{"version":1,"pages":[{"id":"-MhrvqyPR0wbuZM3Uhx1","title":"Intro","pathname":"/","siteSpaceId":"sitesp_Rba50","description":"M185 Sicherheitsmassnahmen für KMU IT analysieren & implementieren"},{"id":"-MhrwcyRCUBwzysj-hF6","title":"Organisatorisches / Bewertung","pathname":"/administration/seite-1","siteSpaceId":"sitesp_Rba50","emoji":"1f5d3","breadcrumbs":[{"label":"Administration"}]},{"id":"RqTo9TTm3G0TwRYS6CIi","title":"Bewertung / Kompetenznachweis","pathname":"/administration/bewertung-kompetenznachweis","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"Administration"}]},{"id":"YcRMimYtauJHjWbPu870","title":"TAG 1","pathname":"/tag-1","siteSpaceId":"sitesp_Rba50"},{"id":"frLR2fAeSGy2N8pC1uF9","title":"Tagesziele","pathname":"/tag-1/tagesziele","siteSpaceId":"sitesp_Rba50","emoji":"1f3c1","breadcrumbs":[{"label":"TAG 1"}]},{"id":"zpolFX5lJOeoeqSta7aB","title":"Einstieg IT-Security","pathname":"/tag-1/einstieg-it-security","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 1"}]},{"id":"QaKn5nCaqI6n4DB2oBaQ","title":"Aufgabe 1","pathname":"/tag-1/einstieg-it-security/aufgabe-1","siteSpaceId":"sitesp_Rba50","emoji":"1f4dd","description":"Zeithorizont: 30 Minuten | Setting: Zweiergruppe","breadcrumbs":[{"label":"TAG 1"},{"label":"Einstieg IT-Security"}]},{"id":"PBMroKi3f00VSP9ZyRKg","title":"Aufgabe 2 - Vorfälle untersuchen","pathname":"/tag-1/einstieg-it-security/aufgabe-2-vorfalle-untersuchen","siteSpaceId":"sitesp_Rba50","emoji":"1f4dd","description":"Zeithorizont: 45 Minuten | 4 Gruppen","breadcrumbs":[{"label":"TAG 1"},{"label":"Einstieg IT-Security"}]},{"id":"cUktUUykAHLaD1M3gTYq","title":"Sicherheitsstandards","pathname":"/tag-1/sicherheitsstandards","siteSpaceId":"sitesp_Rba50","description":"Einführung","breadcrumbs":[{"label":"TAG 1"}]},{"id":"qMBvw7BLbevKEI1Q74ES","title":"ISO 27001 / 27002","pathname":"/tag-1/sicherheitsstandards/iso-27001-27002","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 1"},{"label":"Sicherheitsstandards"}]},{"id":"Tnh6OPmxr4sdvEh60NXP","title":"Center for Internet Security (CIS)","pathname":"/tag-1/sicherheitsstandards/center-for-internet-security-cis","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 1"},{"label":"Sicherheitsstandards"}]},{"id":"tgUpvC3gb4egQHxvkItG","title":"NIST","pathname":"/tag-1/sicherheitsstandards/nist","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 1"},{"label":"Sicherheitsstandards"}]},{"id":"nGYOe9cDpegSIxfJM13O","title":"OSSTMM","pathname":"/tag-1/sicherheitsstandards/osstmm","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 1"},{"label":"Sicherheitsstandards"}]},{"id":"LJTj5W5gfJ9ZEi8GVyZT","title":"BSI Grundschutzkompendium","pathname":"/tag-1/bsi-grundschutzkompendium","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 1"}]},{"id":"bmKw0D6SNnMY37FfLGPU","title":"IT-Grundschutz","pathname":"/tag-1/bsi-grundschutzkompendium/it-grundschutz","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 1"},{"label":"BSI Grundschutzkompendium"}]},{"id":"wAyAQYbawOBIEWWYoq8p","title":"Aufgabe 1 - Strukturanalyse","pathname":"/tag-1/bsi-grundschutzkompendium/aufgabe-1-strukturanalyse","siteSpaceId":"sitesp_Rba50","emoji":"1f4dd","description":"Zeithorizont: 60 Minuten","breadcrumbs":[{"label":"TAG 1"},{"label":"BSI Grundschutzkompendium"}]},{"id":"Oyc26fADiEIGDs33K6am","title":"Aufgabe 2 - Analyse / Modellierung durchführen","pathname":"/tag-1/bsi-grundschutzkompendium/aufgabe-2-analyse-modellierung-durchfuhren","siteSpaceId":"sitesp_Rba50","emoji":"1f4dd","description":"Zeithorizont: 120 Minuten","breadcrumbs":[{"label":"TAG 1"},{"label":"BSI Grundschutzkompendium"}]},{"id":"Lya9cKUVO7OUkwVdgMKp","title":"TAG 2","pathname":"/tag-2","siteSpaceId":"sitesp_Rba50"},{"id":"0b2mNaYmoGSyq1xAXNwS","title":"Tagesziele","pathname":"/tag-2/tagesziele","siteSpaceId":"sitesp_Rba50","emoji":"1f3c1","breadcrumbs":[{"label":"TAG 