-
Certificates: Certificate "IT Security Specialist"
-
Additional Certificates: CompTIA Security+" certificate
CompTIA CySA+" certificate
Certificate "IT security officer with TÜV Rheinland-certified qualification" -
Examination: Practical project work with final presentations
CompTIA Security+ certification exam SY0-701 (in English)
CompTIA CySA+ certification exam CS0-003 (in English)
IT security officer with TÜV Rheinland-certified qualification -
Teaching Times: Full-timeMonday to Friday from 8:30 a.m. to 3:35 p.m. (in weeks with public holidays from 8:30 a.m. to 5:10 p.m.)
-
Language of Instruction: German
-
Duration: 12 Weeks
IT Security Administrator with CompTIA Security+ certification
General security concepts (approx. 2 days)
Types of security controls
Basic security concepts
Change management processes
Use of appropriate cryptography
Threats, vulnerabilities and mitigation measures (approx. 3.5 days)
Different types of social engineering techniques
Types of attacks
Indicators of attacks on applications
Threat actors and motivations
Threat vectors and attack surfaces
Types of vulnerabilities
Indicators of malicious activity
Purpose of risk mitigation techniques
Artificial intelligence (AI) in the work process
Presentation of specific AI technologies
and possible applications in the professional environment
Architecture and design (approx. 4 days)
Security implications of architecture models
Security principles
Concepts and strategies for protecting data
Resilience and recovery in the security architecture
Security operations (approx. 5 days)
Security techniques on computer resources
Security implications of hardware, software and data asset management
Vulnerability management
Concepts and tools for security alerts and monitoring
Functions for increasing security in the company
Identity and access management
Automation and orchestration
Incident response measures
Data sources to support an investigation
Manage and monitor security programs (approx. 3.5 days)
Security governance
Risk management process
Risk assessment processes
Security compliance
Audits and assessments
Project work/case study, certification preparation and certification exam (approx. 3 days)
CompTIA Security+ SY0-701 (in English)
IT Cybersecurity Analyst with CompTIA CySA+ certification
Security operations (approx. 5 days)
System and security solutions for the infrastructure
Network, host and application-related security analysis
Measures and tools for risk minimization
Threat intelligence, threat hunting
Process improvement and automation
Artificial intelligence (AI) in the work process
Presentation of specific AI technologies
and possible applications in the professional environment
Vulnerability Management (approx. 4.5 days)
Vulnerability assessment
Analysis and interpretation of vulnerability reports
Prioritization of vulnerabilities
Measures for dealing with attacks and vulnerabilities
Incident Response Management (approx. 3 days)
Process model and life cycle
IoCs (Indicators of Compromise)
Excursus: Forensic analysis
Reporting and communication (approx. 2.5 days)
Reporting on vulnerability management and compliance
Stakeholder communication
Key performance indicators (KPIs)
Project work/case study, certification preparation and certification exam (approx. 5 days)
CompTIA CySA+ CS0-003 (in English)
IT security officer with TÜV Rheinland-certified qualification
Structure and core processes of IT security (approx. 2 days)
Structure of IT security in companies and its economic significance
People involved, functions and communication channels within the IT network
Basic regulations, legal principles, standards
Physical security in the IT environment (approx. 2 days)
Classification of physical security
Introduction to physical security standards
Security measures for the IT infrastructure
Control and alarm mechanisms
Artificial intelligence (AI) in the work process
Presentation of specific AI technologies
and possible applications in the professional environment
Identity and access management (approx. 2 days)
Basics of access management
Differentiation and specification of access and access controls in a company and their implementation
Conception and control in access management
Audit-proof archiving
Identity verification and assignment of rights
Protection mechanisms for the IT infrastructure
Threat scenarios and consequences for implementation in the company (approx. 3 days)
DLP - the importance of data loss prevention and data leakage prevention in IT security
Data loss prevention and data leakage prevention measures
Classification and protection against malware
IOT (Internet Of Things) and Industry 4.0 - possible threat scenarios
Network security (approx. 2 days)
Special measures for the protection of the network
Data protection requirements for mail servers
Administration and security for cloud use
Checking system components and applications against unauthorized persons/programs/remote access
Analysis and realization of an IT security system for companies (approx. 2 days)
Basics of the information security standard according to ISO/IEC 27001:2022 and the Federal Office for Information Security (BSI) (approx. 2 days)
Structure and implementation of emergency management according to BSI standard 100-4 and 200-4 (BCM) (approx. 1 day)
IT security in the company - training and sensitization for employees (approx. 1 day)
Project work, certification preparation and certification exam "IT security officer with TÜV Rheinland certified qualification" (approx. 3 days)
Changes are possible. The course content is updated regularly.
You are familiar with the key aspects and requirements of IT security and have specialist knowledge of the key principles of network security and risk management, the skills to secure a network and defend against hacker attacks. You will also be able to identify potential threats and vulnerabilities, achieve application, data and host security and implement the relevant standards according to ISO/IEC 27001 and the IT baseline protection according to BSI.
IT security managers, employees in IT system houses, IT companies and data centers, but also data protection specialists, IT specialists, database and network specialists, (specialist) IT specialists, programmers and people with practical experience in the IT sector.
With the increased demands on IT infrastructure, IT security is playing an increasingly key role in companies. IT security specialists who can analyze, monitor and protect security resources are in high demand and are used both directly by IT security service providers and in-house by companies in all sectors.
Didactic concept
Your lecturers are highly qualified both professionally and didactically and will teach you from the first to the last day (no self-study system).
You will learn in effective small groups. The courses usually consist of 6 to 25 participants. The general lessons are supplemented by numerous practical exercises in all course modules. The practice phase is an important part of the course, as it is during this time that you process what you have just learned and gain confidence and routine in its application. The final section of the course involves a project, a case study or a final exam.
Virtual classroom alfaview®
Lessons take place using modern alfaview® video technology - either from the comfort of your own home or at our premises at Bildungszentrum. The entire course can see each other face-to-face via alfaview®, communicate with each other in lip-sync voice quality and work on joint projects. Of course, you can also see and talk to your connected trainers live at any time and you will be taught by your lecturers in real time for the entire duration of the course. The lessons are not e-learning, but real live face-to-face lessons via video technology.
The courses at alfatraining are funded by Agentur für Arbeit and are certified in accordance with the AZAV approval regulation. When submitting a Bildungsgutscheinor Aktivierungs- und Vermittlungsgutschein, the entire course costs are usually covered by your funding body.
Funding is also possible via Europäischen Sozialfonds (ESF), Deutsche Rentenversicherung (DRV) or regional funding programs. As a regular soldier, you have the option of attending further training courses via Berufsförderungsdienst (BFD). Companies can also have their employees qualified via funding from Agentur für Arbeit (Qualifizierungschancengesetz).