Education voucher at hand? Step into the fast lane: Contact us

Contact us
DE|EN

Your bootcamp

Cyber, Cloud and Information Security Bootcamp

Next seat available

May 26, 2026 — 20 weeks
Learn the fundamentals of information security management and build practical skills to design and maintain an ISO 27001-compliant ISMS – including cloud security, AI, business continuity management (BCM), and governance, risk & compliance.
Get startedGoogle rating 4.6
100%
funding available
100% funding available
Young woman with curly hair and glasses smiling at a desk.
70%
Labour market integration
7K+
> 7k alumni
10+
Years of experience

Our partner companies

Course Content

All content at a glance

Keyfacts

  • Full-Time: 20 Wochen (Mo – Fr, 9.00 – 18.00 Uhr)
  • Participants: approx. 10
  • Locations: Remote (live online)
  • Course language: German
  • Completion: Certificate of participation, industry-relevant cybersecurity certification, ICDL Computer & Online Essentials, ISC2 Certified in Cybersecurity (CC) + Information Security Officer

Tech Stack

Notion
Google Workspace
Virtualbox
Verinice

Download tech stacks

Become an Information Security Officer - at the neue fische bootcamp

After completing this program, you’ll be fully qualified for a role at the intersection of IT, security, and compliance. You’ll learn how to strategically assess modern ICT and cloud infrastructures (Course 1) and protect them against current cyber threats using technical expertise (Course 2).

Your core strength lies in building and managing a certification-ready Information Security Management System (ISMS) in accordance with ISO 27001 and BSI IT-Grundschutz (Course 4), while ensuring compliance with strict regulatory and data protection requirements such as GDPR and BCM (Course 3).


Core competency: Designing, implementing, and auditing digital resilience

You combine technical defense mechanisms such as firewalls, cryptography, and cloud security with strategic management frameworks. You’re able to assess risks holistically – from technical vulnerabilities (Course 2) to legal and organizational consequences in critical situations (Course 3).

You take responsibility for information security, audit processes, and continuously improve them. This combination makes you an ideal fit for roles such as Information Security Officer (ISO), IT Compliance Manager, or Business Continuity Manager, helping organizations maintain digital sovereignty and strengthen stakeholder trust.

Requirements for this profile

For this profile, you need above all a strong interest in technology, IT infrastructures, and legal frameworks. In-depth IT knowledge is not necessary—all relevant basics of IT and the cloud will be taught during training.

However, it is important to have an analytical and structured way of thinking in order to set up management systems in a meaningful way and systematically assess risks. You should also be prepared to continuously deal with new threat scenarios (e.g., AI security) and changing legal requirements (e.g., NIS2) in order to strengthen the resilience of organizations in the long term.


Starting dates

The next dates: Cyber, Cloud and Information Security Bootcamp

Remote bootcamp participants are welcome to connect and collaborate on our campus. Just get in touch with us – happy to see you there!

May
26th May19th Oct ‘26

Full-Time

Remote

German

Secure seat

What you will learn in our Cyber Security & ISMS Management Bootcamp training course

Two people discussing at a laptop.

You’ll learn the fundamentals of information and communication technology (ICT). This includes modern end devices, their structure and functionality, operating systems, application software, folder and file structures, as well as the basics of networks and cloud environments.

Woman working on a computer

You’ll learn how to use digital communication and collaboration tools securely and in compliance with data protection requirements. Topics include email communication, calendar management, browser functionality, search strategies, cookies, data protection principles, and audience-focused digital communication.

Woman working on laptop

You’ll identify common threats such as malware, phishing, and unauthorized access, and apply basic security measures like strong passwords, multi-factor authentication, updates, and antivirus solutions. You’ll also learn how to securely use cloud, email, and web services.

Man with orange beanie working on computer

You’ll understand network topologies such as star, bus, ring, and mesh, as well as key network components like routers, switches, and access points. Using tools like ping, traceroute, and ipconfig/ifconfig, you’ll identify common issues and interpret routing and name resolution problems.