2"}]},{"id":"pIrUTRaIp9dAjYUlfABs","title":"Bedrohungen und Angriffsformen","pathname":"/tag-2/bedrohungen-und-angriffsformen","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 2"}]},{"id":"nEKMUtYdFprRxyJAJHQH","title":"Ransomware-Angriffe","pathname":"/tag-2/bedrohungen-und-angriffsformen/ransomware-angriffe","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 2"},{"label":"Bedrohungen und Angriffsformen"}]},{"id":"SvEK5ZN2BlECImXKUfTE","title":"Phishing","pathname":"/tag-2/bedrohungen-und-angriffsformen/phishing","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 2"},{"label":"Bedrohungen und Angriffsformen"}]},{"id":"48bg56pfME9xXkmzayjk","title":"Supply Chain-Angriffe","pathname":"/tag-2/bedrohungen-und-angriffsformen/supply-chain-angriffe","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 2"},{"label":"Bedrohungen und Angriffsformen"}]},{"id":"anRwTtg40ZdPykhsaJAk","title":"Zero-Day-Exploits","pathname":"/tag-2/bedrohungen-und-angriffsformen/zero-day-exploits","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 2"},{"label":"Bedrohungen und Angriffsformen"}]},{"id":"uf1Wws5JvHQkogyZq7Qo","title":"DDos-Angriffe","pathname":"/tag-2/bedrohungen-und-angriffsformen/ddos-angriffe","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 2"},{"label":"Bedrohungen und Angriffsformen"}]},{"id":"pyM81xnlRhIQ5u96w64C","title":"Credential Stuffing","pathname":"/tag-2/bedrohungen-und-angriffsformen/credential-stuffing","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 2"},{"label":"Bedrohungen und Angriffsformen"}]},{"id":"gvIgTSF0FEi2sIjorwFJ","title":"Social Engineering","pathname":"/tag-2/bedrohungen-und-angriffsformen/social-engineering","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 2"},{"label":"Bedrohungen und Angriffsformen"}]},{"id":"kSRg7d4IquXbOeYwhrZ1","title":"Aufgabe - HackTheBox einrichten","pathname":"/tag-2/aufgabe-hackthebox-einrichten","siteSpaceId":"sitesp_Rba50","emoji":"1f4dd","description":"Zeithorizont: 45 Minuten","breadcrumbs":[{"label":"TAG 2"}]},{"id":"kBaZVY1MA7vTfVs00XnI","title":"Aufgabe - HackTheBox Tier 0 lösen","pathname":"/tag-2/aufgabe-hackthebox-tier-0-losen","siteSpaceId":"sitesp_Rba50","emoji":"1f4dd","description":"Zeithorizont: 180 Minuten","breadcrumbs":[{"label":"TAG 2"}]},{"id":"KAdrAd6tZpqZLlGouSpv","title":"Aufgabe - BSI - Gefährdungskatalog","pathname":"/tag-2/aufgabe-bsi-gefahrdungskatalog","siteSpaceId":"sitesp_Rba50","emoji":"1f4dd","description":"Zeithorizont: 45 Minuten | Setting: Gruppenarbeit","breadcrumbs":[{"label":"TAG 2"}]},{"id":"8BvEdjuXNibQ1ggPcQI4","title":"Aufgabe - HackTheBox Tier 1","pathname":"/tag-2/aufgabe-hackthebox-tier-1","siteSpaceId":"sitesp_Rba50","emoji":"1f4dd","description":"Zeithorizont: 180 Minuten","breadcrumbs":[{"label":"TAG 2"}]},{"id":"jcgJF3fhJsxDjb00SwRE","title":"TAG 3","pathname":"/tag-3","siteSpaceId":"sitesp_Rba50"},{"id":"7IOSqFwt0I1jhwlyhln2","title":"Tagesziele","pathname":"/tag-3/tagesziele","siteSpaceId":"sitesp_Rba50","emoji":"1f3c1","breadcrumbs":[{"label":"TAG 3"}]},{"id":"Qm2FCD3NhsRnbU7BLmfH","title":"Angriffsarten auf Web-Applikationen","pathname":"/tag-3/angriffsarten-auf-web-applikationen","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 3"}]},{"id":"KdAyDnyfe2oYv27VOGQH","title":"OWASP TOP 10","pathname":"/tag-3/angriffsarten-auf-web-applikationen/owasp-top-10","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 3"},{"label":"Angriffsarten auf Web-Applikationen"}]},{"id":"sXWyZuBtW11iqgRxaWXo","title":"Aufgabe - OWASP TOP 10","pathname":"/tag-3/angriffsarten-auf-web-applikationen/aufgabe-owasp-top-10","siteSpaceId":"sitesp_Rba50","emoji":"1f4dd","description":"Zeithorizont: 