{"id":12040,"date":"2022-04-12T18:13:05","date_gmt":"2022-04-12T16:13:05","guid":{"rendered":"https:\/\/www.advens.test\/expertise\/securite-offensive\/"},"modified":"2025-07-31T14:50:16","modified_gmt":"2025-07-31T12:50:16","slug":"offensive-sicherheit","status":"publish","type":"expertise","link":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/solution\/offensive-sicherheit\/","title":{"rendered":"Offensive Security"},"content":{"rendered":"\n\n<div id=\"block-logos-1243881876\" class=\"acf-block-logos grid -six mb-4 alignwide\">\n  <div class=\"container\">\n    <div class=\"row\">\n      <div class=\"col-12\">\n              <\/div>\n    <\/div>\n  <\/div>\n  <div class=\"container bg-white py-3\">\n    <div class=\"row\">\n              <div class=\"col-4 col-md-2 mb-3 d-flex align-items-center justify-content-center\">\n          <div class=\"logo-container\" style=\"width: 120px; height: 80px; display: flex; align-items: center; justify-content: center;\">\n            <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/decathlon-fait-main-249x140.jpg\" alt=\"\" loading=\"lazy\" style=\"max-width: 100%; max-height: 100%; object-fit: contain;\"\/>\n          <\/div>\n        <\/div>\n              <div class=\"col-4 col-md-2 mb-3 d-flex align-items-center justify-content-center\">\n          <div class=\"logo-container\" style=\"width: 120px; height: 80px; display: flex; align-items: center; justify-content: center;\">\n            <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/tessi-fait-main-260x117.jpg\" alt=\"\" loading=\"lazy\" style=\"max-width: 100%; max-height: 100%; object-fit: contain;\"\/>\n          <\/div>\n        <\/div>\n              <div class=\"col-4 col-md-2 mb-3 d-flex align-items-center justify-content-center\">\n          <div class=\"logo-container\" style=\"width: 120px; height: 80px; display: flex; align-items: center; justify-content: center;\">\n            <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/bouygues-energies-249x140.jpg\" alt=\"\" loading=\"lazy\" style=\"max-width: 100%; max-height: 100%; object-fit: contain;\"\/>\n          <\/div>\n        <\/div>\n              <div class=\"col-4 col-md-2 mb-3 d-flex align-items-center justify-content-center\">\n          <div class=\"logo-container\" style=\"width: 120px; height: 80px; display: flex; align-items: center; justify-content: center;\">\n            <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/etam-fait-main-260x124.jpg\" alt=\"\" loading=\"lazy\" style=\"max-width: 100%; max-height: 100%; object-fit: contain;\"\/>\n          <\/div>\n        <\/div>\n              <div class=\"col-4 col-md-2 mb-3 d-flex align-items-center justify-content-center\">\n          <div class=\"logo-container\" style=\"width: 120px; height: 80px; display: flex; align-items: center; justify-content: center;\">\n            <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/cd62-plus-recent-fait-main-260x53.jpg\" alt=\"\" loading=\"lazy\" style=\"max-width: 100%; max-height: 100%; object-fit: contain;\"\/>\n          <\/div>\n        <\/div>\n              <div class=\"col-4 col-md-2 mb-3 d-flex align-items-center justify-content-center\">\n          <div class=\"logo-container\" style=\"width: 120px; height: 80px; display: flex; align-items: center; justify-content: center;\">\n            <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/danone-260x113.jpg\" alt=\"\" loading=\"lazy\" style=\"max-width: 100%; max-height: 100%; object-fit: contain;\"\/>\n          <\/div>\n        <\/div>\n          <\/div>\n  <\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n\n<div id=\"block-image-texte-816667580\" class=\"acf-block-image-texte alignwide\">\n  <div class=\"image-texte row gx-5 py-4 -gauche\">\n                            <div class=\"col-12 col-lg-6 image-container mb-3 mb-lg-0 \">\n              <div class=\"image mobile-full-width\">\n          <div class=\"image-content ratio-wrapper -square\" data-component=\"LazyImage\" >\n            <picture class=\"full bkg-cover\" >\n                              <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lyon-dsc2816-620x620.webp\" media=\"(min-width: 0px) and (max-width: 767.98px)\">\n                <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lyon-dsc2816-1320x1278.webp\" media=\"(min-width: 768px)\">\n                <img decoding=\"async\" class=\"img img-fluid rounded\" loading=\"lazy\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lyon-dsc2816-1320x1278.webp\" alt=\"\">\n                          <\/picture>\n          <\/div>\n        <\/div>\n                <\/div>\n    <div class=\"texte col-12 col-lg-6 -right d-flex flex-column justify-content-center align-items-start\">\n                    <h2 class=\"titre title-5\">\n          Penetrationstests und techische Audits &#8211; agil verwaltet\n        <\/h2>\n                    <div class=\"text-content\">\n          <p><span data-contrast=\"auto\">Planen, durchf\u00fchren und verwalten von Penetration Tests und techische Audits -f\u00fcr alle Bereiche Ihres Unternehmens. Dabei setzen wir agile Methoden ein, die sich in Ihre verschiedenen Projekte integrieren lassen.