We've noticed this is not your region.
Redirect me to my region
What do you want to learn today?

Information Security and Data Management Course

ENDED
Inquire Now
On-Site / Training

Details

Introduction

Vulnerabilities and lack of necessary security skills applicable to today's technology environments have reached a crisis point and therefore, in order to maintain privacy required and to facilitate efficient communication between agencies, issues of information security, interoperability, and data management must be addressed. Information Security and Data Management training equip participants with knowledge and skills on how to integrate truly effective information security and data management best practices and standards to organizations existing processes, technology assets and management.

Outline

Course Content

Introduction & Overview

  •          Introduction
  •          Significance of Information Security

Information Security Governance

  •          Information security governance
  •          Significance of information security
  •          Security management programs

Risk Management

  •          Introduction to information security risk management
  •          Information security risk assessment
  •          Information security risk analysis
  •          Mitigation of information security risk
  •          Continuous information security risk Monitoring

Developing Information Security Strategy

  •          Importance/significance of information security strategy
  •          Factors to consider while developing Information security strategy
  •          Information security Management Responsibilities

Policies, procedures, standards & guidelines

  •          Introduction and Liability
  •          Policy Basics
  •          Policy Lifecycle
  •          Best Practices and Guidelines

Information security technology

  •          Introduction to information security technology
  •          Trusted vs Untrusted technologies
  •          VLANs
  •          Information Encryptions

Incident management

  •          Introduction to Information Security incident management
  •          Incident management response lifecycle preparation
  •          Intrusion detection technologies and systems
  •          Security incident response

Business continuity & disaster recovery

  •          Introduction to business continuity planning and disaster recovery
  •          Business continuity phases
  •          Disaster recovery
  •          Recovery strategies
Reviews
Be the first to write a review about this course.
Write a Review
Foscore Development Center(FDC-K) is a global training and consulting firm that has been serving leading businesses in many countries. We specialise in capacity building and talent development solutions for individuals and organisations, through our highly customised courses and experienced consultants, in a wide array of disciplines.
Sending Message
Please wait...
× × Speedycourse.com uses cookies to deliver our services. By continuing to use the site, you are agreeing to our use of cookies, Privacy Policy, and our Terms & Conditions.