Sign in
    Back to Course

    Data Protection in the IT Department

    0% Complete
    0/0 Steps
    1. Introduction IT Security
      1 Topic
      1. Introduction IT Security
    2. Protection Goals
      4 Topics
      |
      1 Quiz
      1. Protection Goals
      2. Confidentiality
      3. Availability
      4. Integrity
      • Check: Protection Goals
    3. Encryption and Signature
      3 Topics
      |
      1 Quiz
      1. Encryption and Signature
      2. Symmetrical vs. Asymmetrical vs. Hybrid
      3. Digital Signatures
      • Check: Encryption and Signature
    4. Deletion of Data
      1 Topic
      |
      1 Quiz
      1. Deletion of Data
      • Check: Deletion of Data
    5. IT-Forensics
      1 Topic
      |
      1 Quiz
      1. Data Recovery and Forensics
      • Check: IT-Forensics
    6. Safety in the Network
      4 Topics
      |
      1 Quiz
      1. Safety in the Network
      2. Firewall
      3. Further Protective Measures in the Network
      4. VPN
      • Check: Safety in the Network
    7. Attack Scenarios
      2 Topics
      |
      1 Quiz
      1. Attack Scenarios I
      2. Attack Scenarios II
      • Check: Attack Scenarios
    8. IT Security in the Overall Concept
      3 Topics
      |
      1 Quiz
      1. IT Security in the Overall Concept, Standards and Laws
      2. Proactively Countering the Danger
      3. IT Operations
      • Check: IT Security in the Overall Concept
    9. Cloud Computing
      1 Topic
      |
      1 Quiz
      1. Cloud Computing
      • Check: Cloud Computing
    10. IT Security Act and IT Communication
      2 Topics
      |
      1 Quiz
      1. IT Security Act
      2. IT Communication
      • Check: IT Security Act and IT Communication
    Data Protection in the IT Department Attack Scenarios
    Lesson 7 of 10
    In Progress
    ← Previous

    Attack Scenarios

    Lesson Content
    0% Complete 0/2 Steps
    Attack Scenarios I
    Attack Scenarios II
    Check: Attack Scenarios
    Attack Scenarios