- TypeWorkshop
- Location Nairobi, Kenya
- Date 04-11-2024 - 08-11-2024
Education/Teaching/Training/Development
Information Technology
Computer/Technology
Information is the lifeblood of all organizations, without it, it would be severely impacted and ultimately cease to function. Information is knowledge and knowledge is power.
With an ever-changing climate of technology and threats (both technical and human), the need for trained security personnel to protect our information becomes an increasingly critical evolutionary task.
Information is at risk from many sources, legal, electronic, physical, internal, and external to mention a few. It is paramount that security and related management personnel have an understanding of the risks, controls, and countermeasures that are available to secure information and technology within an effective management framework.
Furthermore, this Information Security Management training course will feature utilizing counter measures, best practices, and management techniques that will mitigate electronic and physical risks and enhance protection of an organization.
Duration
5 days.
Who Should Attend
Course Objectives
After completion of the course, delegates will have an understanding of:
Course Outline
Module 1: Overview of Information Security
What is Information Security?
Examples of Information Security Incidents
What is Information Security Management?
Human Aspect of Information Security
Social Engineering
Module 2: Information Security for Server Systems
Attacks for Personal Computers and Smart phones and counter measure
Information Security Risk Management
What is Risk Management process?
Identifying Information Assets
Identifying Security Risk and evaluation
Risk Treatment
Module 3: Security Risk management as an Organization
Information Security Governance
Information Security Management System (ISMS)
Information Security Policy, Standards and Procedures
Information Security Evaluation
Security Incident Response
Module 4: Information Security and Cryptography
Requirements for Secure Communication
What is Cryptography?
Classic and Modern Cryptography
Common Key Cryptography algorithms: DES, Triple DES, AES
Problems of Key distribution for Common Key Cryptography
Module 5: Data Integrity and Digital Signature
Integrity of Data
Hash Function
Digital Signature
Public Key Certificate and Public Key Infrastructure (PKI)
Certificate Authority
Related Courses
Course Administration Details
Methodology
The instructor-led trainings are delivered using a blended learning approach and comprise presentations, guided sessions of practical exercise, web-based tutorials, and group work.
Our facilitators are seasoned industry experts with years of experience, working as professionals and trainers in these fields.
All facilitation and course materials will be offered in English. The participants should therefor be reasonably proficient in English.
Accreditation
Upon successful completion of this training, participants will be issued an Indepth Research Institute (IRES) certificate certified by the National Industrial Training Authority (NITA).
Training Venue
The training will be held at IRES Training Centre.
The course fee covers the course tuition, training materials, two break refreshments, and lunch.
In addition to our training in Kenya (Nairobi, Mombasa, Kisumu, Nakuru, and Naivasha), we conduct training in the following locations:
Accommodation and Airport Transfer
Accommodation and airport pickup are arranged upon request. For reservations, please contact us.
Tailor-Made Program
This training can also be customized to suit the needs of your institution upon request.
You can have it delivered in our IRES Training Centre or at a convenient location.
For further inquiries, kindly contact us
Tala Road, Off Kiambu Road Runda-Nairobi
+254715077817Tala Road, Off Kiambu Road Runda-Nairobi