INTRODUCTION
Information security, interoperability, and data management concerns must be resolved in order to maintain the appropriate privacy and to enable effective communication between agencies due to vulnerabilities and a lack of security skills applicable to today's technological contexts. Participants in information security and data management training get knowledge and skills on how to apply the industry's most successful best practices and standards to an organization's current business operations, technological resources, and management.
COURSE OBJECTIVES
The following skills will be demonstrated by the participants at the conclusion of the course:
Security Investment & Measurement;
Cyber Risk Management & Security Metrics;
Enterprise Security Governance & Planning; Realistic Security;
Effective Incident Response; Managing Operational Threat;
Crisis Communications Strategy; Building an Insider Threat Program;
External Dependency Management.
DURATION
5 Days
WHO SHOULD ATTEND
This training program is intended for IT staff members, managers, and all departmental supervisors. The training is also intended for brand-new businesses that wish to learn about information security in order to safeguard their data.
COURSE CONTENT
Module 1: Introduction & Overview
- Introduction
- Significance of Information Security
Module 2: Information Security Governance
- Information security governance
- Significance of information security
- Security management programs
Module 3: Risk Management
- Introduction to information security risk management
- Information security risk assessment
- Information security risk analysis
- Mitigation of information security risk
- Continuous information security risk Monitoring
Module 4: Developing Information Security Strategy
- Importance/significance of information security strategy
- Factors to consider while developing Information security strategy
- Information security Management Responsibilities
Module 5: Policies, procedures, standards & guidelines
- Introduction and Liability
- Policy Basics
- Policy Lifecycle
- Best Practices and Guidelines
Module 6: Information security technology
- Introduction to information security technology
- Trusted vs Untrusted technologies
- VLANs
Information Encryptions
Module 7: Incident management
- Introduction to Information Security incident management
- Incident management response lifecycle preparation
- Intrusion detection technologies and systems
- Security incident response
Module 8: Business continuity & disaster recovery
- Introduction to business continuity planning and disaster recovery
- Business continuity phases
- Disaster recovery
Recovery strategies
GENERAL NOTES
- Our seasoned instructors, who have years of experience as seasoned professionals in their respective fields of work, will be teaching this course. A combination of practical exercises, theory, group projects, and case studies are used to teach the course.
- The participants receive training manuals and supplementary reading materials.
- Participants who complete this course successfully will receive a certificate.
- We can also create a course specifically for your organization to match your needs. To learn more, get in touch with us at training@dealsontrainers.org.
- The training will take place at DEALSON TRAINERS IN NAIROBI, KENYA in Nairobi, Kenya.
- The training fee includes lunch, course materials, and lodging for the training session. Upon request, we may arrange for our participants' lodging and transportation to the airport.
- Payment must be made to our bank account before the training begins, and documentation of payment should be emailed to training@dealsontrainers.org