Information Security

TISAX® Professional

The 3-day course builds on the knowledge of the Information Security Officer Automotive Foundation (IAF) and teaches skills for implementing and managing an ISMS according to VDA ISA.

The practical implementation and consolidation of knowledge to increase security competence and effectiveness, especially in the automotive industry, strategies for the continuous improvement of information security processes as well as risk management and effective response to security incidents round off the course with a final DEKRA certification.

DEKRA

On-Site/Virtual

Preise ab€ 3.250 zzgl. 19% Ust

duration: 5 days

Level: Fortgeschrittene

Code: IAP

CPEs: 29

Buchen Sie noch heute online oder rufen Sie uns an unter +49 7031 2024742, wenn Sie Hilfe bei der Auswahl des richtigen Kurses benötigen oder über Firmenrabatte sprechen möchten.


Learn how to implement the requirements of the VDA ISA catalog in practice.

Schönbrunn TASC is an ISACA accredited training organization (ATO). This means that you have access to official ISACA course materials and can take your CISA exam during the course at the Schönbrunn TASC training center. If you do not pass the exam on your first attempt (which we do not expect), our performance guarantee covers you - this means you train for free the second time.

  • You learn in small groups (max. 10 participants per course)
  • In-house modern training room and test center in a distraction-free, quiet atmosphere (PSI/ Pearson Vue/ EC Council/ Kryterion)
  • Experienced, constantly trained trainers guide you through the course
  • You will receive comprehensive training materials, manuals and case studies for self-study
  • Interactive discussions and group work will help you in the application
  • A small breakfast, lunch, snacks and drinks are provided throughout the day
  • hotel recommendations near the training and test center
  • it is possible to take the exam at the Schönbrunn TASC test center afterwards**

Successful completion of the Information Security Officer Automotive Foundation (IAF) certification

for executives or future executives in the field of IT systems auditing, consulting or IT systems management

Module 1 - Audit processes for information systems

1.1 Planning

  • IS audit standards, audit guidelines and codes of ethics
  • Types of controls for business processes
  • Risk-based audit planning
  • Types of audits and assessments

1.2 Execution

  • Audit project management
  • Sampling methodology
  • Techniques for collecting audit evidence
  • Data analysis
  • Reporting and communication techniques
  • Quality assurance and improvement of the audit process

Module 2- Governance and management of IT

2.1 IT governance and IT strategy

  • IT-related frameworks
  • IT standards, policies and procedures
  • Organizational structure
  • Enterprise architecture
  • Risk management for companies
  • Maturity models
  • Laws, regulations and industry standards that impact the organization

2.2 IT management

  • IT resource management
  • Acquisition and management of IT service providers
  • Monitoring and reporting of IT performance
  • Quality assurance and quality management of IT

Module 3- Acquisition, development and implementation of information systems

3.1 Acquisition and development of information systems

  • Project control and management
  • Business case and feasibility analysis
  • Methods of system development
  • Identification and design of controls

3.2 Implementation of information systems

  • Test methods
  • Configuration and release management
  • System migration, infrastructure provision and data conversion
  • Post-implementation review

Module 4- Information Systems Operations and Business Resilience

4.1 Information Systems Operations

  • Common technology components
  • IT asset management
  • Order planning and automation of production processes
  • System interfaces
  • End-user computing
  • Data governance
  • System performance management
  • Problem and fault management
  • Change, configuration, release and patch management
  • IT service level management and database management

4.2 Business resilience

  • Analysis of the impact on the business
  • System resilience
  • Data backup - storage and recovery
  • Business continuity plan
  • Disaster recovery plan

Module 5- Protection of information assets

5.1 Standards and guidelines for the security of information assets

  • Principles of data protection
  • Physical access and environmental controls
  • Identity and access management
  • Network and endpoint security
  • Classification of data
  • Data encryption and encryption techniques
  • Public key infrastructure
  • Web-based communication technologies
  • Virtualized environments
  • Mobile, wireless and Internet-of-Things devices

5.2 Security event management

  • Security awareness training and programs
  • Attack methods and techniques for information systems
  • Security testing tools and techniques
  • Security monitoring tools and techniques
  • Incident response management
  • Evidence collection and forensics

Information Security Officer Automotive Professional (IAP)

Duration: 60 minutes

Format: Multiple Choice

Languages: German

No aids are permitted

No appointments are currently scheduled. If you are interested in making an appointment, please contact us using our contact form.

Contact

Similar courses

TRECCERT 1 durationLeonberg

Information Security

DORA for Executives Certification

DORA for Executives teaches managers the basics of the DORA regulation to strengthen digital resilience and compliance with regulatory requirements.

TRECCERT 2 durationLeonberg

Information Security

DORA Essentials Certification

DORA Essentials provides basic knowledge of the DORA regulation and demonstrates key practices for strengthening digital resilience and IT security.

TRECCERT 2 durationLeonberg

Information Security

ISO/IEC 27001 Foundation Certification

The TRECCERT ISO/IEC 27001 Foundation course provides basic knowledge of the requirements and controls of ISO/IEC 27001:2022 and offers an introduction to the Information Security Management System (ISMS).