Course
The basics of IT security («P2S»)
Course facts
- Determining the need for protection in companies and projects using best-practice approaches
- Proposing suitable safety measures
- Knowing the possibilities of continuous monitoring of the safety measures taken
1 Practical use of the course materials
- Presentation of the practice-oriented implementation concept
- Brief repetition of the information security fundamentals
2 The basics of a security concept according to BSI IT-Grundschutz
- Structural analysis and determination of protection requirements
- Modeling with BSI
- Qualitative and quantitative assessment of extended risks
3 Targeted implementation of holistic security measures
- Personal security measures
- Planning awareness measures
- Organisational security measures
- Technical security measures
- Physical security measures
- Integration of Emergency Management (BCM)
4 Control and monitoring of information security
- Overview of control and monitoring measures
- Auditing
This practice-oriented course is intended to provide administrators, IT specialists, project managers and IT managers with the necessary tools to implement basic IT security with integrated information security measures.
Basic knowledge of information security analogous to the following course as well as good basic knowledge of computer science:
Please note: In this training, the BSI basic IT protection method is considered. However, the preparation for the certification of the ISMS according to the German BSI basic IT protection or the German KRITIS law is not part of the training.
RDP info
Participants must have a remote desktop client installed on their PC/notebook.
- Under Windows, the official Microsoft client is usually already installed
- macOS users can download the official Microsoft client from the Apple App Store: https://apps.apple.com/ch/app/microsoft-remote-desktop/id1295203466
Important: For security reasons, companies often block a remote desktop connection on business devices and in the company network. It is recommended to participate in the training on a private device and not on the company network. Alternatively, you can clarify in advance with the responsible IT department whether remote desktop connections are possible.