© Uni MS IT

IT Security on the Internet and on private devices

Content: The courses deal with possibilities to increase IT security in the private sector and how to assess risks that everyone takes more consciously. After all, both the dangers and the workplace are increasingly shifting to the Internet. In addition to basic IT security issues, the topics of password management, encryption (e.g. of e-mails), phishing, DSGVO (General Data Protection Regulation), malware from the Internet, and the proper setup of common, private devices are discussed.

Each of the courses deals with its own main topic and can be taken independently of each other and in any order. The courses are accompanied by small practical exercises and offer room for questions from the participants.

Target Group: students

Course Material: Link to course material at Learnweb [de]

  • Security in the Cloud (Zoom Course)

    Content: How can I protect my data in the cloud? What should I consider when selecting a cloud service? How do you secure your data and applications if you no longer run them yourself?
    A little insight into the topics of password management, multifactor authentication, backup in the cloud, encryption, and what characterizes a secure or suitable cloud service for me.

    Registration

     

  • Endpoint Security (Zoom Course)

    Content: Windows, Mac OS, Linux, iOS, iPadOS, Android, Custom Roms: how do I set them up as securely as possible and how do I make sure they stay secure? Our topics are antivirus, firewalls, updates, backup, encryption, secure disposal and much more for the major operating systems Windows, Android, Debianoide Linux distributions (Ubuntu, Debian, Linux Mint), iOS, iPadOS and MacOS.

    Registration

     

  • Encryption and Communication on the Net (Zoom Course)

    Content: Messenger, video conferencing and e-mail: What risk does each tool pose and what are my security needs? We use tools to check the security level of websites and services and talk about the benefits of transport encryption, VPN and end-to-end encryption.

    Registration

     

  • Data Protection on the Internet (Zoom Course)

    Content: GDPR, cookies, and other traces on the net: How does informational self-determination work on the web? Can it also be done with a cell phone? We take a closer look at cookies, trackers, and other types of tracking on the web. We'll also take a look at the technical (e.g. tracker and ad blockers) and legal (e.g. sample forms for deletion requests) options for protecting yourself and the advantages and disadvantages of the GDPR.

    Registration