Course
digicode: SAW
IT security for users at the workplace
Course facts
- Understanding the main dangers and risks of using PCs, the Internet and email
- Understanding the defensive measures that can be taken or requested against them
- Understanding the main legal frameworks
1 General IT Security Measures
- Confidentiality, integrity and availability, traceability
- Safety regulations for general work and projects, reporting flow
- Emergency measures and reporting system
- Observation and reporting obligations
2 Dealing with confidential data
- Processing, storage, transmission and storage of confidential data
- Discretion in conversations, fax, SMS, e-mail and Internet as well as in social engineering
- Backup of necessary data and configurations
- Disposal of defective or no longer needed data carriers
- File storage (classification, dispatch, disposal)
3 Security at the workplace and the correct use of passwords
- Deletion of temporary files, caches, etc.
- Clear Desk Policy
- Private work at the workplace
- Sensitive use of third-party or private software
- Guidelines concerning the use of passwords (UID and PWD)
- Password selection and change frequency
- Deposit, disclosure and storage of passwords
- Group use of resources
4 Internet connection (Internet and e-mail at work)
- Dangers (dangerous content / active content elements)
- Legal control according to EDPS (Principles on controls and sanctions in case of abuse)
- Documents (Attachments)
- Surf traces (logs, cookies, caches)
- Safe usage of e-mail (encryption, certificates)
- Dealing with private e-mails
- Caution when handling e-mails (dubious e-mails, attachments, distribution lists, wrong addressee)
5 Behavior when a computer virus occurs
- Introduction / Types of viruses
- Detection of viruses and instant measures
- Dealing with antivirus tools
6 Working with your notebook on the go and at home
- Legal principles and policy: Who may process data outside the company?
- Screensavers and boat protection
- Handling login and data as well as mobile data media
- Handling of additional security devices (SmartCard, Token ...)
- Special travel features (business data on the road/cross-border)
Employees from all departments who work with IT systems and confidential information in their daily work – regardless of role or technical background. The course is particularly suited for individuals who want to act in a security-conscious manner and actively avoid risks.
The course is especially suitable as a company training to specifically raise employee awareness of threats and risks. In this case, the training content can be individually tailored to the organization’s specific needs.
There are no formal prerequisites for this course.