Enrolment options
In this self-paced course, you will find out more about the attendant aspects in Security Management. The lessons will also provide in-depth information about the individual steps involved in implementing the Standard Protection in accordance with IT-Grundschutz. It will take you about 4 hours to complete this course and you will earn a PDF certificate once you complete all modules.
Who is this course for?
Would you like to know whether the information security measures you have taken are sufficient to prevent severe losses and respond appropriately to related incidents? Do you need assistance in developing a security concept? Are you looking for support in conducting a systematic review of the security measures planned or already in place in your area of responsibility? Do you want these measures to meet generally recognised standards?
If you answered “yes” to any of these questions, you should enroll yourself into this course!What will you learn?
You will be able to learn more about the IT-Grundschutz guidelines which describe in detail the requirements that need to be fulfilled to achieve a level of security appropriate for the demands of typical areas of application (and easily extensible when increased security is needed) in a cost-efficient manner. The guidelines also present a widely recognised methodology that can show you efficient ways to develop and verify a security concept that is tailored to the characteristics of your facilities.
Keywords: IT-Grundschutz, Cybersecurity, Protection
How much time you need to invest: Approx. 4 hours to complete this course.
Course Certificate: You will be awarded a pdf certificate upon completion of course.
Course Developer: This course is based on the BSI - Bundesamt für Sicherheit in der Informationstechnik - Guide to Basic Protection based on IT-Grundschutz.
Contact Person: In case of technical troubleshooting or questions, please reach out to atingi@giz.de.
Content: This course content has been developed by the BSI - Bundesamt für Sicherheit in der Informationstechnik.
Content License: Copyright