{"id":3072,"date":"2020-02-04T11:46:47","date_gmt":"2020-02-04T09:46:47","guid":{"rendered":"https:\/\/security.sauer.ninja\/?page_id=3072"},"modified":"2024-04-09T11:25:26","modified_gmt":"2024-04-09T09:25:26","slug":"dominik","status":"publish","type":"page","link":"https:\/\/security.sauer.ninja\/en\/sauer\/dominik\/","title":{"rendered":"Dominik Sauer"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">About me<\/h2>\n\n\n<div style=\"float: right;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3707 \" src=\"https:\/\/security.sauer.ninja\/files\/dominiksauer-1.jpg\" alt=\"\" width=\"273\" height=\"342\" srcset=\"https:\/\/security.sauer.ninja\/files\/dominiksauer-1.jpg 480w, https:\/\/security.sauer.ninja\/files\/dominiksauer-1-240x300.jpg 240w\" sizes=\"auto, (max-width: 273px) 100vw, 273px\" \/><\/div>\n\n\n<p>According to Sunzi, a Chinese philosopher and strategist, &#8220;you have to know your enemy to defeat him&#8221;. In the context of computer science, it is about offensive security, which has accompanied me from the start of my studies. In addition to various IT security lectures such as &#8220;cryptography&#8221; or &#8220;digital forensics&#8221; at Darmstadt University of Applied Sciences (h_da), I took both the <strong>OSCP<\/strong> and the <strong>OSCE<\/strong> from &#8220;Offensive Security&#8221; and have been working as a <strong>penetration tester<\/strong> since binsec GmbH was founded. Over the years, it became more and more obvious to me that the key to more security is primarily in people, not in IT systems. When I finished my <strong>B.Sc. in computer science<\/strong> and my accumulated professional experience allowed me to <strong>hold university courses<\/strong>, I started to  put my students in the role of malicious attackers every semester.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>About me According to Sunzi, a Chinese philosopher and strategist, &#8220;you have to know your enemy to defeat him&#8221;. In the context of computer science, it is about offensive security, which has accompanied me from the start of my studies. In addition to various IT security lectures such as &#8220;cryptography&#8221; or &#8220;digital forensics&#8221; at Darmstadt &#8230; <span class=\"more\"><a class=\"more-link\" href=\"https:\/\/security.sauer.ninja\/en\/sauer\/dominik\/\">[Read more&#8230;]<\/a><\/span><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":3064,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["entry","page","publish","author-dsauer","post-3072"],"_links":{"self":[{"href":"https:\/\/security.sauer.ninja\/en\/wp-json\/wp\/v2\/pages\/3072","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/security.sauer.ninja\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/security.sauer.ninja\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/security.sauer.ninja\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/security.sauer.ninja\/en\/wp-json\/wp\/v2\/comments?post=3072"}],"version-history":[{"count":14,"href":"https:\/\/security.sauer.ninja\/en\/wp-json\/wp\/v2\/pages\/3072\/revisions"}],"predecessor-version":[{"id":3714,"href":"https:\/\/security.sauer.ninja\/en\/wp-json\/wp\/v2\/pages\/3072\/revisions\/3714"}],"up":[{"embeddable":true,"href":"https:\/\/security.sauer.ninja\/en\/wp-json\/wp\/v2\/pages\/3064"}],"wp:attachment":[{"href":"https:\/\/security.sauer.ninja\/en\/wp-json\/wp\/v2\/media?parent=3072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}