S 3 Safeguard catalogues Personnel

S 3.1 Well-regulated familiarisation/training of new staff with their work

S 3.2 Commitment of staff members to compliance with relevant laws, regulations and provisions

S 3.3 Arrangements for substitution

S 3.4 Training before actual use of a program

S 3.5 Training on security safeguards

S 3.6 Regulated procedure for when employees leave the organisation

S 3.7 Point of contact in case of personal problems

S 3.8 Avoidance of factors impairing the organisation climate

S 3.9 Ergonomic workplace

S 3.10 Selection of a trustworthy administrator and his substitute

S 3.11 Training of maintenance and administration staff

S 3.12 Informing all staff members about possible PBX warning notices, warning symbols, and acoustic alarm signals

S 3.13 Increasing staff awareness of potential threats to the PBX

S 3.14 Briefing personnel on correct procedures of exchanging data media

S 3.15 Information on the use of fax machines for all employees

S 3.16 Briefing personnel on the operation of answering machines - not to apply

S 3.17 Briefing personnel on modem usage

S 3.18 Log-out obligation for PC users

S 3.19 Instructions concerning the correct use of the security functions in peer-to-peer services - not to apply

S 3.20 Instructions concerning the operation of protective cabinets

S 3.21 Training of telecommuters as regards security-related issues

S 3.22 Regulations concerning substitution of telecommuters - not to apply

S 3.23 Introduction to basic cryptographic terms

S 3.24 Training on the Lotus Notes system architecture for Administrators - not to apply

S 3.25 Training on Lotus Notes security mechanisms for users - not to apply

S 3.26 Instructing staff members in the secure handling of IT

S 3.27 Training to Active Directory administration

S 3.28 User training on Windows client operating system security mechanisms

S 3.29 Training on the administration of Novell eDirectory

S 3.30 Training on the use of Novell eDirectory client software

S 3.31 Administrator training on Exchange system architecture and security

S 3.32 User training on Outlook security mechanisms

S 3.33 Improper use of cryptomodules

S 3.34 Basic training on the administration of the archive system

S 3.35 Basic user training on how to use the archive system

S 3.36 Administrator training on the secure installation and configuration of IIS - not to apply

S 3.37 Training the administrators of an Apache web server - not to apply

S 3.38 Administrator training on routers and switches

S 3.39 Introduction to the zSeries platform

S 3.40 Introduction to the z/OS operating system

S 3.41 Introduction to Linux and z/VM for zSeries systems

S 3.42 Training z/OS operators

S 3.43 Training the security gateway administrators

S 3.44 Making management aware of information security issues

S 3.45 Planning training contents on information security

S 3.46 Contact persons for security questions

S 3.47 Performing simulations on information security

S 3.48 Selection of trainers or training providers

S 3.49 Training the IT-Grundschutz methodology

S 3.50 Selection of employees

S 3.51 Appropriate concept for assignment and qualification of employees

S 3.52 Training on SAP systems

S 3.53 Introduction to SAP systems

S 3.54 Administrator training on the storage system

S 3.55 Non-disclosure agreements (NDAs)

S 3.56 Administrator training on the use of VoIP

S 3.57 Scenarios for the use of VoIP

S 3.58 Introduction to WLAN basics

S 3.59 Training on the secure use of WLAN

S 3.60 Sensitising staff to secure handling of mobile data media and devices

S 3.61 Introduction to directory service basics

S 3.62 Training on the administration of directory services

S 3.63 Training users on authentication with the help of directory services

S 3.64 Introduction to Active Directory

S 3.65 Introduction to basic VPN terminology

S 3.66 Basic terminology of patch and change management

S 3.67 Instructing all employees of the methods for deleting or destroying data

S 3.68 Training the administrators of a Samba server

S 3.69 Introduction to the threats posed by malware

S 3.70 Introduction to virtualisation

S 3.71 Virtual environment training for administrators

S 3.72 Basic terminology of virtualisation technology

S 3.73 Training the administrators of a DNS server

S 3.74 Administrator training on groupware system architecture and security

S 3.75 User training on groupware client security mechanisms

S 3.76 Basic user training on how to use groupware and e-mail

S 3.77 Awareness-raising for secure Internet use

S 3.78 Correct behaviour on the Internet

S 3.79 Introduction to basic terms and functional principles of Bluetooth

S 3.80 Raising awareness for the use of Bluetooth

S 3.81 Training on the secure use of terminal servers

S 3.82 Training on the secure use of PBX systems

S 3.83 Analysis of security-relevant personnel factors

S 3.84 Introduction to Exchange systems

S 3.85 Introduction to OpenLDAP

S 3.86 OpenLDAP training for administrators

S 3.87 Introduction in Lotus Notes/Domino

S 3.88 Training courses for Lotus Notes/Domino for specific target groups

S 3.89 Training on the administration of the logging function

S 3.90 General requirements for centralised logging