- TypeTraining or Development Class
- Location Nairobi, Kenya
- Date 25-07-2022 - 29-07-2022
Education/Teaching/Training/Development
Information Technology
Computer/Technology
Hardware/Software/Networking Services
Introduction
Vulnerabilities and lack of necessary security skills applicable to today's technology environments have reached a crisis point and therefore, in order to maintain privacy required and to facilitate efficient communication between agencies, issues of information security, interoperability, and data management must be addressed. Information Security and Data Management training equip participants with knowledge and skills on how to integrate truly effective information security and data management best practices and standards to organizations existing processes, technology assets and management.
Course Objectives
At the end of the course, the participants will be able to:
o Security Investment & Measurement
o Cyber Risk Management & Security Metrics
o Enterprise Security Governance & Planning
o Realistic Security
o Effective Incident Response
o Managing Operational Threat
o Developing a Crisis Communications Strategy
o Building an Insider Threat Program
o External Dependency Management
Duration
5 Days
Who Should Attend?
This course targets employees in the information technology department, managers, and all supervisors in all departments. The course also targets new start-ups that want to learn about information security to ensure their information is protected.
Course Content
Introduction & Overview
o Introduction
o Significance of Information Security
Information Security Governance
o Information security governance
o Significance of information security
o Security management programs
Risk Management
o Introduction to information security risk management
o Information security risk assessment
o Information security risk analysis
o Mitigation of information security risk
o Continuous information security risk Monitoring
Developing Information Security Strategy
o Importance/significance of information security strategy
o Factors to consider while developing Information security strategy
o Information security Management Responsibilities
Policies, procedures, standards & guidelines
o Introduction and Liability
o Policy Basics
o Policy Lifecycle
o Best Practices and Guidelines
Information security technology
o Introduction to information security technology
o Trusted vs Untrusted technologies
o VLANs
o Information Encryptions
Incident management
o Introduction to Information Security incident management
o Incident management response lifecycle preparation
o Intrusion detection technologies and systems
o Security incident response
Business continuity & disaster recovery
o Introduction to business continuity planning and disaster recovery
o Business continuity phases
o Disaster recovery
o Recovery strategies
Training Approach
This course will be delivered by our skilled trainers who have vast knowledge and experience as expert professionals in the fields. The course is taught in English and through a mix of theory, practical activities, group discussion and case studies. Course manuals and additional training materials will be provided to the participants upon completion of the training.
Tailor-Made Course
This course can also be tailor-made to meet organization requirement. For further inquiries, please contact us on: Email: [email protected] Tel: +254 721 331 808
Training Venue
The training will be held at our Upskill Training Centre. We also offer training for a group (at a discount of 10% to 50%) at requested location all over the world. The course fee covers the course tuition, training materials, two break refreshments, and buffet lunch.
Visa application, travel expenses, airport transfers, dinners, accommodation, insurance, and other personal expenses are catered by the participant
Certification
Participants will be issued with Upskill certificate upon completion of this course.