SlideShare a Scribd company logo
Certificate
SECURE: throughout the day - Episode III
Siemens Information Technology and
the Chief Information Security Officer attest that
Kresimir Popovic
(Z001NVMP)
has successfully completed the Security Online Training
"SECURE: throughout the day Episode III" on Jun 2, 2014.
Training Content
This training program focuses on an on-going and dangerous form of cyber-attack, called Advanced Persistent
Threats (APT). The web-based training shows how these attacks work and which patterns they follow.
Furthermore, handling rules are given to help minimize the risk of a successful APT within our company. A
second key point of the training is the secure usage of Social Media and how to protect against Social
Engineering - both commonly used by potential attackers in order to gain information on their potential target.
Additionally there is a concise characterization of the protection classes and the related handling requirements.
Munich, Jun 2, 2014
This is an automatically generated document and therefore valid without signature.
Siegfried Russwurm
Member of the Managing Board
Responsible for IT
intranet.siemens.com/csts

More Related Content

PDF
SECURE- Throughout the day - Part 2.pdf
PDF
SECURE- Throughout the day - Part 1.pdf
PDF
PDF
Certificate - Protection against Social Engineering.pdf
PDF
Certificate_Secure_Through_The_Day_02
PDF
Understanding Endpoint Security: A Guide For Everyone
PDF
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
SECURE- Throughout the day - Part 2.pdf
SECURE- Throughout the day - Part 1.pdf
Certificate - Protection against Social Engineering.pdf
Certificate_Secure_Through_The_Day_02
Understanding Endpoint Security: A Guide For Everyone
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...

Similar to SECURE- Throughout the day - Part 3.pdf (20)

PPTX
Security Awareness Training from KnowBe4
PDF
Top Cyber News Magazine Daniel Ehrenreich
PDF
2021. Top Cyber News MAGAZINE Daniel Ehrenreich October 2021
PPTX
CYBERSECURITY TRACK.pptx
PDF
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
PDF
Credential Harvesting Using Man in the Middle Attack via Social Engineering
PDF
How to avoid cyber security attacks in 2024 - CyberHive.pdf
PDF
The latest trends in cybersecurity and how to protect yourself.pdf
PPTX
The Charter of Trust
PDF
Leveraging Machine Learning for Proactive Threat Analysis in Cybersecurity
PDF
Certificate
PPT
End User Security Awareness Presentation
PDF
Concept Of Cyber Security.pdf
PPTX
slidesgo-navigating-the-cyber-landscape-understanding-threats-and-strategies-...
PPTX
CyberSecurity3_For_better_Understanding_ofCyberSecurity.pptx
PPTX
Cyber Security.pptx report or a seminar internship
DOCX
Journal of Computer and System Sciences 80 (2014) 973–993Con
DOCX
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
PDF
Comparative Analysis of Phishing Tools
PPTX
ICAO SMS M 02 – Basic safety.pptx
Security Awareness Training from KnowBe4
Top Cyber News Magazine Daniel Ehrenreich
2021. Top Cyber News MAGAZINE Daniel Ehrenreich October 2021
CYBERSECURITY TRACK.pptx
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
Credential Harvesting Using Man in the Middle Attack via Social Engineering
How to avoid cyber security attacks in 2024 - CyberHive.pdf
The latest trends in cybersecurity and how to protect yourself.pdf
The Charter of Trust
Leveraging Machine Learning for Proactive Threat Analysis in Cybersecurity
Certificate
End User Security Awareness Presentation
Concept Of Cyber Security.pdf
slidesgo-navigating-the-cyber-landscape-understanding-threats-and-strategies-...
CyberSecurity3_For_better_Understanding_ofCyberSecurity.pptx
Cyber Security.pptx report or a seminar internship
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Comparative Analysis of Phishing Tools
ICAO SMS M 02 – Basic safety.pptx
Ad

More from Kresimir Popovic (20)

