Embedded Academy: Hochwertige E-Learnings im embedded Bereich.
Close this search box.

Information Security

Current Status
Not Enrolled
based on selected plan
Get Started

E-Learning Course Information Security

1 h
Study Time
5 h


E-Learning Information Security – Introduction (15 min)

  • Goals of Information Security
  • Extent of Information Security

E-Learning Information Security – Practical Realisation (25 min)

  • Threats
  • Hazards
  • Practical Implentation of Information Security

E-Learning Information Security – Endangerments (20 min)

  • Basics
  • Functionality
  • Safety testing


The aim of this course is to provide an overview of information security so that its interrelationships and importance become clear.

This course is aimed at professionals and private individuals who want to protect their data and learn about the possibilities of information security. The course provides a rough introduction to the topic and deals with the background and basics of information security.



Previous slide
Next slide

What is information security?

Information security means protecting information, whether you write it down on paper or store it on your computer.

In contrast, IT security only deals with electronic information.

Why is information security needed?

Information security is needed to ensure that information created in the course of work processes is protected.

The correct application of information security ensures that information is protected from theft or destruction and that risks are minimised. In this way, threats such as cyber attacks can be largely prevented.

Therefore, all employees of an organisation, as well as customers and other stakeholders, must be educated about the risks, threats and the measures to ensure information security in the first place.

What do you learn in the Embedded Academy's e-learning on information security?

The course is divided into three topics. First, important terms of information security are defined in an e-learning unit and the underlying objectives are explained. The connection of these goals is presented and explained by means of a wall. Furthermore, it is clarified who is affected by information security and what it is needed for.

In the second e-learning unit, the practical implementation of information security is explained. Here, threats and hazards are presented and explained using examples.
Afterwards, the information security management system is defined and its functioning is explained. The introduction of this system is, among other things, the task of the information security officer.

In the last e-learning unit, the endangerments are then explained in more detail and illustrated with examples. In addition to that, there are ways of safety testing explained and how you can divide safety measures into categories.