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Gemeinsam finden wir den optimalen Ansatz, der Ihren Sicherheitsanforderungen entspricht \u2013 eine intelligentere Vorgehensweise f\u00fcr besseren Schutz und \u00fcberzeugendere Ergebnisse.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n\n        <\/div>\n                            <\/div>\n  <\/div>\n<\/div>\n\n\n\n\n<div id=\"block-image-texte-423415076\" class=\"acf-block-image-texte alignwide\">\n  <div class=\"image-texte row gx-5 py-4 -droite\">\n                            <div class=\"col-12 col-lg-6 image-container mb-3 mb-lg-0 -right\">\n              <div class=\"image mobile-full-width\">\n          <div class=\"image-content ratio-wrapper -square\" data-component=\"LazyImage\" >\n            <picture class=\"full bkg-cover\" >\n                              <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc1921-620x620.webp\" media=\"(min-width: 0px) and (max-width: 767.98px)\">\n                <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc1921-1320x1278.webp\" media=\"(min-width: 768px)\">\n                <img decoding=\"async\" class=\"img img-fluid rounded\" loading=\"lazy\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc1921-1320x1278.webp\" alt=\"\">\n                          <\/picture>\n          <\/div>\n        <\/div>\n                <\/div>\n    <div class=\"texte col-12 col-lg-6  d-flex flex-column justify-content-center align-items-start\">\n                    <h2 class=\"titre title-5\">\n          Wir greifen Sie an &#8211;  zu Ihrem Schutz\n        <\/h2>\n                    <div class=\"text-content\">\n          <p><span class=\"TextRun SCXW118775075 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW118775075 BCX8\">Unsere Experten nutzen jedes Werkzeug in ihrem Arsenal, um Ihre Sicherheitslage aus organisatorischer, logischer und physischer Perspektive zu bewerten.<\/span><\/span><span class=\"EOP SCXW118775075 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li><strong><span class=\"TextRun SCXW63930078 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW63930078 BCX8\">Organisations- und Funktionsaudit<\/span><\/span><\/strong><span class=\"TextRun SCXW63930078 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW63930078 BCX8\"><strong>: <\/strong>Bewertung des allgemeinen Sicherheitsniveaus und der Einhaltungvon Best Practices, sowie interner oder regulatorischer Anforderungen (z.B. ISO 27001, ISO 27701, <span data-olk-copy-source=\"MessageBody\">BSI IT-Grundschutz, BSI C5, NIS2, DORA<\/span>).<\/span><\/span><span class=\"EOP SCXW63930078 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><strong><span class=\"TextRun SCXW176335297 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW176335297 BCX8\">Architekturaudit<\/span><\/span><\/strong><span class=\"TextRun SCXW176335297 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW176335297 BCX8\"><strong>:<\/strong> \u00dcberpr\u00fcfung von Informationssystemen oder einer Infrastruktur auf den &#8222;Stand der Technik&#8220;.<\/span><\/span><span class=\"EOP SCXW176335297 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><strong><span class=\"TextRun SCXW212707758 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW212707758 BCX8\">Einrichtungsaudit<\/span><\/span><\/strong><span class=\"TextRun SCXW212707758 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW212707758 BCX8\"><strong>:<\/strong>\u00a0 \u00dcberpr\u00fcfung des Sicherheitsniveaus oder der Compliance von Komponenten in Bezug auf interne oder regulatorische Standards.<\/span><\/span><span class=\"EOP SCXW212707758 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><strong><span class=\"TextRun SCXW29123244 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW29123244 BCX8\">Quellcodepr\u00fcfung<\/span><\/span><\/strong><span class=\"TextRun SCXW29123244 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW29123244 BCX8\"><strong>:<\/strong> Identifizierung aller Sicherheitsrisiken und Verbesserungspotenziale anhand von Best Practices des Quellcodes.<\/span><\/span><span class=\"EOP SCXW29123244 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><strong><span class=\"TextRun SCXW122744505 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW122744505 BCX8\">Penetrationstest<\/span><\/span><\/strong><span class=\"TextRun SCXW122744505 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW122744505 BCX8\"><strong>:<\/strong> Durchf\u00fchrung von Pentests f\u00fcr Infrastrukturen, Anwendungen sowie Clouds zur ersten Feststellung des Sicherheitsniveaus und Einsch\u00e4tzung des verbundenen Risikos mit detailliertem Reporting der festgestellten Schwachstellen.