S 3 Safeguard catalogues Personnel
S 3.1 Well-regulated familiarisation/training of new staff with their work
S 3.2 Commitment of staff members to compliance with relevant laws, regulations and provisions
S 3.3 Arrangements for substitution
S 3.4 Training before actual use of a program
S 3.5 Training on security safeguards
S 3.6 Regulated procedure for when employees leave the organisation
S 3.7 Point of contact in case of personal problems
S 3.8 Avoidance of factors impairing the organisation climate
S 3.10 Selection of a trustworthy administrator and his substitute
S 3.11 Training of maintenance and administration staff
S 3.13 Increasing staff awareness of potential threats to the PBX
S 3.14 Briefing personnel on correct procedures of exchanging data media
S 3.15 Information on the use of fax machines for all employees
S 3.16 Briefing personnel on the operation of answering machines - not to apply
S 3.17 Briefing personnel on modem usage
S 3.18 Log-out obligation for PC users
S 3.19 Instructions concerning the correct use of the security functions in peer-to-peer services - not to apply
S 3.20 Instructions concerning the operation of protective cabinets
S 3.21 Training of telecommuters as regards security-related issues
S 3.22 Regulations concerning substitution of telecommuters - not to apply
S 3.23 Introduction to basic cryptographic terms
S 3.24 Training on the Lotus Notes system architecture for Administrators - not to apply
S 3.25 Training on Lotus Notes security mechanisms for users - not to apply
S 3.26 Instructing staff members in the secure handling of IT
S 3.27 Training to Active Directory administration
S 3.28 User training on Windows client operating system security mechanisms
S 3.29 Training on the administration of Novell eDirectory
S 3.30 Training on the use of Novell eDirectory client software
S 3.31 Administrator training on Exchange system architecture and security
S 3.32 User training on Outlook security mechanisms
S 3.33 Improper use of cryptomodules
S 3.34 Basic training on the administration of the archive system
S 3.35 Basic user training on how to use the archive system
S 3.36 Administrator training on the secure installation and configuration of IIS - not to apply
S 3.37 Training the administrators of an Apache web server - not to apply
S 3.38 Administrator training on routers and switches
S 3.39 Introduction to the zSeries platform
S 3.40 Introduction to the z/OS operating system
S 3.41 Introduction to Linux and z/VM for zSeries systems
S 3.42 Training z/OS operators
S 3.43 Training the security gateway administrators
S 3.44 Making management aware of information security issues
S 3.45 Planning training contents on information security
S 3.46 Contact persons for security questions
S 3.47 Performing simulations on information security
S 3.48 Selection of trainers or training providers
S 3.49 Training the IT-Grundschutz methodology
S 3.51 Appropriate concept for assignment and qualification of employees
S 3.52 Training on SAP systems
S 3.53 Introduction to SAP systems
S 3.54 Administrator training on the storage system
S 3.55 Non-disclosure agreements (NDAs)
S 3.56 Administrator training on the use of VoIP
S 3.57 Scenarios for the use of VoIP
S 3.58 Introduction to WLAN basics
S 3.59 Training on the secure use of WLAN
S 3.60 Sensitising staff to secure handling of mobile data media and devices
S 3.61 Introduction to directory service basics
S 3.62 Training on the administration of directory services
S 3.63 Training users on authentication with the help of directory services
S 3.64 Introduction to Active Directory
S 3.65 Introduction to basic VPN terminology
S 3.66 Basic terminology of patch and change management
S 3.67 Instructing all employees of the methods for deleting or destroying data
S 3.68 Training the administrators of a Samba server
S 3.69 Introduction to the threats posed by malware
S 3.70 Introduction to virtualisation
S 3.71 Virtual environment training for administrators
S 3.72 Basic terminology of virtualisation technology
S 3.73 Training the administrators of a DNS server
S 3.74 Administrator training on groupware system architecture and security
S 3.75 User training on groupware client security mechanisms
S 3.76 Basic user training on how to use groupware and e-mail
S 3.77 Awareness-raising for secure Internet use
S 3.78 Correct behaviour on the Internet
S 3.79 Introduction to basic terms and functional principles of Bluetooth
S 3.80 Raising awareness for the use of Bluetooth
S 3.81 Training on the secure use of terminal servers
S 3.82 Training on the secure use of PBX systems
S 3.83 Analysis of security-relevant personnel factors
S 3.84 Introduction to Exchange systems
S 3.85 Introduction to OpenLDAP
S 3.86 OpenLDAP training for administrators
S 3.87 Introduction in Lotus Notes/Domino
S 3.88 Training courses for Lotus Notes/Domino for specific target groups
S 3.89 Training on the administration of the logging function