Training to become an IT security officer

Hochschule Niederrhein. Your way.
About the certificate course

The security and reliability of information and communications technology used by companies and public authorities is becoming increasingly important, as is the trustworthy handling of information. Inadequately protected information is an often underestimated risk factor. A security incident, such as the manipulation or disclosure of corporate or government data, can result in high costs and is always associated with a loss of customer confidence. For this reason, more and more companies and public authorities are establishing the position of an IT security officer. One of the most important tasks of an IT security officer is the introduction to an information security management system (ISMS). For organizations that are classified as "critical infrastructures" according to the IT Security Act, the introduction to an ISMS is mandatory.

Within the framework of this ONLINE certificate course, you will acquire solid basic knowledge for planning, implementing and monitoring an ISMS in accordance with ISO 27001. You will receive a structured overview of the regulatory requirements from the IT Security Act and acquire application-related knowledge and methods for implementing the ISMS in your own company.

Goals of the continuing education

With successful degree of the course you will be able to:

  • Correctly classify the IT security norms and standards according to ISO 27001.
  • Understand the components and procedures of an ISMS organization.
  • Apply methods to survey the information technology security level.
  • To participate in the implementation of an ISMS within one's own organization.
  • To ensure the continuity of an established ISMS.
Advantages
  • Participants who pass an examination receive a certificate from the university for the "IT Security Officer" training.
  • Optimization of processes in corporate IT.
  • Saving costs and resources for the implementation of the ISMS.
Target group

IT and information security professionals, IT managers, consultants, project managers, managing directors, data protection officers: anyone who is responsible for the security of their IT infrastructure and will assume the role of an IT security officer in their company.

Teaching and learning education

The original knowledge transfer takes place in the form of a classic seminar. Accompanying exercises immediately link what has been learned with practical knowledge, which promotes a sustainable learning process and facilitates transfer to your own company.

The curriculum and further information can be found in the flyer and in the download area.

In-house training
Individually tailored to your requirements
  • Dates: Four attendance days on request at weiterbildung(at)hsnr.de
  • Registration deadline: ---
  • Number of participants: 10 persons
  • Location: Krefeld South Campus
  • Participation fee: 1.390,00 € | Alumni 1.320,00 €
  • Prerequisites for participation: University degree with at least one year of professional experience or professional training and at least three years of professional experience.
  • Scope (workload): 50 h, of which 32 h attendance, 2 ECTS.
  • Degree: University certificate / certificate of attendance

Your contact person

Ulrike Schoppmeyer
Center for continuing education Marketing | Sales