DigitalTech EDIH

What is EDIH?
European Digital Innovation Hubs
EDIH (European Digital Innovation Hubs) is defined by the European Commission as a service organisation or consortium that supports businesses (in particular micro, small and medium-sized enterprises) and public sector institutions in digital transformation. EDIH provides back-up support to businesses and institutions that want to improve their business/production processes and use digital technologies to improve their services. It does this by testing and advising on the pre-deployment of different technologies (e.g. cybersecurity, blockchain), as well as by providing skills development and training. It will also help to identify sources of funding, capital raising opportunities and connect stakeholders.
By networking EDIHs, the aim is to create not-for-profit one-stop-shops that make the latest digital technologies available to all businesses.
Find out more about EDIH on the official site!
Courses:
You can participate in our courses online and in person (University of Debrecen, Faculty of Informatics – 4028 Debrecen, Kassai út 26.).
University of Debrecen Adult Education licence number: E/2020/000164
Course list:
Objective: The goal is to provide participants with an insight into the basic operation of Active Directory through primarily demonstrative training. After a brief overview, a smaller AD domain with its essential components will be set up during the course. The demonstration will place special emphasis on Open Source solutions. Security issues related to AD will also play a central role, allowing participants not only to learn about deployment and administration but also to understand potential threats.
Content:
- Introduction to the main components of Active Directory
- Installation and configuration of an AD domain
- Using Windows Server and UCS
- Administration and management of AD
- Security issues related to AD
Objective: The goal is to provide participants with an insight into the basic operation of Active Directory through primarily demonstrative training. After a brief overview, a smaller AD domain with its essential components will be set up during the course. The demonstration will place special emphasis on Open Source solutions. Security issues related to AD will also play a central role, allowing participants not only to learn about deployment and administration but also to understand potential threats.
Content:
- Introduction to the main components of Active Directory
- Installation and configuration of an AD domain
- Using Windows Server and UCS
- Administration and management of AD
- Security issues related to AD
Objective: This primarily demonstrative training aims to introduce participants to the practical use of Public Key Infrastructure (PKI) through real-world examples. By working through demonstration cases, participants will become familiar with the most common certificate usage scenarios. By the end of the training, they will have acquired a fundamental understanding of PKI, enabling them to: Create their own Certificate Signing Request (CSR), Generate and verify (self-signed) certificates (CRT), Utilize various certificate stores effectively
Content:
- Fundamentals of PKI
- Creating self-signed certificates
- Working with certificate chains
- Managing certificate stores
- Practical examples of certificate usage
Objective: This demonstrative training provides participants with insights into common configuration errors and malpractices found in backend services. The training covers relational database servers, web servers, and web application servers, with a particular focus on distributed services. By the end of the course, participants will be able to identify, eliminate, and prevent these issues effectively.
Content:
- Common configuration errors
- Configuring web servers for secure access
- Apache HTTPS and the mod_ssl module
- Creating certificates for web servers
Objective: This demonstrative training provides participants with insights into various remote access applications, their capabilities, and how to use them effectively. The course covers the fundamentals of remote access tools, their operating system-specific features, and common security requirements. Participants will also learn to identify potential security vulnerabilities in default settings and apply necessary corrections to enhance security.
Content:
- Secure remote access using SSH
- Secure file transfer methods
- Remote desktop solutions on Windows and Linux
Objective: This demonstrative training provides participants with an insight into the fundamental tools and techniques used for software vulnerability exploitation. Participants will learn vulnerability discovery methods (e.g., SearchSploit, Exploit-DB, GTFOBins) and gain awareness of potential threats and associated risks through live demonstrations of real-world attacks. By the end of the training, participants will be able to test common vulnerabilities and understand defensive techniques to mitigate security risks.
Content:
- Introduction to the purpose of ethical hacking, including the responsibilities of ethical hackers
- Overview of the complete structure of a penetration test
- Essential concepts and techniques used in (ethical) hacking
- Introduction to key tools commonly used by ethical hackers
Objective:
The aim of the course is to demonstrate the security-centric installation and configuration of GNU/Linux systems through practical examples, using a mainly demonstration approach. Participants will learn how to implement the ANSSI-BP-028 recommendation in the installation software of a supporting operating system (e.g. RedHat). Through concrete configuration examples, participants will be familiarised with the most important security recommendations and by the end of the training they will be able to navigate through the recommendations (80 in total).
Content:
- Presentation of the ANSSI-BP-028 recommendation
- Using the recommendation when installing GNU/Linux
- System configuration overview
- Overview of typical service configurations
Objective:The Advanced Ethical Hacking course builds on the previously announced Ethical Hacking course and is essentially a demonstration course, designed to familiarise participants with the tools and techniques used by ethical hackers. The course builds minimally on the Ethical Hacking course, but thanks to a short summary at the beginning, it is understandable and easy to follow for those who have no prior knowledge. The demonstration will cover (but not be exhaustive) some basic steps of Privilege Escalation, different enumeration techniques (SMB, SMTP, SNMP, etc.), web attacks, port forwarding, proxies, etc.
Content:
- Theoretical summary (covering the essential basics from the previous course)
- Enumeration techniques: web, SMB, SMTP, SNMP, etc.
