IT Security Officer, IT Security Manager and Microsoft Azure - Solutions Architect Expert
-
Certificates: Certificate "IT security officer with TÜV Rheinland-certified qualification"
Certificate "IT Security Manager with TÜV Rheinland certified qualification"
Original Microsoft certificate "Microsoft Certified: Azure Solutions Expert" -
Examination: Practical project work with final presentations
IT security officer with TÜV Rheinland-certified qualification
IT Security Manager with TÜV Rheinland-certified qualification
Microsoft certification exam AZ-305: Azure Solutions Expert -
Teaching Times: Full-time
Monday to Friday from 8:30 a.m. to 3:35 p.m. (in weeks with public holidays from 8:30 a.m. to 5:10 p.m.) -
Language of Instruction: German
-
Duration: 12 Weeks
IT security officer with TÜV Rheinland-certified qualification
Structure and core processes of IT security (approx. 2 days)
Structure of IT security in companies and its economic significance
People involved, functions and communication channels within the IT network
Basic regulations, legal principles, standards
Physical security in the IT environment (approx. 2 days)
Classification of physical security
Introduction to physical security standards
Security measures for the IT infrastructure
Control and alarm mechanisms
Artificial intelligence (AI) in the work process
Presentation of specific AI technologies
and possible applications in the professional environment
Identity and access management (approx. 2 days)
Basics of access management
Differentiation and specification of access and access controls in a company and their implementation
Conception and control in access management
Audit-proof archiving
Identity verification and assignment of rights
Protection mechanisms for the IT infrastructure
Threat scenarios and consequences for implementation in the company (approx. 3 days)
DLP - the importance of data loss prevention and data leakage prevention in IT security
Data loss prevention and data leakage prevention measures
Classification and protection against malware
IOT (Internet Of Things) and Industry 4.0 - possible threat scenarios
Network security (approx. 2 days)
Special measures for the protection of the network
Data protection requirements for mail servers
Administration and security for cloud use
Checking system components and applications against unauthorized persons/programs/remote access
Analysis and realization of an IT security system for companies (approx. 2 days)
Basics of the information security standard according to ISO/IEC 27001:2022 and the Federal Office for Information Security (BSI) (approx. 2 days)
Structure and implementation of emergency management according to BSI standard 100-4 and 200-4 (BCM) (approx. 1 day)
IT security in the company - training and sensitization for employees (approx. 1 day)
Project work, certification preparation and certification exam "IT security officer with TÜV Rheinland certified qualification" (approx. 3 days)
IT Security Manager with TÜV Rheinland-certified qualification
Corporate structures and management of IT security (approx. 5 days)
Importance of IT security in the corporate structure of today's companies
Legal foundations and their compliance in IT governance
Relevant key figures and control mechanisms in information security management
Areas of responsibility and functions of persons/departments involved
Definition of the guidelines and areas of application of an ISMS (Information Security Management System)
Overview of current attacks and threats in data protection and IT security
Relevance of technical assessments for the GDPR and ISO27001
Artificial intelligence (AI) in the work process
Presentation of specific AI technologies
and possible applications in the professional environment
Standards and principles in IT security (approx. 2 days)
Structure and guidelines for an ISMS in accordance withDIN ISO/IEC 27001, 27002 (approx. 3 days)
Meaning and application overview of the standard
Requirements of the standard for a documented ISMS and the implementation of suitable security mechanisms
Implementation, monitoring and continuous improvement
Importance of the standard for the protection of assets in a company
IT risk management in accordance with ISO/IEC 27005, main IT risks
Evaluation of threats and weaknesses in an ISMS and their impact
Requirements of technical assessments in SDM and their significance for the assurance objectives of the GDPR
Operational implementation of an ISMS
Use of a current ISMS tool (approx. 4 days)
Project planning and implementation based on an ISMS tool
Analysis of existing risks and planning of the corresponding risk treatment
Checking/testing the developed risk treatment concept
Checking the effectiveness of the provisionally implemented measure
Implementation of the developed system and continuous review
Statement of Applicability
Methods for raising awareness and training within the company
Management of IS incidents (Information Security Incident Management)
Project management (approx. 1 day)
Practical application of project management methods for initiation, definition, planning, controlling and completion
Application of software tools, communication and management tools
Ensuring the correct implementation of the standard and standards Audits/certification (approx. 2 days)
Documentation and reporting in an ISMS
Internal audits
Management assessments
Certification of the ISMS
Project work, certification preparation and certification exam "IT Security Manager with TÜV Rheinland certified qualification" (approx. 3 days)
Microsoft Azure - Solutions Architect Expert
Identity, governance and monitoring solutions (approx. 4.5 days)
Logging and monitoring
Authentication and authorization
Design governance
Data storage solutions (approx. 3 days)
Data storage solution for relational data
Data storage solutions for partially structured and unstructured data
Designing data integration
Artificial intelligence (AI) in the work process
Presentation of specific AI technologies
and possible applications in the professional environment
Business continuity (approx. 3 days)
Backup and disaster recovery
Design for high availability
Infrastructure solutions (approx. 4.5 days)
Computer solutions
Application architecture
migrations
Network solutions
Project work (approx. 5 days)
To consolidate the content learned
Presentation of the project results
Certification exam AZ-305 Microsoft Certified: Azure Solutions Expert
Changes are possible. The course content is updated regularly.