PDF
Amazon_AWS_IAM_2023_Cert.pdf
PDF
Zero_Harm_Culture_@_IC_for_Employees.pdf
PDF
Functional Programming Principles - 03.06.2013.pdf
PDF
Open_Source_Software_Basics.pdf
PDF
Open_Source_Software_Overview.pdf
PDF
Global Bribery and Corruption Certificate.pdf
PDF
Siemens Compliance (SIECO).pdf
PDF
Global Competition Certificate.pdf
PDF
Business Conduct Guidelines (BCG) Certificate.pdf
PDF
udemy - oauth2 and openid crash course.pdf
PDF
Udemy-Starting with Quarkus - March 2022.pdf
PDF
Kubernetes_DeepDive_02-2022.pdf
PDF
NGINX Server Deep Dive March 2002.pdf
PDF
dockerquickstartlegacy-190215093445.pdf
PDF
Remote Communication across cultures - Session.pdf
PDF
Atos Financial Management Training.pdf
PDF
Stepping out of your comfort zone - Videocast Faculty.pdf
PDF
Conquering the Challenges of Public Speaking.pdf
PDF
Capturing and keeping your audience’s attention - Session.pdf
PDF
Security and Safety awareness.pdf
Amazon_AWS_IAM_2023_Cert.pdf
Zero_Harm_Culture_@_IC_for_Employees.pdf
Functional Programming Principles - 03.06.2013.pdf
Open_Source_Software_Basics.pdf
Open_Source_Software_Overview.pdf
Global Bribery and Corruption Certificate.pdf
Siemens Compliance (SIECO).pdf
Global Competition Certificate.pdf
Business Conduct Guidelines (BCG) Certificate.pdf
udemy - oauth2 and openid crash course.pdf
Udemy-Starting with Quarkus - March 2022.pdf
Kubernetes_DeepDive_02-2022.pdf
NGINX Server Deep Dive March 2002.pdf
dockerquickstartlegacy-190215093445.pdf
Remote Communication across cultures - Session.pdf
Atos Financial Management Training.pdf
Stepping out of your comfort zone - Videocast Faculty.pdf
Conquering the Challenges of Public Speaking.pdf
Capturing and keeping your audience’s attention - Session.pdf
Security and Safety awareness.pdf
Ad

Recently uploaded (20)

PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
top salesforce developer skills in 2025.pdf
PDF
Digital Strategies for Manufacturing Companies
PDF
System and Network Administraation Chapter 3
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
System and Network Administration Chapter 2
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
medical staffing services at VALiNTRY
PPTX
Introduction to Artificial Intelligence
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
L1 - Introduction to python Backend.pptx
PPTX
history of c programming in notes for students .pptx
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
top salesforce developer skills in 2025.pdf
Digital Strategies for Manufacturing Companies
System and Network Administraation Chapter 3
CHAPTER 2 - PM Management and IT Context
System and Network Administration Chapter 2
How to Migrate SBCGlobal Email to Yahoo Easily
medical staffing services at VALiNTRY
Introduction to Artificial Intelligence
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Design an Analysis of Algorithms I-SECS-1021-03
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Upgrade and Innovation Strategies for SAP ERP Customers
VVF-Customer-Presentation2025-Ver1.9.pptx
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Internet Downloader Manager (IDM) Crack 6.42 Build 41
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
L1 - Introduction to python Backend.pptx
history of c programming in notes for students .pptx

SECURE- Throughout the day - Part 3.pdf

  • 1. Certificate SECURE: throughout the day - Episode III Siemens Information Technology and the Chief Information Security Officer attest that Kresimir Popovic (Z001NVMP) has successfully completed the Security Online Training "SECURE: throughout the day Episode III" on Jun 2, 2014. Training Content This training program focuses on an on-going and dangerous form of cyber-attack, called Advanced Persistent Threats (APT). The web-based training shows how these attacks work and which patterns they follow. Furthermore, handling rules are given to help minimize the risk of a successful APT within our company. A second key point of the training is the secure usage of Social Media and how to protect against Social Engineering - both commonly used by potential attackers in order to gain information on their potential target. Additionally there is a concise characterization of the protection classes and the related handling requirements. Munich, Jun 2, 2014 This is an automatically generated document and therefore valid without signature. Siegfried Russwurm Member of the Managing Board Responsible for IT intranet.siemens.com/csts