<\/span><\/span><\/li>\n<li><strong><span class=\"TextRun SCXW203593884 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW203593884 BCX8\">Social<\/span><span class=\"NormalTextRun SCXW203593884 BCX8\"> Engineering<\/span><\/span><\/strong><span class=\"TextRun SCXW203593884 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW203593884 BCX8\"><strong>:<\/strong> Der Mensch ist das schw\u00e4chste Glied: Wir gehen in die Rolle der Angreifer und f\u00fchren Phishing-Kampagnen, gef\u00e4lschte Telefonanrufe oder physische Angriffe durch.<\/span><\/span><span class=\"EOP SCXW203593884 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n\n        <\/div>\n                            <\/div>\n  <\/div>\n<\/div>\n\n\n\n\n<div id=\"block-colonnes-137982859\" class=\"acf-block-colonnes colonnes alignwide\">\n  <div class=\"container\">\n    <div class=\"row mb-4\">\n      <div class=\"col-12\">\n        <h3>Ein Ansatz, der an alle Ihre Bereiche angepasst ist <\/h3>\n                      <\/div>\n    <\/div>\n\n                  \n    <div class=\"row row-colonnes row-cols-1 row-cols-md-2 row-cols-xl-4 gy-4 mb-4 mb-xl-5\">\n              <div class=\"col -img\">\n          <div class=\"card h-100 bg-grey-white border-0\">\n            <div class=\"card-body\">\n                                                                  <div class=\"round-img mb-3\">\n                        <img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/03\/unsplash-nd5ou1duhf0-150x150.jpg\" alt=\"unsplash_nd5oU1Duhf0\" loading=\"lazy\"\/>\n                    <\/div>\n                                              <h4>Audit OT &#038; IoT<\/h4>\n              \n                          <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col -img\">\n          <div class=\"card h-100 bg-grey-white border-0\">\n            <div class=\"card-body\">\n                                                                  <div class=\"round-img mb-3\">\n                        <img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/8-150x150.jpg\" alt=\"8\" loading=\"lazy\"\/>\n                    <\/div>\n                                              <h4>Audit Cloud<\/h4>\n              \n                          <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col -img\">\n          <div class=\"card h-100 bg-grey-white border-0\">\n            <div class=\"card-body\">\n                                                                  <div class=\"round-img mb-3\">\n                        <img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/10-150x150.jpg\" alt=\"10\" loading=\"lazy\"\/>\n                    <\/div>\n                                              <h4>Simulation von Ransomware<\/h4>\n              \n                          <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col -img\">\n          <div class=\"card h-100 bg-grey-white border-0\">\n            <div class=\"card-body\">\n                                                                  <div class=\"round-img mb-3\">\n                        <img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/3-150x150.jpg\" alt=\"3\" loading=\"lazy\"\/>\n                    <\/div>\n                                              <h4>Audit DevSecOps<\/h4>\n              \n                          <\/div>\n          <\/div>\n        <\/div>\n          <\/div>\n  <\/div>\n<\/div>\n\n\n\n\n<div id=\"block-image-texte-255357529\" class=\"acf-block-image-texte alignwide\">\n  <div class=\"image-texte row gx-5 py-4 -gauche\">\n                            <div class=\"col-12 col-lg-6 image-container mb-3 mb-lg-0 \">\n              <div class=\"image mobile-full-width\">\n          <div class=\"image-content ratio-wrapper -square\" data-component=\"LazyImage\" >\n            <picture class=\"full bkg-cover\" >\n                              <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc1320-620x620.webp\" media=\"(min-width: 0px) and (max-width: 767.98px)\">\n                <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc1320-1278x1320.webp\" media=\"(min-width: 768px)\">\n                <img decoding=\"async\" class=\"img img-fluid rounded\" loading=\"lazy\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc1320-1278x1320.webp\" alt=\"\">\n                          <\/picture>\n          <\/div>\n        <\/div>\n                <\/div>\n    <div class=\"texte col-12 col-lg-6 -right d-flex flex-column justify-content-center align-items-start\">\n                    <h2 class=\"titre title-5\">\n          Angreifen, um Sie besser zu sch\u00fctzen\n        <\/h2>\n                    <div class=\"text-content\">\n          <p><span class=\"TextRun SCXW124973416 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW124973416 BCX8\">\u00dcbungen unter realen Bedingungen erm\u00f6glichen es uns, Ihre Abwehrmechanismen zu testen und so die Sicherheit Ihres Informationssystems zu st\u00e4rken.