Person in camouflage uniform working on laptop in office

You’ll analyze firewall rules, interpret log entries, and map encryption technologies such as TLS, VPNs, and disk encryption to real-world use cases.

Man reading documents at desk

You’ll differentiate between on-premise and cloud-based data storage, understand cloud deployment models and role-based access concepts, and assess risks in infrastructure and AI environments. You’ll apply best practices for identity and access management as well as security measures for AI systems.

Laptop displaying programming code, with notebook and smartphone beside it

You’ll learn the phases of incident response – detection, analysis, containment, eradication, and recovery. You’ll interpret logs, SIEM data, and alerts, and apply vulnerability management to real-world scenarios. Awareness measures are placed in the appropriate security context.

HTML code on a computer screen.

You’ll understand regulatory requirements, governance structures, and role models. You’ll conduct risk assessments, evaluate data protection and compliance requirements, and apply regulations such as GDPR, NIS2, IT Security Act 2.0, and the EU AI Act in practice.

Two women working together on a laptop in a café.

You’ll create Business Impact Analyses (BIAs), derive RTO and RPO values, and develop emergency and recovery plans. You’ll understand emergency response organizations (BAO), conduct BCM tests, and document audit-relevant evidence.

Three men collaborating on a laptop.

You’ll learn ISO 27001/27002 and BSI IT-Grundschutz, define protection requirements, model organizational structures, create control catalogs and policies, and implement Annex A requirements as well as the Statement of Applicability (SoA).

In the capstone project, you’ll apply everything you’ve learned: defining scope, identifying stakeholders, conducting full risk analyses and BIAs, documenting Annex A controls, and creating ISMS policies. You’ll consolidate all results into a complete, audit-ready ISMS documentation set.

Screenshots of the Tiny Trips app showing welcome screen, activity selection, map view, and thank you screen.

Final projects at Neue Fische & SPICED

Over 7,000 neuefische x SPICED alumni have completed a final project at the end of their studies. Join our successful graduates, and build a project that will make your CV stand out. Have a look at past projects and be inspired.

Simple and affordable

Education must be affordable.

Pay directly
No problem

The employer pays
Re- & Upskilling

For other payment options, please speak to our student advisor.

Two people working together on a laptop in an office.

FAQ

Really good questions, helpful answers

You still have questions about the training, the prices, the financing, etc.? Then take a look here or contact us directly.

This training is ideal for anyone aiming for a specialized career in information security, compliance, IT risk management, or Business Continuity Management (BCM). Deep technical IT knowledge is not required, as all fundamentals are covered during the program. It’s especially suitable for career switchers and professionals looking to expand their profile with management systems such as ISO 27001.

You’ll be able to build and maintain an audit-ready Information Security Management System (ISMS) in line with ISO 27001 and BSI IT-Grundschutz. You’ll conduct risk analyses (ISO 27005) and Business Impact Analyses (BIA), assess technical security measures, ensure GDPR compliance, and integrate new regulatory requirements such as NIS2 and the EU AI Act.

You’ll be well prepared for demanding roles at the intersection of IT, security, and management. Typical positions include Information Security Officer, ISMS Manager, IT Compliance Manager, Business Continuity Manager, or IT Risk Consultant.

You submit your online application and then take part in a personal interview with us. We’ll talk about your motivation, your interest in governance topics, and your career goals. If everything’s a match, you’ll receive your acceptance shortly after.


Two young adults standing back to back, one holding an orange retro telephone handset, the other holding the phone base.

What are you waiting for?

Our Student Admissions team is happy to talk with you, answer your questions, and advise you. Get in touch with us!

Our Students Say

Do not miss out.
Subscribe to our newsletter.

I would like to receive email updates from neue fische. This decision can be revoked at any time. Information on how we handle your data can be found in our privacy note.