60 Minuten","breadcrumbs":[{"label":"TAG 3"},{"label":"Angriffsarten auf Web-Applikationen"}]},{"id":"kshOfC1htuXNJlqP2RTR","title":"Aufgabe - Angriffsarten","pathname":"/tag-3/angriffsarten-auf-web-applikationen/aufgabe-angriffsarten","siteSpaceId":"sitesp_Rba50","emoji":"1f4dd","description":"Zeithorizont: 60 Minuten","breadcrumbs":[{"label":"TAG 3"},{"label":"Angriffsarten auf Web-Applikationen"}]},{"id":"UqxJUrkOV8NKztU8dVVN","title":"Mittel und Methoden","pathname":"/tag-3/mittel-und-methoden","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 3"}]},{"id":"OY4EdmZfNYFfQCl60RiB","title":"Nachbearbeitung - HackTheBox Tier 1","pathname":"/tag-3/nachbearbeitung-hackthebox-tier-1","siteSpaceId":"sitesp_Rba50","emoji":"1f4dd","description":"Zeithorizont: 30 Minuten","breadcrumbs":[{"label":"TAG 3"}]},{"id":"X2fmNa5taXaSlC8q46e1","title":"Vorfälle behandeln","pathname":"/tag-3/vorfalle-behandeln","siteSpaceId":"sitesp_Rba50","emoji":"1f4dd","description":"Zeithorizont: 45 Minuten","breadcrumbs":[{"label":"TAG 3"}]},{"id":"AEp7JD9ZGmtfJh8jHKnk","title":"Aufgabe - HackTheBox Tier 2","pathname":"/tag-3/aufgabe-hackthebox-tier-2","siteSpaceId":"sitesp_Rba50","emoji":"1f4dd","description":"Zeithorizont: offen","breadcrumbs":[{"label":"TAG 3"}]},{"id":"8jNQ4PzsrVBTaKlswGNW","title":"TAG 4","pathname":"/tag-4","siteSpaceId":"sitesp_Rba50"},{"id":"nkJZEW7z47wbCDfpav3q","title":"Tagesziele","pathname":"/tag-4/tagesziele","siteSpaceId":"sitesp_Rba50","emoji":"1f3c1","breadcrumbs":[{"label":"TAG 4"}]},{"id":"x1l9BJdDXDFNPhZIyOnm","title":"Sicherheitsmechanismen","pathname":"/tag-4/sicherheitsmechanismen","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 4"}]},{"id":"nAFyiXn1O3UdPChKqTNR","title":"Atomkraftwerk absichern","pathname":"/tag-4/sicherheitsmechanismen/atomkraftwerk-absichern","siteSpaceId":"sitesp_Rba50","emoji":"1f4dd","description":"Zeithorizont: 60 Minuten | 3 Gruppen pro Klasse","breadcrumbs":[{"label":"TAG 4"},{"label":"Sicherheitsmechanismen"}]},{"id":"00ceVmQofgGQgNl8ugOV","title":"Audit-Reports","pathname":"/tag-4/audit-reports","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 4"}]},{"id":"xU50Mg3Z5oAaOmMd1lBu","title":"Erstellen Audit-Report","pathname":"/tag-4/erstellen-audit-report","siteSpaceId":"sitesp_Rba50","emoji":"1f4dd","description":"Zeithorizont: 180 Minuten","breadcrumbs":[{"label":"TAG 4"}]},{"id":"B1JEcmsYpOJ0fuAqgbLG","title":"TAG 5","pathname":"/tag-5","siteSpaceId":"sitesp_Rba50"},{"id":"z2R49LJFUwe3lJl10UQ9","title":"Tagesziele","pathname":"/tag-5/tagesziele","siteSpaceId":"sitesp_Rba50","emoji":"1f3c1","breadcrumbs":[{"label":"TAG 5"}]},{"id":"D48KugUhplIjrxoTWT4C","title":"Cyberattacke - was tun?","pathname":"/tag-5/cyberattacke-was-tun","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 5"}]},{"id":"elUhkzX5CZiWAs2KJMBe","title":"Meldestelle Schweiz","pathname":"/tag-5/meldestelle-schweiz","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"TAG 5"}]},{"id":"OiJVCqs47R3M3jTLGdgV","title":"Aufgabe - Checkliste","pathname":"/tag-5/aufgabe-checkliste","siteSpaceId":"sitesp_Rba50","emoji":"1f4dd","description":"Zeithorizont: 60 Minuten","breadcrumbs":[{"label":"TAG 5"}]},{"id":"WkaoLoYu9jtbucrdfUUZ","title":"Laborumgebung","pathname":"/laborumgebung","siteSpaceId":"sitesp_Rba50"},{"id":"f9DONboywxo7ssOb0A7l","title":"Hardware","pathname":"/laborumgebung/hardware","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"Laborumgebung"}]},{"id":"KXvMM5vdMuQ7diqC1M2T","title":"HackTheBox Setup","pathname":"/laborumgebung/hackthebox-setup","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"Laborumgebung"}]},{"id":"egtioW5giNQZuW2A02ZX","title":"Software","pathname":"/laborumgebung/software","siteSpaceId":"sitesp_Rba50","breadcrumbs":[{"label":"Laborumgebung"}]}]}