Course
Digicomp Code P2S
The Basics of IT Security («P2S»)
Course facts
- Determining the need for protection in companies and projects using best-practice approaches
- Proposing suitable safety measures
- Knowing the possibilities of continuous monitoring of the safety measures taken
1 The fundamentals of a security concept in accordance with BSI IT-Grundschutz
- Structural analysis and protection requirements assessment
- Modeling with BSI modules
- Qualitative and quantitative assessment of advanced risks
2 Targeted implementation of comprehensive security measures
- Personnel security measures
- Planning awareness measures
- Organizational security measures
- Technical security measures
- Physical security measures
- Integration of emergency management (BCM)
3 Control and monitoring of information security
- Overview of control and monitoring measures
- Overview of security auditing
Component of the following courses
The course is aimed at administrators, IT specialists, project managers, and IT managers who want to strengthen their organization with comprehensive information security measures in accordance with IT-Grundschutz.
Basic knowledge of information security analogous to the following course, as well as good basic IT skills:
Please note: In this training, the BSI IT-Grundschutz method is considered. However, the preparation for the certification of the ISMS according to the German BSI IT-Grundschutz or the German KRITIS law is not part of the training.
RDP info
Participants must have a remote desktop client installed on their PC/notebook.
- Under Windows, the official Microsoft client is usually already installed
- macOS users can download the official Microsoft client from the Apple App Store: https://apps.apple.com/ch/app/microsoft-remote-desktop/id1295203466
Important: For security reasons, companies often block a remote desktop connection on business devices and in the company network. It is recommended to participate in the training on a private device and not on the company network. Alternatively, you can clarify in advance with the responsible IT department whether remote desktop connections are possible.