Henüz müşteri hesabınız yok mu?
Menu
74 Sonuçlar
(Industrial) Internet of Things
Endüstri
Paketime Kaydet
Appointment of an External Data Protection Officer
IT & Güvenlik
Appointment of an Information Security Officer
Audit app „proISC@®“
Autonomous driving
Otomotiv
Awareness Bash (online)
Basics Cyber Security Training
BCM Basics Training
Certification in Accordance with ISO/IEC 27001 on the Basis of IT-Grundschutz
Sertifikasyon
Certification of Apps – “Trusted App”
Certification of Cloud Services “Trusted Cloud Service”
Certification of Data Centers – “Trusted Data Center”
Certification of ERP-Systems “Trusted ERP“
Certification of IT Applications – “Trusted Application”
Certification of IT Service Quality: “TÜV-Approved IT Service Quality”
Certification of Network Components: “Trusted Infrastructure”
Certification of Software Development Processes – “Trusted Development”
Cloudability-Check: Secure Cloud Usage
Cobots
Makine
Common Criteria
Common Criteria | ISO/IEC 15408
Competence Center NASV
Conformity assessment and Certification of electronic ID Services (eID) and Trust Service Providers (TSP)
Consultation BSI IT Security Label
Cyber Security Competence Center (CSCC)
Cyber Security Management Training
Cyber Watchdog: Establishing a Constantly Maintained Security Level
CySiVuS
Bilim & Araştırma
Data Protection
Digital assistance systems
Digital Potential Check
eIDAS ETSI Training
eIDAS ETSI Training Special Topics
EMC safety test
Enterprise Information Management
EU GDPR GAP Analysis and Recommended Measures
Examinations according to §8a (3) BSI Act
Experience Exchance & Workshop for ISMS Managers and Auditors
expert opinion ransomware
Industrial Security Concepts | IEC 62443
Information Security Certification | ISO 27001
Information Security for Energy Providers
Introduction of a Business Continuity Management System (BCMS)
ISMS Inventory in Accordance with ISO/IEC 27001:2013
ISMS Inventory in Accordance with ISO/IEC 27001:2013 on the Basis of IT-Grundschutz
ISMS-Framework Basic Package
ISO/IEC 27001:2013 Development Plan
IT Security Act & KRITIS
Network Security
Open Source Intelligence (OSINT) – Investigations on the Internet
PAM – Privileged Access Management
Red Teaming Assessments
Security assessment of product types in the gematik telematics infrastructure (TI)
Security Operations Center (SOC as a Service)
Services for Users of electronic ID (eID) and Trust Service Providers (TSP)
Setting up an ISMS in Accordance with ISO/IEC 27001 on the Basis of IT-Grundschutz
Setting up an ISMS in Accordance with ISO/IEC 27001:2013
SIEM
Social Engineering Campaigns
Support in the field of IT and IS auditing
Supporting IT Auditing and IS Auditing
SWIFT-Assessment
Technical Security Analysis / Penetration Test
Test-Procedures Competences According to BSI Act § 8a
Testing and Certification of IoT Devices
Training as a Certified Risk Manager
Training as Certified BCM Manager
Training as Certified ISMS Auditor
Training as Certified ISMS Manager
TÜV AUSTRIA Academy International Course Program 2023
TÜV AUSTRIA Hotel Safety and Security Standard
Virtual Testing
WACA – Web Accessibility Certificate – Zertifizierungsstelle TÜV AUSTRIA
Wind Energy and Wind Power
Enerji
Buraya ilk kez mi geliyorsunuz? Yolunuzu bulmanıza yardımcı olmaktan mutluluk duyacağım.
Sertifikayı kontrol edin
Bir çözüm bulun
TÜV AUSTRIA'da bir iş bulun.
tami by TÜV AUSTRIA - Çevrimiçi platformunuz
Bilim ödülü gönderin
Kişi Sertifikası
Ürün Sertifikası
Sistem Sertifikası
Uygunluk Doğrulaması
Verileri girin ve bir sertifikayı kontrol edin
Size nasıl yardımcı olabilirim?
Bir çözüm arıyorum ama başlığını bilmiyorum.
İhtiyacımı biliyorum ama uygun bir çözüm bulamıyorum.
Eğitim veya ileri eğitim arıyorum.
Teknik bir kitap arıyorum.
"*" gerekli alanları gösterir
You cannot copy content of this page