As an IT security officer, you are familiar with the key aspects and requirements of IT security: data security and protection, physical IT security, cryptography, network security, PKI, computer security and organizational security. You know how to implement the relevant standards according to ISO/IEC 27001 and IT baseline protection according to BSI in practice.
Furthermore, as an IT security manager, you can systematically protect critical company information by implementing effective security strategies, carrying out technical assessments to identify vulnerabilities and threats and successfully implementing the requirements of ISO/IEC 27001 and the GDPR. You will apply the relevant norms, standards and tools to minimize risks, strengthen data protection concepts and continuously monitor and improve IT security in the company.
You will also acquire in-depth knowledge of planning and implementing cloud infrastructures and data storage solutions in Azure. You will learn how to design governance, monitoring and business continuity solutions. Finally, you will prepare specifically for the "AZ-305 Microsoft Certified: Azure Solutions Expert' exam to master complex cloud architectures.
This course is aimed at IT security officers, IT managers and responsible persons from the areas of IT security, information technology, network and system administration, IT controlling, IT organization, IT consulting, auditing and risk management.
The course is also aimed at IT specialists, IT and network specialists as well as people with practical experience and good knowledge in the IT sector (including career changers).
Upon successful completion of this course, you will be able to demonstrate your skills in the planning, implementation and monitoring of IT security concepts. You will be able to use these skills for management positions in the IT sector and also across all sectors for companies and authorities with a high volume of personal data.
The globally standardized and recognized Microsoft certifications are among the most important manufacturer certifications with which you can improve your career prospects on the job market across all industries. Specialists with the relevant knowledge are in demand at both large and medium-sized companies.
Didactic concept
Your lecturers are highly qualified both professionally and didactically and will teach you from the first to the last day (no self-study system).
You will learn in effective small groups. The courses usually consist of 6 to 25 participants. The general lessons are supplemented by numerous practical exercises in all course modules. The practice phase is an important part of the course, as it is during this time that you process what you have just learned and gain confidence and routine in its application. The final section of the course involves a project, a case study or a final exam.
Virtual classroom alfaview®
Lessons take place using modern alfaview® video technology - either from the comfort of your own home or at our premises at Bildungszentrum. The entire course can see each other face-to-face via alfaview®, communicate with each other in lip-sync voice quality and work on joint projects. Of course, you can also see and talk to your connected trainers live at any time and you will be taught by your lecturers in real time for the entire duration of the course. The lessons are not e-learning, but real live face-to-face lessons via video technology.
The courses at alfatraining are funded by Agentur für Arbeit and are certified in accordance with the AZAV approval regulation. When submitting a Bildungsgutscheinor Aktivierungs- und Vermittlungsgutschein, the entire course costs are usually covered by your funding body.
Funding is also possible via Europäischen Sozialfonds (ESF), Deutsche Rentenversicherung (DRV) or regional funding programs. As a regular soldier, you have the option of attending further training courses via Berufsförderungsdienst (BFD). Companies can also have their employees qualified via funding from Agentur für Arbeit (Qualifizierungschancengesetz).