Ebook205 pages4 hours
Information Security Officer: Job profile, necessary qualifications, and awareness raising explained in a practical way: ISO/IEC 2700x, BSI Standards 200-x, and IT-Grundschutz Compendium
Rating: 0 out of 5 stars
()
About this ebook
The Federal Academy of Public Administration within the Federal Ministry of the Interior, Building, and Community (BAköV) has been working with the Federal Office for Information Security (BSI) since 2007 to train and certify IT security officers (IT-SO) for public administration. This successful concept has so far been adopted by only a few universities as part of their training and further edu-cation program. This is probably because the concept and certification relate to public administra-tion, and to federal administration in particular. Under my leadership, the Technical University of Applied Sciences Wildau (TH Wildau), where administrative courses have been an established part of the curriculum since 1997, adopted this certification concept in 2010 and focused on its successful implementation in an appropriate form. From the start, the aim was to make a significant contribu-tion to the quality of information security in the Brandenburg region and beyond. After attaining recognition as a BAköV qualification body, I have since expanded this training for students from a wide variety of courses and for external employees. The course’s content and methodology have been continuously updated. Having integrated information security in the different courses, espe-cially in non-technical contexts, TH Wildau is undoubtedly a pioneer in the field. The certification of students at TH Wildau was funded by the Horst Görtz Foundation (HGS) in the period 2018 to 2020.
With almost 3,700 students, TH Wildau is the largest (technical) University of Applied Sciences in the state of Brandenburg. Its attractive range of courses currently comprises forty-one bachelor’s and master’s courses in science and engineering as well as in economic, administrative, and legal disci-plines. Another special feature of the university is its internationality. Some 25 percent of the stu-dents come from more than sixty countries. Partnership agreements and student and lecturer ex-changes connect the TH Wildau with over 140 academic educational institutions worldwide. The university has had a top position in applied research nationwide for years and has a recognized rep-utation as a center of excellence for important scientific disciplines. We are pleased to have a pro-ductive ongoing cooperation with the BAköV and the BSI that provides education and training in information security and helps raise awareness of the topic.
With almost 3,700 students, TH Wildau is the largest (technical) University of Applied Sciences in the state of Brandenburg. Its attractive range of courses currently comprises forty-one bachelor’s and master’s courses in science and engineering as well as in economic, administrative, and legal disci-plines. Another special feature of the university is its internationality. Some 25 percent of the stu-dents come from more than sixty countries. Partnership agreements and student and lecturer ex-changes connect the TH Wildau with over 140 academic educational institutions worldwide. The university has had a top position in applied research nationwide for years and has a recognized rep-utation as a center of excellence for important scientific disciplines. We are pleased to have a pro-ductive ongoing cooperation with the BAköV and the BSI that provides education and training in information security and helps raise awareness of the topic.
Related to Information Security Officer
Related ebooks
Working Misunderstandings: An Ethnography of Project Collaboration in a Multinational Corporation in India Rating: 0 out of 5 stars0 ratingsThe Data-Driven Project Manager: A Statistical Battle Against Project Obstacles Rating: 0 out of 5 stars0 ratingsEnterprise Governance of Information Technology: Achieving Alignment and Value, Featuring COBIT 5 Rating: 3 out of 5 stars3/5Implementing Azure Solutions Rating: 0 out of 5 stars0 ratingsEnterprise Governance of Information Technology: Achieving Alignment and Value in Digital Organizations Rating: 0 out of 5 stars0 ratingsIntellectual Property, Design Innovation, and Entrepreneurship Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Computational Thinking: A beginner's guide to problem-solving and programming Rating: 4 out of 5 stars4/5Getting Started with ResearchKit Rating: 0 out of 5 stars0 ratingsBusiness Value in an Ocean of Data: Data Mining from a User Perspective Rating: 0 out of 5 stars0 ratingsDeep Learning with Azure: Building and Deploying Artificial Intelligence Solutions on the Microsoft AI Platform Rating: 0 out of 5 stars0 ratingsSoftware Development in Practice Rating: 0 out of 5 stars0 ratingsContextual Design: Design for Life Rating: 4 out of 5 stars4/5Cloud Computing: Master the Concepts, Architecture and Applications with Real-world examples and Case studies Rating: 0 out of 5 stars0 ratingsUnified Theory of Business Strategy Rating: 5 out of 5 stars5/5Ultimate Python Libraries for Data Analysis and Visualization Rating: 0 out of 5 stars0 ratingsElasticsearch Indexing Rating: 0 out of 5 stars0 ratingsEnterprise Architect’s Handbook: A Blueprint to Design and Outperform Enterprise-level IT Strategy (English Edition) Rating: 0 out of 5 stars0 ratingsDrupal 8 Configuration Management Rating: 0 out of 5 stars0 ratingsObject-oriented Programming with Smalltalk Rating: 0 out of 5 stars0 ratingsCyber Security For Normal People Protect Yourself Online Rating: 0 out of 5 stars0 ratingsPredictive Analytics and Machine Learning for Managers Rating: 0 out of 5 stars0 ratingsModelling Business Information: Entity relationship and class modelling for Business Analysts Rating: 0 out of 5 stars0 ratings
System Administration For You
CompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Rating: 5 out of 5 stars5/5Linux Bible Rating: 0 out of 5 stars0 ratingsLearn PowerShell in a Month of Lunches, Fourth Edition: Covers Windows, Linux, and macOS Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5The Complete Powershell Training for Beginners Rating: 0 out of 5 stars0 ratingsPractical Data Analysis Rating: 4 out of 5 stars4/5Learn Windows PowerShell in a Month of Lunches Rating: 0 out of 5 stars0 ratingsLinux Command-Line Tips & Tricks Rating: 0 out of 5 stars0 ratingsNetworking for System Administrators: IT Mastery, #5 Rating: 5 out of 5 stars5/5PowerShell: A Comprehensive Guide to Windows PowerShell Rating: 4 out of 5 stars4/5Learn PowerShell Scripting in a Month of Lunches Rating: 0 out of 5 stars0 ratingsLinux: Learn in 24 Hours Rating: 5 out of 5 stars5/5Mastering Windows PowerShell Scripting Rating: 4 out of 5 stars4/5Learn SQL Server Administration in a Month of Lunches Rating: 0 out of 5 stars0 ratingsGit Essentials Rating: 4 out of 5 stars4/5Bash Command Line Pro Tips Rating: 5 out of 5 stars5/5PowerShell: A Beginner's Guide to Windows PowerShell Rating: 4 out of 5 stars4/5Linux Commands By Example Rating: 5 out of 5 stars5/5Learning Linux Shell Scripting Rating: 4 out of 5 stars4/5Wordpress 2023 A Beginners Guide : Design Your Own Website With WordPress 2023 Rating: 0 out of 5 stars0 ratingsImprove your skills with Google Sheets: Professional training Rating: 0 out of 5 stars0 ratingsMastering Bash Rating: 5 out of 5 stars5/5Learn Cisco Network Administration in a Month of Lunches Rating: 0 out of 5 stars0 ratings
Reviews for Information Security Officer
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews
Book preview
Information Security Officer - Margit Christa Scholl
Enjoying the preview?
Page 1 of 1