INTRODUCTION
Information is the lifeblood of all organizations, without it, it would be severely impacted and ultimately cease to function. Information is knowledge and knowledge is power. With an ever-changing climate of technology and threats (both technical and human), the need for trained security personnel to protect our information becomes an increasingly critical evolutionary task.
Information is at risk from many sources, legal, electronic, physical, internal, and external to mention a few. It is paramount that security and related management personnel have an understanding of the risks, controls, and countermeasures that are available to secure information and technology within an effective management framework. Furthermore, this Information Security Management training course will feature utilizing counter measures, best practices, and management techniques that will mitigate electronic and physical risks and enhance protection of an organization.
DURATION
5 days.
WHO SHOULD ATTEND
COURSE OBJECTIVES
After completion of the course, delegates will have an understanding of:
TOPICS TO BE COVERED
Module 1: Overview of Information Security
What is Information Security?
Examples of Information Security Incidents
What is Information Security Management?
Human Aspect of Information Security
Social Engineering
Module 2: Information Security for Server Systems
Attacks for Personal Computers and Smart phones and counter measure
Information Security Risk Management
What is Risk Management process?
Identifying Information Assets
Identifying Security Risk and evaluation
Risk Treatment
Module 3: Security Risk management as an Organization
Information Security Governance
Information Security Management System (ISMS)
Information Security Policy, Standards and Procedures
Information Security Evaluation
Security Incident Response
Module 4: Information Security and Cryptography
Requirements for Secure Communication
What is Cryptography?
Classic and Modern Cryptography
Common Key Cryptography algorithms: DES, Triple DES, AES
Problems of Key distribution for Common Key Cryptography
Module 5: Data Integrity and Digital Signature
Integrity of Data
Hash Function
Digital Signature
Public Key Certificate and Public Key Infrastructure (PKI)
Certificate Authority
We are proud to offer this course in a variety of training formats to suit your needs.
Our courses are carefully curated to keep you abreast of latest industry trends, technological advancements, and best practices. We employ a variety of teaching methodologies, including hands-on workshops, case studies, and interactive sessions, all aimed at fostering an engaging and effective learning environment. Our expert instructors bring a wealth of knowledge and real-world experience, providing our clients with insights that can be immediately applied in their professional lives.
Our courses serve as a vibrant platform for professionals to connect and engage with a diverse community of peers, industry leaders, and experts. By participating in our programs, you gain access to an invaluable network that spans across various sectors and geographical boundaries. This networking aspect is not just about forming professional relationships; it's about creating a supportive ecosystem where ideas, opportunities, and collaborations can flourish.
Our courses are designed to challenge and inspire professionals to step out of their comfort zones and explore new horizons. Through a combination of theoretical knowledge and practical application, our programs help professionals refine their existing skills and acquire new ones, making them more versatile and competitive.
# | Job Title | Organisation | Country |
---|---|---|---|
1 | Deputy Manager IT | Ignite National Technology Fund | Pakistan |
2 | CEO | DOVE Agrovet | Somalia |
3 | Senior Records Management Assistant | Capital Markets Authority | Kenya |