Topics of the information security learning modules

With a processing time of between 15 and 35 minutes per module, our learning modules guarantee optimal learning success. All 19 learning modules are available both individually and as a complete package.

rudiments

  • Difference between information security, IT security and data protection

  • Assets that need to be protected

  • Protection goals of information security

  • Security threats and their countermeasures

  • Information security management (ISMS)

Download product sheet

Information security incidents

  • Definition of an information security incident

  • Causes of security incidents

  • Recognize security incidents

  • Act correctly in the event of security incidents

  • Protection against security incidents

Download product sheet

Cyber risks

  • Definition of cyber security

  • Damage caused by cyber attacks

  • Malware - viruses, Trojans, worms and ransomware

  • Acting correctly in the event of cyber attacks

  • Protection against cyber attacks

Download product sheet

passwords

  • Insecure and secure passwords

  • Create secure passwords

  • Generate additional passwords from a secure password

  • Store passwords

Download product sheet

Email usage in companies

  • E-mail security

  • Differences between private and business e-mail use

  • Secure e-mail traffic

  • Dealing with a colleague's mailbox

  • Archiving e-mails

Download product sheet

E-mail risks

  • Dangers with e-mails

  • Phishing as a form of attack

  • CEO fraud as a form of attack

  • Attachments as a risk

  • Indications of possible e-mail attacks

Download product sheet

Risks on the web

  • Risks on the web

  • Dangers in social networks

  • Secure and insecure websites

  • Surfing on public WLAN

  • Protection against risks

Download product sheet

Clean Workspace

  • Clean Workspace concept

  • Implementation of Clean Workspace

  • Workplace design according to the clean workspace principle

  • Clean Workspace in daily work

  • Clean workspace in conference and meeting rooms

Download product sheet

Mobile working

  • Definition of mobile working

  • Business and private use of mobile devices

  • Risks associated with mobile use

  • Precautions for safe working

  • Safety measures in practice

Download product sheet

Home-Office

  • Home office requirement

  • Regulations for working from home

  • Data protection in the home office

  • Arrangements for the home office workplace

  • Company rules in the home office

Download product sheet

document classification

  • Document classification

  • Responsible for document classification

  • Classification criteria

  • Dealing with public and internal documents

  • Handling confidential and strictly confidential documents

Download product sheet