Information Security And Data Management Training

  • Overview

INTRODUCTION

Information security, interoperability, and data management concerns must be resolved in order to maintain the appropriate privacy and to enable effective communication between agencies due to vulnerabilities and a lack of security skills applicable to today's technological contexts. Participants in information security and data management training get knowledge and skills on how to apply the industry's most successful best practices and standards to an organization's current business operations, technological resources, and management.

COURSE OBJECTIVES

The following skills will be demonstrated by the participants at the conclusion of the course:

Security Investment & Measurement;

Cyber Risk Management & Security Metrics;

Enterprise Security Governance & Planning; Realistic Security;

Effective Incident Response; Managing Operational Threat;

Crisis Communications Strategy; Building an Insider Threat Program;

External Dependency Management.

DURATION

5 Days

WHO SHOULD ATTEND

This training program is intended for IT staff members, managers, and all departmental supervisors. The training is also intended for brand-new businesses that wish to learn about information security in order to safeguard their data.

COURSE CONTENT

Module 1: Introduction & Overview

  • Introduction
  • Significance of Information Security

Module 2: Information Security Governance

  • Information security governance
  • Significance of information security
  • Security management programs

Module 3: Risk Management

  • Introduction to information security risk management
  • Information security risk assessment
  • Information security risk analysis
  • Mitigation of information security risk
  • Continuous information security risk Monitoring

Module 4: Developing Information Security Strategy

  • Importance/significance of information security strategy
  • Factors to consider while developing Information security strategy
  • Information security Management Responsibilities

Module 5: Policies, procedures, standards & guidelines

  • Introduction and Liability
  • Policy Basics
  • Policy Lifecycle
  • Best Practices and Guidelines

Module 6: Information security technology

  • Introduction to information security technology
  • Trusted vs Untrusted technologies
  • VLANs

Information Encryptions

Module 7: Incident management

  • Introduction to Information Security incident management
  • Incident management response lifecycle preparation
  • Intrusion detection technologies and systems
  • Security incident response

Module 8: Business continuity & disaster recovery

  • Introduction to business continuity planning and disaster recovery
  • Business continuity phases
  • Disaster recovery

Recovery strategies

GENERAL NOTES

  • Our seasoned instructors, who have years of experience as seasoned professionals in their respective fields of work, will be teaching this course. A combination of practical exercises, theory, group projects, and case studies are used to teach the course.
  • The participants receive training manuals and supplementary reading materials.
  • Participants who complete this course successfully will receive a certificate.
  • We can also create a course specifically for your organization to match your needs. To learn more, get in touch with us at training@dealsontrainers.org.
  • The training will take place at DEALSON TRAINERS IN NAIROBI, KENYA in Nairobi, Kenya.
  • The training fee includes lunch, course materials, and lodging for the training session. Upon request, we may arrange for our participants' lodging and transportation to the airport.
  • Payment must be made to our bank account before the training begins, and documentation of payment should be emailed to training@dealsontrainers.org

Course Schedule:
Dates Duration Fees Location Action