Information security management Course

7 years ago Posted By : User Ref No: WURUR13146 0
  • Image
  • TypeTraining or Development Class
  • Image
  • Location Nairobi, Kenya
  • Price
  • Date 04-09-2017 - 08-09-2017
Training or Development Class Title
Information security management Course
Event Type
Training or Development Class
Training or Development Class Date
04-09-2017 to 08-09-2017
Last Date for Applying
01-09-2017
Location
Nairobi, Kenya
Organization Name / Organize By
Indepth Research Services
Organizing/Related Departments
Humanitarian
Organization Type
Organization
Training or Development ClassCategory
Both (Technical & Non Technical)
Training or Development ClassLevel
All (State/Province/Region, National & International)
Related Industries

Education/Teaching/Training/Development

Location
Nairobi, Kenya

This short course provides trainees with knowledge on the management action, which must address the implementation and maintenance of processes, procedures and other issues such as organizational culture. These processes and issues include the identification of information security needs and the implementation of strategies to meet those needs. International standards and guidelines, such as those from the OECD, ISO, ACM and IEEE, are discussed in the course.

This course includes executive briefings designed to present a distilled summary of vitally important information security topics like operating system security and security threat forecasts. Ultimately, the goal of this program is to ensure that managers charged with the responsibility for information security can make informed choices and decisions that will improve their organization's security.

DURATION

5 days.

WHO SHOULD ATTEND

Managers, Chief Information Officers, system administrators, and anyone else who wants to be more acquainted with the field of information security management.

COURSE OBJECTIVES

After completion of the course, delegates will have an understanding of:

  • Information security management, which can be approached from various perspectives;
  • Corporate governance, policies and pure management issues;
  • The human side of information security management, focusing on issues such as security culture, awareness, training, ethics and other human-related issues;
  • Software and hardware products;
  • The establishment of an information security architecture (ISA);
  • Information security architecture; and
  • Risk and the assessment of the current controls, as well as the alignment of controls to meet the requirements of the organization.
  • Establishing a minimum standard for IT security knowledge, skills, and abilities. In a nutshell, this course covers all of the non-operating system topics that are in SANS Security Essentials, though not to the same depth. The goal is to enable managers and auditors to speak the same language as system, security, and network administrators.
  • Establishing a minimum standard for IT management knowledge, skills and abilities. I keep running into managers that do not know TCP/IP, and that is okay; but then they do not know how to calculate total cost of ownership (TCO), leaving me quietly wondering what they do know.
  • Saving the up-and-coming generation of senior and rapidly advancing managers a world of pain by sharing the things we wish someone had shared with us. As the saying goes, it is okay to make mistakes, just make new ones.

Others Details

For more details and updates please visit website.

Registration Fees
Available
Registration Fees Details
USD 1100
Registration Ways
Email
Phone
Website
Address/Venue
  Indepth Research Training Centre, Nairobi, Kenya. 
Official Email ID