Enrolment options
In this self-study course, you will get an overview of the IT-Grundschutz and the three steps to information security. Participate in the course, and you will get a unique glimpse into the basics of implementing the Basic Protection. The steps are based on the phases of the security process according to the IT-Grundschutz Methodology. This course was developed in cooperation with the BSI. Start the self-paced course by clicking on the module below.
Who is this course for?
In general, the guide is aimed at those who implement the information security in companies. Typically these are Information Security Officers (ISO). In smaller organisations, where the area of information security has not been professionally developed to such an extent (yet), other employees may initially assume this task. Suitable are, for example, employees from the areas Finance and Controlling, IT operation or the corporate data protection officer, however, due to their original task and potential role conflicts with restrictions only.
What will you learn?
· You’ll get an overview of the IT-Grundschutz and the three steps to information security.
· You’ll get key insights into relevant skills.
· You’ll acquire relevant knowledge in the areas of information security.
Keywords: information security, baseline protection, ISO
How much timedo you need to invest? Completing the course should take approximately three (3) hours.
Course Certificate: A course certificate will be generated on the successful completion of all modules.
Course Developers: This course is based on the BSI - Bundesamt für Sicherheit in der Informationstechnik - Guide to Basic Protection based on IT-Grundschutz
Course Contact: In case of technical troubleshooting or questions, please reach out to atingi@giz.de
License: Copyright