<\/span><\/span><\/p>\n<ul>\n<li><strong><span class=\"TextRun SCXW199649814 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW199649814 BCX8\">Red<\/span><span class=\"NormalTextRun SCXW199649814 BCX8\"> Team<\/span><\/span><\/strong><span class=\"TextRun SCXW199649814 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW199649814 BCX8\"><strong>:<\/strong> Eine realit\u00e4tsnahe Intrusionskampagne, inspiriert von Szenarien, wie sie bereits von kriminellen Gruppen eingesetzt wurden, die auf die kritischsten Bereiche Ihrer Arbeit abzielt. Ein Programm, das Internet-, <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW199649814 BCX8\">Social<\/span><span class=\"NormalTextRun SCXW199649814 BCX8\">-Engineering- und physische Angriffe kombiniert.<\/span><\/span><span class=\"EOP SCXW199649814 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li><strong><span class=\"TextRun SCXW150874399 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW150874399 BCX8\">Purple Team<\/span><\/span><\/strong><span class=\"TextRun SCXW150874399 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW150874399 BCX8\"><strong>:<\/strong> Eine Reihe von Angriffen durch das <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW150874399 BCX8\">Red<\/span><span class=\"NormalTextRun SCXW150874399 BCX8\"> Team, begleitet von der \u00dcberwachung, Erkennung und Reaktionsf\u00e4higkeit des Blue Teams bis hin zur tats\u00e4chlichen Abwehr der Angriffe. Diese Kombination verbessert Ihren \u00dcberwachungsplan sowie alle Ihre Abwehrprozesse.<\/span><\/span><span class=\"EOP SCXW150874399 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n\n        <\/div>\n                            <\/div>\n  <\/div>\n<\/div>\n\n\n\n\n<div id=\"block-image-texte-1140787792\" class=\"acf-block-image-texte alignwide\">\n  <div class=\"image-texte row gx-5 py-4 -droite\">\n                            <div class=\"col-12 col-lg-6 image-container mb-3 mb-lg-0 -right\">\n              <div class=\"image mobile-full-width\">\n          <div class=\"image-content ratio-wrapper -square\" data-component=\"LazyImage\" >\n            <picture class=\"full bkg-cover\" >\n                              <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/advens-reportage-lyon-dsc2763-620x620.webp\" media=\"(min-width: 0px) and (max-width: 767.98px)\">\n                <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/advens-reportage-lyon-dsc2763-1320x1179.webp\" media=\"(min-width: 768px)\">\n                <img decoding=\"async\" class=\"img img-fluid rounded\" loading=\"lazy\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/advens-reportage-lyon-dsc2763-1320x1179.webp\" alt=\"\">\n                          <\/picture>\n          <\/div>\n        <\/div>\n                <\/div>\n    <div class=\"texte col-12 col-lg-6  d-flex flex-column justify-content-center align-items-start\">\n                    <h2 class=\"titre title-5\">\n          Ein zertifizierter Service mit Qualit\u00e4tsgarantie\n        <\/h2>\n                    <div class=\"text-content\">\n          <p><span data-contrast=\"auto\">Advens ist ein qualifizierter Anbieter von Informationssicherheitsaudits (PASSI) f\u00fcr alle Audit- und Penetrationstestbereiche.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Dieses Zertifizierungslabel bef\u00e4higt uns, die im franz\u00f6sischen allgemeinen Sicherheitsrahmen (RGS) und im franz\u00f6sischen Milit\u00e4rprogrammgesetz vorgeschriebenen Audits durchzuf\u00fchren.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n\n        <\/div>\n                            <\/div>\n  <\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n  \n<div id=\"block-chiffres-1050817663\" class=\"acf-block-chiffres alignwide\">\n  <div class=\"container\">\n    <div class=\"row\">\n      <div class=\"col-12\">\n        <h3>In Zahlen<\/h3>\n      <\/div>\n    <\/div>\n  <\/div>\n  <div class=\"container\">\n    <div class=\"row row-cols-2 row-cols-xl-4 g-3 g-xl-5\">\n              <div class=\"col\">\n          <div class=\"card bg-grey-white border-0 h-100\">\n            <div class=\"card-body\">\n              <strong class=\"value\">100<\/strong>\n              <p class=\"text\">Berater aus ganz Europa<\/p>\n            <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col\">\n          <div class=\"card bg-grey-white border-0 h-100\">\n            <div class=\"card-body\">\n              <strong class=\"value\">600<\/strong>\n              <p class=\"text\">durchgef\u00fchrte Audit-Eins\u00e4tze pro Jahr<\/p>\n            <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col\">\n          <div class=\"card bg-grey-white border-0 h-100\">\n            <div class=\"card-body\">\n              <strong class=\"value\">250<\/strong>\n              <p class=\"text\">PASSI-Audit-Tage im Jahr 2021<\/p>\n            <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col\">\n          <div class=\"card bg-grey-white border-0 h-100\">\n            <div class=\"card-body\">\n              <strong class=\"value\">1<\/strong>\n              <p class=\"text\">einziges Portal zur \u00dcberwachung Ihrer Audit-Kampagnen<\/p>\n            <\/div>\n          <\/div>\n        <\/div>\n          <\/div>\n  <\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n\n<div id=\"block-interviews-185453376\" class=\"acf-block-interviews interviews alignwide\">\n      <div class=\"default-block-header header\">\n      <h2 class=\"title-6 title\">Ihr Kontakt<\/h2>\n    <\/div>\n  \n                    <div class=\"container\">\n          <div class=\"row\">\n            <div class=\"col-12 col-xl-6 d-flex flex-column justify-content-center\">\n              <blockquote>\n                <p class=\"introduction introduction text-primary fs-3\">\n                  \u201eJeden Tag entdecken wir neue Angriffstechniken, die unser Audit-Arsenal und unser Angebot bereichern.\u201c \n                <\/p>\n                <cite>\n                  <strong class=\"texte-moyen-bold d-flex\">Christopher Kn\u00f6ll<\/strong>\n                  <span class=\"texte-moyen\">VP Services<\/span>\n                <\/cite>\n              <\/blockquote>\n              <div class=\"btns\">\n                                                  <a class=\"btn btn-primary\" href=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/kontakt\/\" target=\"\" title=\"Kontaktieren Sie uns\">\n                    Kontaktieren Sie uns\n                  <\/a>\n                              <\/div>\n            <\/div>\n            <div class=\"col-12 col-xl-6\">\n                              <div class=\"wrapper-img\">\n                  <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/website-profilbilder-1-855x570.png\" alt=\"Christopher Kn\u00f6ll\" loading=\"lazy\" class=\"img-fluid\"\/>\n                <\/div>\n                          <\/div>\n          <\/div>\n        <\/div>\n            <\/div>\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n\n  \n  \n  \n\n  \n  <div id=\"block-push-3-colonnes-667694642\" class=\"acf-block-push-contenus-3colonnes \">\n                                                \n      <div class=\"post-item card card-push card__push3 card-push-all card-push__post h-100\">\n        <a class=\"card-link card-push__link\" href=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/media\/cyber-news-de\/cyber-horizons-edr-alles-was-sie-ueber-endpoint-detection-and-response-loesungen-wissen-muessen\/\" target=\"\" title=\"Cyber Horizons EDR: Alles, was Sie \u00fcber Endpoint Detection and Response-L\u00f6sungen wissen m\u00fcssen\u00a0\"><\/a>\n        <div class=\"card-push__img\">\n          <img decoding=\"async\" class=\"card-img-top img-fluid\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/05\/soc-definition-1024x683-1-700x480.jpg\" alt=\"\">\n        <\/div>\n                  <div class=\"card-body d-flex flex-column align-items-start\">\n                          <span class=\"card-push__badge badge rounded-pill text-bg-primary text-white fw-400 mt-2 mb-3\">\n                Cyber News, Security Operations\n              <\/span>\n                                    <h3 class=\"card-h card-push__h3 text-grey-carbon my-auto\">Cyber Horizons EDR: Alles, was Sie \u00fcber Endpoint Detection and Response-L\u00f6sungen wissen m\u00fcssen\u00a0<\/h3>\n                        <span class=\"card-text small text-grey-light mt-auto py-2\">28 Juli 2025<\/span>\n          <\/div>\n              <\/div>\n                                                \n      <div class=\"post-item card card-push card__push3 card-push-all card-push__post h-100\">\n        <a class=\"card-link card-push__link\" href=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/media\/security-operations-de\/cyberangriffe-2024-2025-das-wichtigste-im-ueberblick\/\" target=\"\" title=\"Panorama der Cyberangriffe 2024-2025: Das Wichtigste im \u00dcberblick\"><\/a>\n        <div class=\"card-push__img\">\n          <img decoding=\"async\" class=\"card-img-top img-fluid\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/06\/Rapport-sur-letat-de-la-menace-2025-Cyberattaques-2024-1-1-700x480.jpg\" alt=\"Rapport sur l'\u00e9tat de la menace 2025 - Cyberattaques 2024\">\n        <\/div>\n                  <div class=\"card-body d-flex flex-column align-items-start\">\n                          <span class=\"card-push__badge badge rounded-pill