- TypeWorkshop
- Location Nairobi, Kenya,Nairobi,Kenya
- Date 23-09-2024 - 27-09-2024
Information Technology
Computer/Technology
Hardware/Software/Networking Services
Information is the lifeblood of all organizations, without it, it would be severely impacted and ultimately cease to function. Information is knowledge and knowledge is power.
With an ever-changing climate of technology and threats (both technical and human), the need for trained security personnel to protect our information becomes an increasingly critical evolutionary task.
Information is at risk from many sources, legal, electronic, physical, internal, and external to mention a few. It is paramount that security and related management personnel have an understanding of the risks, controls, and countermeasures that are available to secure information and technology within an effective management framework.
This Information Security Management training course will feature utilizing counter measures, best practices, and management techniques that will mitigate electronic and physical risks and enhance protection of an organization.
Duration
5 days.
Who Should Attend
Course Objectives
After completion of the course, the participants will:
Course Outline
Module 1: Overview of Information Security
What is Information Security?
Examples of Information Security Incidents
What is Information Security Management?
Human Aspect of Information Security
Social Engineering
Module 2: Information Security for Server Systems
Attacks for Personal Computers and Smart phones and counter measure
Information Security Risk Management
What is Risk Management process?
Identifying Information Assets
Identifying Security Risk and evaluation
Risk Treatment
Module 3: Security Risk management as an Organization
Information Security Governance
Information Security Management System (ISMS)
Information Security Policy, Standards and Procedures
Information Security Evaluation
Security Incident Response
Module 4: Information Security and Cryptography
Requirements for Secure Communication
What is Cryptography?
Classic and Modern Cryptography
Common Key Cryptography algorithms: DES, Triple DES, AES
Problems of Key distribution for Common Key Cryptography
Module 5: Data Integrity and Digital Signature
Integrity of Data
Hash Function
Digital Signature
Public Key Certificate and Public Key Infrastructure (PKI)
Certificate Authority
Related Courses
Course Administration Details
Methodology
The instructor led trainings are delivered using a blended learning approach and comprise of presentations, guided sessions of practical exercise, web-based tutorials and group work.
Our facilitators are seasoned industry experts with years of experience, working as professional and trainers in these fields.
All facilitation and course materials will be offered in English. The participants should be reasonably proficient in English.
Accreditation
Upon successful completion of this training, participants will be issued with an Indepth Research Institute (IRES) certificate certified by the National Industrial Training Authority (NITA).
Training Locations
The training will be held at IRES Training Centre. The course fee covers the course tuition, training materials, two break refreshments and lunch.
In addition to our training in Kenya (Nairobi, Mombasa, Kisumu, Nakuru, and Naivasha), we conduct training virtually and in the following locations:
Accommodation and Airport Transfer
Accommodation and airport transfer are arranged upon request. For reservations, please contact us.
Tailor-Made Program
This training can also be customized to suit the needs of you or your institution upon request.
You can have it delivered at our IRES Training Centre or at a convenient location of your choice. For further inquiries, please contact us.
Tala Road, Off Kiambu Road Runda-Nairobi
+254715077817Tala Road, Off Kiambu Road Runda-Nairobi