
During the training, you will learn in a practical manner and using current examples how to establish and operate effective risk management in IT and cybersecurity.
Overview of contents:
Requirements:
Work as a security officer, information security officer, and practical/professional experience in IT security
Interactive exercises, case studies, and discussions provide targeted support for transferring learning into practice.
This course is aimed at chief information security officers in small and medium-sized enterprises, CxO functions with an interest in or need for information security, and IT managers.
Form of learning
Learning form
No filter results
The training is carried out in cooperation with an authorized training partner. This partner collects and processes data under its own responsibility. Please take note of the corresponding privacy policy.
