Information Security Management Course


INTRODUCTION

Information is the lifeblood of all organizations, without it, it would be severely impacted and ultimately cease to function. Information is knowledge and knowledge is power. With an ever-changing climate of technology and threats (both technical and human), the need for trained security personnel to protect our information becomes an increasingly critical evolutionary task.

Information is at risk from many sources, legal, electronic, physical, internal, and external to mention a few. It is paramount that security and related management personnel have an understanding of the risks, controls, and countermeasures that are available to secure information and technology within an effective management framework. Furthermore, this Information Security Management training course will feature utilizing counter measures, best practices, and management techniques that will mitigate electronic and physical risks and enhance protection of an organization.

DURATION

5 days.

WHO SHOULD ATTEND

  • Risk Management
  • IT Security and IT Security Auditing
  • Technical IT Management
  • Those with involvement of systems integration and corporate IT development
  • Financial controllers with a technical interest may also benefit from the seminar

COURSE OBJECTIVES

After completion of the course, delegates will have an understanding of:

  • Gain knowledge of the concepts relating to information security management (confidentiality, integrity, availability, vulnerability, threats, risks, counter measures, etc.)
  • Understand the current legislation and regulations which impact upon information security management
  • Be fully aware of current national and international standards such as ISO 27002, frameworks and organizations which facilitate the management of information security
  • Understand the current business and common technical environments in which information security management has to operate
  • Gain knowledge of the categorization, operation and effectiveness of controls of different types and characteristics

TOPICS TO BE COVERED

Module 1:   Overview of Information Security

  • What is Information Security?

  • Examples of Information Security Incidents

  • What is Information Security Management?

  • Human Aspect of Information Security

  • Social Engineering

Module 2:  Information Security for Server Systems

  • Attacks for Personal Computers and Smart phones and counter measure

  • Information Security Risk Management

  • What is Risk Management process?

  • Identifying Information Assets

  • Identifying Security Risk and evaluation

  • Risk Treatment

Module 3:  Security Risk management as an Organization

  • Information Security Governance

  • Information Security Management System (ISMS)

  • Information Security Policy, Standards and Procedures

  • Information Security Evaluation

  • Security Incident Response

Module 4:  Information Security and Cryptography

  • Requirements for Secure Communication

  • What is Cryptography?

  • Classic and Modern Cryptography

  • Common Key Cryptography algorithms: DES, Triple DES, AES

  • Problems of Key distribution for Common Key Cryptography

Module 5:  Data Integrity and Digital Signature

  • Integrity of Data

  • Hash Function

  • Digital Signature

  • Public Key Certificate and Public Key Infrastructure (PKI)

  • Certificate Authority

Enroll for this Course

We are proud to offer this course in a variety of training formats to suit your needs.

IRES

Enroll for In-Person (Face to Face) Class

We use the highest quality learning facilities to make sure your experience is as comfortable as possible.

View Schedules for Dates
IRES

Enroll for a Virtual Zoom Class

Join a scheduled class with a live instructor and other delegates.

View Schedules for Dates
IRES

Enroll for Online Self-paced Class

Keep track of your own progression throughout your course and ensure continuous improvement.

View Schedules for Dates

Benefits of Taking a Course at IRES

LEARN

Our courses are carefully curated to keep you abreast of latest industry trends, technological advancements, and best practices. We employ a variety of teaching methodologies, including hands-on workshops, case studies, and interactive sessions, all aimed at fostering an engaging and effective learning environment. Our expert instructors bring a wealth of knowledge and real-world experience, providing our clients with insights that can be immediately applied in their professional lives.

NETWORK

Our courses serve as a vibrant platform for professionals to connect and engage with a diverse community of peers, industry leaders, and experts. By participating in our programs, you gain access to an invaluable network that spans across various sectors and geographical boundaries. This networking aspect is not just about forming professional relationships; it's about creating a supportive ecosystem where ideas, opportunities, and collaborations can flourish.

GROW

Our courses are designed to challenge and inspire professionals to step out of their comfort zones and explore new horizons. Through a combination of theoretical knowledge and practical application, our programs help professionals refine their existing skills and acquire new ones, making them more versatile and competitive.

FAQs & Course Administration Details:

This training can also be customized to suit the needs of your institution upon request. You can have it delivered in our IRES Training Centre or at a convenient location. For further inquiries, please contact us on Phone: +254 715 077 817 or Email: [email protected].
The instructor led trainings are delivered using a blended learning approach and comprise of presentations, guided sessions of practical exercise, web-based tutorials and group work. Our facilitators are seasoned industry experts with years of experience, working as professional and trainers in these fields. All facilitation and course materials will be offered in English. The participants should be reasonably proficient in English.
Upon successful completion of this training, participants will be issued with an Indepth Research Institute (IRES) certificate certified by the National Industrial Training Authority (NITA).
Payment should be transferred to IRES account through bank on or before start of the course. Send proof of payment to [email protected].
Accommodation and airport pickup are arranged upon request. For reservations contact the Training Officer. Email: [email protected] Phone: +254 715 077 817.

Who else has taken this course?


# Job Title Organisation Country
1 Deputy Manager IT Ignite National Technology Fund Pakistan
2 CEO DOVE Agrovet Somalia
3 Senior Records Management Assistant Capital Markets Authority Kenya