text-bg-primary text-white fw-400 mt-2 mb-3\">\n                Security Operations\n              <\/span>\n                                    <h3 class=\"card-h card-push__h3 text-grey-carbon my-auto\">Panorama der Cyberangriffe 2024-2025: Das Wichtigste im \u00dcberblick<\/h3>\n                        <span class=\"card-text small text-grey-light mt-auto py-2\">12 Juni 2025<\/span>\n          <\/div>\n              <\/div>\n                                                \n      <div class=\"post-item card card-push card__push3 card-push-all card-push__post h-100\">\n        <a class=\"card-link card-push__link\" href=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/media\/security-operations-de\/sicherung-des-active-directory-herausforderungen-und-loesungen\/\" target=\"\" title=\"Sicherung des Active Directory: Herausforderungen und L\u00f6sungen\"><\/a>\n        <div class=\"card-push__img\">\n          <img decoding=\"async\" class=\"card-img-top img-fluid\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/securiser-active-directory-1024x683-1-700x480.webp\" alt=\"\">\n        <\/div>\n                  <div class=\"card-body d-flex flex-column align-items-start\">\n                          <span class=\"card-push__badge badge rounded-pill text-bg-primary text-white fw-400 mt-2 mb-3\">\n                Security Operations\n              <\/span>\n                                    <h3 class=\"card-h card-push__h3 text-grey-carbon my-auto\">Sicherung des Active Directory: Herausforderungen und L\u00f6sungen<\/h3>\n                        <span class=\"card-text small text-grey-light mt-auto py-2\">19 Mai 2025<\/span>\n          <\/div>\n              <\/div>\n                                                \n      <div class=\"post-item card card-push card__push3 card-push-all card-push__post h-100\">\n        <a class=\"card-link card-push__link\" href=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/media\/cyber-strategy-de\/umgang-mit-cyberangriffen-im-industriellen-umfeld\/\" target=\"\" title=\"Umgang mit Cyberangriffen im industriellen Umfeld\"><\/a>\n        <div class=\"card-push__img\">\n          <img decoding=\"async\" class=\"card-img-top img-fluid\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/cyberattaques-en-environnement-industriel-1024x683-1-700x480.webp\" alt=\"\">\n        <\/div>\n                  <div class=\"card-body d-flex flex-column align-items-start\">\n                          <span class=\"card-push__badge badge rounded-pill text-bg-primary text-white fw-400 mt-2 mb-3\">\n                Cyber Strategy\n              <\/span>\n                                    <h3 class=\"card-h card-push__h3 text-grey-carbon my-auto\">Umgang mit Cyberangriffen im industriellen Umfeld<\/h3>\n                        <span class=\"card-text small text-grey-light mt-auto py-2\">19 Mai 2025<\/span>\n          <\/div>\n              <\/div>\n      <\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n\n<div id=\"block-colonnes-1852497793\" class=\"acf-block-colonnes colonnes alignwide\">\n  <div class=\"container\">\n    <div class=\"row mb-4\">\n      <div class=\"col-12\">\n        <h3>Warum Advens w\u00e4hlen?  <\/h3>\n                  <p><span class=\"TextRun SCXW195810693 BCX8\" lang=\"DE\" xml:lang=\"DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW195810693 BCX8\">Wir begleiten Sie langfristig bei all Ihren Cyberprojekten, damit keine Bedrohung Ihre Gesch\u00e4ftst\u00e4tigkeit beeintr\u00e4chtigen kann.<\/span><\/span><span class=\"EOP SCXW195810693 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n\n                          <a class=\"link\" href=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/uber-advens\/\" target=\"_blank\" title=\"\u00dcber Advens \">\n            \u00dcber Advens \n          <\/a>\n              <\/div>\n    <\/div>\n\n                  \n    <div class=\"row row-colonnes row-cols-1 row-cols-md-2 row-cols-xl-4 gy-4 mb-4 mb-xl-5\">\n              <div class=\"col -img\">\n          <div class=\"card h-100 bg-grey-white border-0\">\n            <div class=\"card-body\">\n                                          <h4>Ein umfassendes Angebot <\/h4>\n              <p><span class=\"TextRun SCXW93473934 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW93473934 BCX8\">Die Kombination aus erstklassiger Expertise und einem \u201e<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW93473934 BCX8\">as<\/span><span class=\"NormalTextRun SCXW93473934 BCX8\">-a-service\u201c-Ansatz.