- TypeWorkshop
- Location Online Event
- Date 03-03-2025 - 07-03-2025
Information Technology
Computer/Technology
Internet/Ecommerce
Communications
Information is the lifeblood of all organizations; without it, they would be severely impacted and ultimately cease to function. Information is knowledge, and knowledge is power.
With an ever-changing climate of technology and threats (both technical and human), the need for trained security personnel to protect our information becomes an increasingly critical evolutionary task.
Information is at risk from many sources, including legal, electronic, physical, internal, and external. It is paramount that security and related management personnel understand the risks, controls, and countermeasures available to secure information and technology within an effective management framework.
Furthermore, this Information Security Management training course will utilize countermeasures, best practices, and management techniques to mitigate electronic and physical risks and enhance an organization's protection.
Duration
5 days.
Who Should Attend
Course Objectives
After completion of the course, delegates will have an understanding of the following:
Course Outline
Module 1: Overview of Information Security
What is Information Security?
Examples of Information Security Incidents
What is Information Security Management?
Social Engineering
Module 2: Information Security for Server Systems
Attacks on Personal Computers and Smartphones and countermeasures
Information Security Risk Management
What is the Risk Management process?
Identifying Information Assets
Identifying Security Risks and evaluation
Risk Treatment
Module 3: Security Risk Management as an Organization
Information Security Governance
Information Security Management System (ISMS)
Information Security Policy, Standards, and Procedures
Information Security Evaluation
Security Incident Response
Module 4: Information Security and Cryptography
Requirements for Secure Communication
What is Cryptography?
Classic and Modern Cryptography
Common Key Cryptography algorithms: DES, Triple DES, AES
Problems of Key Distribution for Common Key Cryptography
Module 5: Data Integrity and Digital Signature
Integrity of Data
Hash Function
Digital Signature
Public Key Certificate and Public Key Infrastructure (PKI)
Certificate Authority
Related Courses
Course Administration Details
Methodology
The instructor-led training is delivered using a blended learning approach and comprises presentations, guided sessions of practical exercise, web-based tutorials, and group work.
Our facilitators are seasoned industry experts with years of experience, working as professionals and trainers in these fields.
All facilitation and course materials will be offered in English. Therefore, the participants should be reasonably proficient in English.
Accreditation
Upon successful completion of this training, participants will be issued an IRES certificate certified by the National Industrial Training Authority (NITA).
Training Venue
The training will be held at our training centres.
The course fee covers the course tuition, training materials, two break refreshments, and lunch.
All participants will additionally cater to their travel expenses, visa application, insurance, and other personal expenses.
In addition to our virtual training, we offer training in Kenya (Nairobi, Mombasa, Kisumu, Nakuru, and Naivasha) and in the following locations:
Accommodation and Airport Transfer
Upon request, we can arrange accommodation and airport transfer.
For bookings and reservations, kindly contact us on:
Tailor-Made Program
Upon request, we can also customize this training to suit your needs or your institution's.
You can have it delivered virtually, face-to-face at our training centres or at a convenient location.
For further inquiries, please contact us.
Tala Road, Off Kiambu Road Runda-Nairobi Tala Road
+254715077817Tala Road, Off Kiambu Road Runda-Nairobi