We've noticed this is not your region.
Redirect me to my region
What do you want to learn today?

Information Security Management

ENDED
Inquire Now
On-Site / Workshop
Ended last Jun 09, 2023
KES  75,000.00

Details

Information is the lifeblood of all organizations, without it, it would be severely impacted and ultimately cease to function. Information is knowledge and knowledge is power. With an ever-changing climate of technology and threats (both technical and human), the need for trained security personnel to protect our information becomes an increasingly critical evolutionary task.

Information is at risk from many sources, legal, electronic, physical, internal, and external to mention a few. It is paramount that security and related management personnel have an understanding of the risks, controls, and countermeasures that are available to secure information and technology within an effective management framework. Furthermore, this Information Security Management training course will feature utilizing counter measures, best practices, and management techniques that will mitigate electronic and physical risks and enhance protection of an organization.

Duration

5 days.

Who Should Attend

  • Risk Management
  • IT Security and IT Security Auditing
  • Technical IT Management
  • Those with involvement of systems integration and corporate IT development
  • Financial controllers with a technical interest may also benefit from the seminar

Outline

Module 1: Overview of Information Security

  • What is Information Security?

  • Examples of Information Security Incidents

  • What is Information Security Management?

  • Human Aspect of Information Security

  • Social Engineering

Module 2: Information Security for Server Systems

  • Attacks for Personal Computers and Smart phones and counter measure

  • Information Security Risk Management

  • What is Risk Management process?

  • Identifying Information Assets

  • Identifying Security Risk and evaluation

  • Risk Treatment

Module 3: Security Risk management as an Organization

  • Information Security Governance

  • Information Security Management System (ISMS)

  • Information Security Policy, Standards and Procedures

  • Information Security Evaluation

  • Security Incident Response

Module 4: Information Security and Cryptography

  • Requirements for Secure Communication

  • What is Cryptography?

  • Classic and Modern Cryptography

  • Common Key Cryptography algorithms: DES, Triple DES, AES

  • Problems of Key distribution for Common Key Cryptography

Module 5: Data Integrity and Digital Signature

  • Integrity of Data

  • Hash Function

  • Digital Signature

  • Public Key Certificate and Public Key Infrastructure (PKI)

  • Certificate Authority

Schedules

Jun 05, 2023 - Jun 09, 2023
ENDED
Weekdays 08:00 AM — 03:00 PM
No. of Days: 5
Total Hours: 35
Reviews
Be the first to write a review about this course.
Write a Review
Indepth Research Institute (IRES) is a global capacity building and corporate training provider headquartered in Nairobi Kenya. We build the capacity of people, processes and systems for organizational success and growth as well as nurturing a thriving ecosystem. We do this through our four line of services; Data Analytics, strategy and management solutions; Training and development; Digital innovation and Enterprise systems and organizing Experiential Tours.
Sending Message
Please wait...
× × Speedycourse.com uses cookies to deliver our services. By continuing to use the site, you are agreeing to our use of cookies, Privacy Policy, and our Terms & Conditions.