About Me

| Who am I


  • CCDP
  • CCNP
  • Cisco Access Routing & LAN Switching Specialist – CQS-CARLESS
  • ITIL Foundation


  • Novell Academic Instructor for Linux
  • Cisco Certified Academy Instructor


| get in touch

Wiederitzscher Straße 13
04155 Leipzig

Your Name (required)

Your Email (required)


Your Message


| legal details

Angaben gemäß § 5 TMG:

Robert Backhaus
Wiederitzscher Str. 13
04155 Leipzig


E-Mail: r.backhaus[ at ]baitco.de


| recent work
  • Conception BAITCO help in the preparation and validation of concepts for Internet and Intranet systems that meet current safety requirements – and in close cooperation with your IT staff on site. I have many years experience in the design and protection of IP-based systems. Security aspects to take into account already in the planning phase is the long term save money and nerves. This is particularly true for such important projects like the construction of encrypted infrastructure systems and the deployment of security policies. Here I’ll help you avoid many mistakes from the beginning, and to include the motivation of employees in the planning
  • Implementation Especially in safety-critical systems, a clean implementation, and extensive documentation is essential. The best approach will not help if it is not respected in the implementation of safety systems or your staff due to poor documentation not sure grip. I assisted in the installation and migration of conceptioned systems or lead them by themselves. Your employees will be admitted after migration into the system to receive a detailed documentation.
  • Securitychecks Safety is in creation of internet and intranet systems are not always the top priority. To discover errors in concept and implementation in hindsight, a broad spectrum of experience and knowledge is necessary. A simple scan with a security scanner such as Nessus, ISS, etc. often shows less than half the actual problems. I examine both individual systems and firewall configurations, as well as entire networks to security problems. In the investigation carried out either from the perspective of an attacker from the outside, or from the perspective of an insider. After I create a detailed report explaining the problems found are detailed and well-founded recommendations to address the discovered vulnerabilities. On request, a periodic repetition of the tests for the detection of newly formed or in the meantime become known vulnerabilities is possible.
  • Training Qualified operation and maintenance of IT systems requires a high level of current knowledge and experience. I lead six years trainings and courses for both technical staff and for the management level through.