptop stares into the screen and types something.
Learn from Devs, Not Just Trainers
We combine training expertise with experience from the field: As proficient developers, we understand the challenges your team may face. Benefit from our unique perspective and industry expertise.

Experts

Portrait of a man with glasses and beard.
David Gstir
IT-Security Specialist
David Gstir is a security researcher and software engineer at sigma star gmbh with 15+ years of hands-on experience in designing, engineering and auditing software for various use cases. He obtained a master's degree in computer sciences from the University of Technology Graz, Austria where he specialized in IT security and cryptography.
Portrait of a man with fedora hat, glasses, beard.
Richard Weinberger
Linux Specialist
Richard is co-founder of sigma star gmbh where he offers consulting services around Linux and IT security. Upstream he maintains various subsystems of the Linux kernel such as UserModeLinux and UBIFS. Beside of low level and security aspects of computers he enjoys growing lithops.

Our Story

Over the years, we've honed our skills and gained valuable insights working on diverse projects in the ever-evolving tech landscape. As we grew, so did our desire to share our knowledge. This led us to offer trainings in security, troubleshooting, and Linux development for companies seeking to enhance their engineering teams' skills.

FAQ

Are your trainings also available in German?

Ja, wir sprechen auch Deutsch.

Do I need a specific training platform to take part in a training?

No, you don't need to worry about anything. Sigma star gmbh provides the training platform, and you will receive access to it.

Do I get the training material afterwards?

Sure! All presented material will be available to attendees after the session.

Do you also offer in-house trainings?

Yes, we provide in-house workshops for our custom trainings. They are available upon request: Contact us to book your in-house session.

How big is the group per training?

The training is limited to 10 persons. Larger trainings are available upon request.

What timezone will the training be conducted in?

Our base timezone is CET; however, we can arrange customized training slots to align with your specific time zone upon request.

Can you help us with NIS2, EU CRA, IEC 62443, EN 303 645, or another security standard?

Yes! There are quite a lot of new security standards that bring new requirements and often uncertainty about what to implement. We can help you out there! Feel free to request a custom-tailored training session for your specific use case and requirements.

The answer you were looking for is not in the list?
Feel free to write us anytime an E-Mail: trainings@sigma-star.at.
We’ll be happy to assist you.

Icon with a waving hand

Get in touch

+43 5 9980 400 00 (email preferred)

sigma star gmbh
Eduard-Bodem-Gasse 6, 1st floor
6020 Innsbruck | Austria

LinkedIn logo
sigma star gmbh logo