<\/span><\/span><span class=\"EOP SCXW93473934 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n\n                          <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col -img\">\n          <div class=\"card h-100 bg-grey-white border-0\">\n            <div class=\"card-body\">\n                                          <h4>Ausgezeichnete Expertise<\/h4>\n              <p><span data-contrast=\"auto\">Services, die durch die Sicherheitszertifikate der ANSSI <span class=\"TextRun SCXW144384766 BCX8\" lang=\"DE\" xml:lang=\"DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW144384766 BCX8\">anerkannt sind, und zertifizierte Experten.<\/span><\/span><\/span><\/p>\n\n                          <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col -img\">\n          <div class=\"card h-100 bg-grey-white border-0\">\n            <div class=\"card-body\">\n                                          <h4>Security-as-a-Service <\/h4>\n              <p><span class=\"TextRun SCXW188298916 BCX8\" lang=\"DE\" xml:lang=\"DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW188298916 BCX8\">Ein einzigartiger Service, der erweiterten Schutz, Flexibilit\u00e4t und Kostenoptimierung vereint.<\/span><\/span><span class=\"EOP SCXW188298916 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n\n                          <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col -img\">\n          <div class=\"card h-100 bg-grey-white border-0\">\n            <div class=\"card-body\">\n                                          <h4>Pragmatismus und Verst\u00e4ndlichkeit <\/h4>\n              <p><span class=\"TextRun SCXW191566321 BCX8\" lang=\"DE\" xml:lang=\"DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW191566321 BCX8\">Ans\u00e4tze, die zug\u00e4nglich, bedarfsorientiert und ergebnisorientiert sind.<\/span><\/span><span class=\"EOP SCXW191566321 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n\n                          <\/div>\n          <\/div>\n        <\/div>\n          <\/div>\n  <\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Gehen wir in die Offensive: Wir testen Ihr Unternehmen und seine Cybersicherheit, indem wir die Methoden echter Angreifer simulieren. So decken wir Schwachstellen auf, bevor andere sie finden \u2013 und st\u00e4rken gezielt Ihre Abwehr.<\/p>\n","protected":false},"featured_media":11177,"template":"","taxo_expertise":[],"class_list":["post-12040","expertise","type-expertise","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>F\u00fchren Sie ein Cybersicherheitsaudit durch, um Ihr Sicherheitsniveau zu bewerten pour \u00e9valuer votre niveau de s\u00e9curit\u00e9<\/title>\n<meta name=\"description\" content=\"Die Cybersicherheit Ihrer Organisation basiert auf Audits und einem Kontrollplan (Penetrationstests, Konfigurationspr\u00fcfungen, Red-Teaming usw.).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.advens.test\/solution\/securite-offensive\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"F\u00fchren Sie ein Cybersicherheitsaudit durch, um Ihr Sicherheitsniveau zu bewerten pour \u00e9valuer votre niveau de s\u00e9curit\u00e9\" \/>\n<meta property=\"og:description\" content=\"Die Cybersicherheit Ihrer Organisation basiert auf Audits und einem Kontrollplan (Penetrationstests, Konfigurationspr\u00fcfungen, Red-Teaming usw.).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.advens.test\/solution\/securite-offensive\/\" \/>\n<meta property=\"og:site_name\" content=\"Advens\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-31T12:50:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.advens.test\/app\/uploads\/2022\/05\/advens-video-capture-ftm-14.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"801\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.advens.test\/solution\/securite-offensive\/\",\"url\":\"https:\/\/www.advens.test\/solution\/securite-offensive\/\",\"name\":\"F\u00fchren Sie ein Cybersicherheitsaudit durch, um Ihr Sicherheitsniveau zu bewerten pour \u00e9valuer votre niveau de s\u00e9curit\u00e9\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.test\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.advens.test\/solution\/securite-offensive\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/solution\/securite-offensive\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-ftm-14.jpg\",\"datePublished\":\"2022-04-12T16:13:05+00:00\",\"dateModified\":\"2025-07-31T12:50:16+00:00\",\"description\":\"Die Cybersicherheit Ihrer Organisation basiert auf Audits und einem Kontrollplan (Penetrationstests, Konfigurationspr\u00fcfungen, Red-Teaming usw.).