Cyber Security Risk Assessment and Management Workshop
Details
Cyber security risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation. This course takes delegates through the practical skills necessary to perform regular risk assessments for their organizations. In this course, delegates will learn about the general information regarding security risk management framework, laws and regulations that impose strict cyber security requirements on all organizations and gain the skills to develop a compliance assessment plan while maintaining a satisfactory security posture.
Duration
5 days.
Who Should Attend
System administrators
Security engineers and
Anybody with an interest in security risk assessment
Methodology
The instructor led trainings are delivered using a blended learning approach and comprises of presentations, guided sessions of practical exercise, web based tutorials and group work. Our facilitators are seasoned industry experts with years of experience, working as professional and trainers in these fields.
All facilitation and course materials will be offered in English. The participants should be reasonably proficient in English.
Accreditation
Upon successful completion of this training, participants will be issued with an Indepth Research Institute (IRES) certificate certified by the National Industrial Training Authority (NITA).
Training Venue
The training will be held at IRES Training Centre. The course fee covers the course tuition, training materials, two break refreshments and lunch.
All participants will additionally cater for their, travel expenses, visa application, insurance, and other personal expenses.
Outline
Learning objectives
At the end of the course training, participants should be able to;
- Establish and maintain certain information security risk criteria.
- Information security risk management framework and methodologies
- Identify “risks associated with the loss of confidentiality, integrity and availability for information within the scope of the information security management system”, and identify the owners of those risks
- Select and implement security controls that ensure compliance with applicable laws, regulations, policies, and directives
- Assessing Compliance Scope and Depth
Course Outline
Module 1: Risk Management Framework (RMF)
Module 2: Understand how to identify information security risk
Module 3: System security boundary
Module 4: Ability to Mitigate residual risk
Schedules
Weekdays | 08:00 AM — 03:00 PM |
No. of Days: | 5 |
Total Hours: | 35 |