- Web attacks: BurpSuite
- Accessing internal systems: SSH port forwarding, proxychain, sshuttle, etc.
Objective:The aim is to provide participants with an insight into the main security problems affecting the network infrastructure of businesses and institutions, and their solutions. The demonstration course will introduce some of the main elements of network and system security proposed by the NIS2 Directive, including, but not limited to, routers, next-gen firewalls, VPN services, monitoring systems, RADIUS, etc. The course will also provide a small-scale network infrastructure with basic security services and settings.
Content:
- Theoretical summary
- Routers, next-gen firewalls
- Deploying OpenVPN using RADIUS
- Installing and operating monitoring systems
Objective: The aim of the training is to familiarise the participant with the three basic concepts of IT security: confidentiality, integrity and availability (CIA triad) and the characteristics of the algorithms used to ensure these requirements. The characteristics of symmetric and asymmetric encryption, their differences and practical applications will be described. You will learn the steps of the digital signature process, including the role of public and secret keys and their practical implementation. During the training, the participants will gain insight into the operation and architecture of the Public Key Infrastructure, which plays a key role in public key management.
Content:
- Basic cryptographic concepts
- Basic communication situations
- Digital signature and key management
Objective: The aim of the training is to provide participants with an insight into the lifecycle of popular distributions of the GNU/Linux operating system, upgrade options and the differences between the various distributions, in a basically demonstration-based training. They will learn about the importance of upgrading and the dangers of using unsupported software and the potential damage it can cause. They will be able to choose the right software version for their long-term goals and will learn about several applications developed for automatic software updates.
Content:
- Introducing the GNU/Linux operating system, highlighting the differences between distributions and upgrade options
- Managing users and privileges
- Introduction to security-relevant configuration files and settings
- On demand: encrypting drives, using the OpenSSL library
Objective: Personal data protection involves an individual or a group hiding information about them. The course will give you a comprehensive overview of the techniques and methods used to protect your personal data, so that you can then protect it more consciously and at a higher level. They will learn about anonymity tools, generalisations of digital signatures, secure multiparty computing, secret sharing methods and zero-knowledge protocols.
Content:
- Important cryptographic concepts.
- Symmetric and asymmetric encryption algorithms.
- Communication anonymity.
- Digital signature and key management.
- Differential privacy.
- Homomorphic cryptography.
- Onion routing.
- Zero-knowledge protocols.
- Secret sharing.
Objective: It aims to develop participants’ IT security skills, focusing on vulnerabilities in real-world web applications. During the training, participants will learn about the current vulnerability list of the Open Web Application Security Project (OWASP) TOP 10 2021. Participants will gain insight into inappropriate access management, common web cryptography, authentication and update flaws, and incorrect security settings, among others.
Content:
OWASP 2021 web vulnerabilities
- Typical security issues in access management
- Improperly applied cryptographic solutions
- Insider attacks and their root causes
- Lack of secure design
- Configuration related errors
- Consequences of vulnerable and obsolete components
- Inadequate identification and authentication algorithms
- Software and data integrity failures
- Logging and monitoring problems
- Server-side request forgery
Objective: The aim of the training is to provide participants with a basic demonstration of the basic security risks of firewalls and to learn how to effectively apply typical firewall configuration settings. They will be able to interpret simple and extended log files related to firewalls, analyse them using filters and use them to detect potential attacks. They will learn how to install and operate the open-source pfSense firewall via a webgiun.
Content:
- Role and classification of firewalls
- Simple configuration of a built-in Linux firewall with uwf or firewallD utilities
- Windows Firewall basics and simple configuration options
Objective: The aim of the course is to give participants a deeper insight into the basic concepts, tools and practices of Web3 programming, with a focus on the development of decentralised applications (dApps) and smart contracts. The focus will be on the acquisition of theoretical and practical skills to enable participants to build secure and efficient Web3 applications.
Content:
- Overview of Web3 technologies
- Development of smart contracts and security principles
- Using Web3.js to develop decentralised applications
- Connecting to blockchain networks and managing transactions
- Typical mistakes in Web3 programming and how to avoid them
Objective: The aim of the training is to provide participants with an insight into the lifecycle of the current versions of the Windows operating system, the upgrade options and the differences between the different versions, through a mainly demonstration-based training. They will learn about the importance of upgrading and the dangers of using unsupported software and the potential damage it can cause. They will be able to choose the right software version for their long-term goals and will learn about several applications developed for automatic software updates. The training will also cover the basics of Active Directory and its management.
Content:
- Comparing Windows versions, showing the different software upgrade options
- Examples of basic vulnerabilities, including the importance of hardware and software security
- Active Directory basics and configuration
Previous courses:
Current services:
Besides our courses, you can also benefit from our free individual advice on cybersecurity and blockchain issues, which you can sign up for throughout the year at the following email address: torok.adrienn@inf.unideb.hu
Leader: Dr. Pintér-Huszti Andrea
Address: 4028 Debrecen, Kassai út 26.
Project co-ordinator::
Török Adrienn
torok.adrienn@inf.unideb.hu
expert executive
The “DigitalTech EDIH” project was supported by the Government of Hungary and the Parliamentary State Secretariat for Regional Development of the Prime Minister’s Office.