\",\"breadcrumb\":{\"@id\":\"https:\/\/www.advens.test\/solution\/securite-offensive\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.advens.test\/solution\/securite-offensive\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.advens.test\/solution\/securite-offensive\/#primaryimage\",\"url\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-ftm-14.jpg\",\"contentUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-ftm-14.jpg\",\"width\":1920,\"height\":801},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.advens.test\/solution\/securite-offensive\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.advens.test\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Offensive Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.advens.test\/#website\",\"url\":\"https:\/\/www.advens.test\/\",\"name\":\"Advens\",\"description\":\"For Cyber, People &amp; Planet\",\"publisher\":{\"@id\":\"https:\/\/www.advens.test\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.advens.test\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.advens.test\/#organization\",\"name\":\"Advens\",\"url\":\"https:\/\/www.advens.test\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"contentUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"width\":1501,\"height\":1501,\"caption\":\"Advens\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/advens\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"F\u00fchren Sie ein Cybersicherheitsaudit durch, um Ihr Sicherheitsniveau zu bewerten pour \u00e9valuer votre niveau de s\u00e9curit\u00e9","description":"Die Cybersicherheit Ihrer Organisation basiert auf Audits und einem Kontrollplan (Penetrationstests, Konfigurationspr\u00fcfungen, Red-Teaming usw.).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.advens.test\/solution\/securite-offensive\/","og_locale":"de_DE","og_type":"article","og_title":"F\u00fchren Sie ein Cybersicherheitsaudit durch, um Ihr Sicherheitsniveau zu bewerten pour \u00e9valuer votre niveau de s\u00e9curit\u00e9","og_description":"Die Cybersicherheit Ihrer Organisation basiert auf Audits und einem Kontrollplan (Penetrationstests, Konfigurationspr\u00fcfungen, Red-Teaming usw.).","og_url":"https:\/\/www.advens.test\/solution\/securite-offensive\/","og_site_name":"Advens","article_modified_time":"2025-07-31T12:50:16+00:00","og_image":[{"width":1920,"height":801,"url":"https:\/\/www.advens.test\/app\/uploads\/2022\/05\/advens-video-capture-ftm-14.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.advens.test\/solution\/securite-offensive\/","url":"https:\/\/www.advens.test\/solution\/securite-offensive\/","name":"F\u00fchren Sie ein Cybersicherheitsaudit durch, um Ihr Sicherheitsniveau zu bewerten pour \u00e9valuer votre niveau de s\u00e9curit\u00e9","isPartOf":{"@id":"https:\/\/www.advens.test\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.advens.test\/solution\/securite-offensive\/#primaryimage"},"image":{"@id":"https:\/\/www.advens.test\/solution\/securite-offensive\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-ftm-14.jpg","datePublished":"2022-04-12T16:13:05+00:00","dateModified":"2025-07-31T12:50:16+00:00","description":"Die Cybersicherheit Ihrer Organisation basiert auf Audits und einem Kontrollplan (Penetrationstests, Konfigurationspr\u00fcfungen, Red-Teaming usw.).","breadcrumb":{"@id":"https:\/\/www.advens.test\/solution\/securite-offensive\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.advens.test\/solution\/securite-offensive\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.advens.test\/solution\/securite-offensive\/#primaryimage","url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-ftm-14.jpg","contentUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-ftm-14.jpg","width":1920,"height":801},{"@type":"BreadcrumbList","@id":"https:\/\/www.advens.test\/solution\/securite-offensive\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.advens.test\/de\/"},{"@type":"ListItem","position":2,"name":"Offensive Security"}]},{"@type":"WebSite","@id":"https:\/\/www.advens.test\/#website","url":"https:\/\/www.advens.test\/","name":"Advens","description":"For Cyber, People &amp; Planet","publisher":{"@id":"https:\/\/www.advens.test\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.advens.test\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.advens.test\/#organization","name":"Advens","url":"https:\/\/www.advens.test\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.advens.test\/#\/schema\/logo\/image\/","url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","contentUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","width":1501,"height":1501,"caption":"Advens"},"image":{"@id":"https:\/\/www.advens.test\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/advens\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/wp-json\/wp\/v2\/expertise\/12040","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/wp-json\/wp\/v2\/expertise"}],"about":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/wp-json\/wp\/v2\/types\/expertise"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/wp-json\/wp\/v2\/media\/11177"}],"wp:attachment":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/wp-json\/wp\/v2\/media?parent=12040"}],"wp:term":[{"taxonomy":"taxo_expertise","embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/wp-json\/wp\/v2\/taxo_expertise?post=12040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}