INTRODUCTION
Information is the lifeblood of all organizations, without it, it would be severely impacted and ultimately cease to function. Information is knowledge and knowledge is power. With an ever-changing climate of technology and threats (both technical and human), the need for trained security personnel to protect our information becomes an increasingly critical evolutionary task.
Information is at risk from many sources, legal, electronic, physical, internal, and external to mention a few. It is paramount that security and related management personnel have an understanding of the risks, controls, and countermeasures that are available to secure information and technology within an effective management framework. Furthermore, this Information Security Management training course will feature utilizing counter measures, best practices, and management techniques that will mitigate electronic and physical risks and enhance protection of an organization.
DURATION
5 days.
WHO SHOULD ATTEND
- Risk Management
- IT Security and IT Security Auditing
- Technical IT Management
- Those with involvement of systems integration and corporate IT development
- Financial controllers with a technical interest may also benefit from the seminar
Course Level:
COURSE OBJECTIVES
After completion of the course, delegates will have an understanding of:
- Gain knowledge of the concepts relating to information security management (confidentiality, integrity, availability, vulnerability, threats, risks, counter measures, etc.)
- Understand the current legislation and regulations which impact upon information security management
- Be fully aware of current national and international standards such as ISO 27002, frameworks and organizations which facilitate the management of information security
- Understand the current business and common technical environments in which information security management has to operate
- Gain knowledge of the categorization, operation and effectiveness of controls of different types and characteristics
TOPICS TO BE COVERED
Module 1: Overview of Information Security
-
What is Information Security?
-
Examples of Information Security Incidents
-
What is Information Security Management?
-
Human Aspect of Information Security
-
Social Engineering
Module 2: Information Security for Server Systems
-
Attacks for Personal Computers and Smart phones and counter measure
-
Information Security Risk Management
-
What is Risk Management process?
-
Identifying Information Assets
-
Identifying Security Risk and evaluation
-
Risk Treatment
Module 3: Security Risk management as an Organization
-
Information Security Governance
-
Information Security Management System (ISMS)
-
Information Security Policy, Standards and Procedures
-
Information Security Evaluation
-
Security Incident Response
Module 4: Information Security and Cryptography
-
Requirements for Secure Communication
-
What is Cryptography?
-
Classic and Modern Cryptography
-
Common Key Cryptography algorithms: DES, Triple DES, AES
-
Problems of Key distribution for Common Key Cryptography
Module 5: Data Integrity and Digital Signature
-
Integrity of Data
-
Hash Function
-
Digital Signature
-
Public Key Certificate and Public Key Infrastructure (PKI)
-
Certificate Authority
Related Courses
Course Administration Details:
METHODOLOGY
The instructor-led trainings are delivered using a blended learning approach and comprise presentations, guided sessions of practical exercise, web-based tutorials, and group work. Our facilitators are seasoned industry experts with years of experience, working as professionals and trainers in these fields. All facilitation and course materials will be offered in English. The participants should be reasonably proficient in English.
ACCREDITATION
Upon successful completion of this training, participants will be issued an Indepth Research Institute (IRES) certificate certified by the National Industrial Training Authority (NITA).
TRAINING VENUE
The training will be held at IRES Training Centre. The course fee covers the course tuition, training materials, two break refreshments, and lunch. All participants will additionally cater to their travel expenses, visa application, insurance, and other personal expenses.
ACCOMMODATION AND AIRPORT PICKUP
Accommodation and airport pickup are arranged upon request. For reservations contact the Training Officer.
- Email: [email protected]
- Phone: +254715 077 817
TAILOR-MADE
This training can also be customized to suit the needs of your institution upon request. You can have it delivered in our IRES Training Centre or at a convenient location. For further inquiries, please contact us on:
- Email: [email protected]
- Phone: +254715 077 817
PAYMENT
Payment should be transferred to the IRES account through a bank on or before the start of the course. Send proof of payment to [email protected]
Click here to register for this course.
Register NowCustomized Schedule is available for all courses irrespective of dates on the Calendar. Please get in touch with us for details.
Do you need more information on our courses? Talk to us.