-
Be the first to like this
Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.
Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.
This training program focuses on important basic aspects of Information Security. It starts with a concise characterization of the protection classes and the related handling requirements. Beside that the importance of secure passwords is outlined as well as
the fact that information sharing should always take place on a need-to-know basis. Additionally the various aspects indicating that one has received a malicious email and regulations how to deal with that are outlined with in the training. Another key point is the right behavior in case of an incident. Beside this mandatory content the participant has chosen at least two out of four specific modules (Secure usage of Mobile Devices/Managers Responsibility/Overview of Information Security Services/Dealing with Business Partners), depending on his/her function in the organization and the personal interests.
Be the first to like this
Login to see the comments