Information Security and Data Management Course

Training, IT

Start date

05/10/2020

End date

09/10/2020

Overview

Introduction

Vulnerabilities and lack of necessary security skills applicable to today's technology environments have reached a crisis point and therefore, in order to maintain privacy required and to facilitate efficient communication between agencies, issues of information security, interoperability, and data management must be addressed. Information Security and Data Management training equip participants with knowledge and skills on how to integrate truly effective information security and data management best practices and standards to organizations existing processes, technology assets and management.

Course Objectives

At the end of the course, the participants will be able to:

  • Security Investment & Measurement
  • Cyber Risk Management & Security Metrics
  • Enterprise Security Governance & Planning
  • Realistic Security
  • Effective Incident Response
  • Managing Operational Threat
  • Developing a Crisis Communications Strategy
  • Building an Insider Threat Program
  • External Dependency Management

Duration

5 Days

Who Should Attend?

This course targets employees in the information technology department, managers, and all supervisors in all departments. The course also targets new start-ups that want to learn about information security to ensure their information is protected.

Course Content

Introduction & Overview

·Introduction

·Significance of Information Security

Information Security Governance

·Information security governance

·Significance of information security

·Security management programs

Risk Management

·Introduction to information security risk management

·Information security risk assessment

·Information security risk analysis

·Mitigation of information security risk

·Continuous information security risk Monitoring

Developing Information Security Strategy

·Importance/significance of information security strategy

·Factors to consider while developing Information security strategy

·Information security Management Responsibilities

Policies, procedures, standards & guidelines

·Introduction and Liability

·Policy Basics

·Policy Lifecycle

·Best Practices and Guidelines

Information security technology

·Introduction to information security technology

·Trusted vs Untrusted technologies

·VLANs

·Information Encryptions

Incident management

·Introduction to Information Security incident management

·Incident management response lifecycle preparation

·Intrusion detection technologies and systems

·Security incident response

Business continuity & disaster recovery

·Introduction to business continuity planning and disaster recovery

·Business continuity phases

·Disaster recovery

·Recovery strategies

General Notes

  • All our courses can be tailor-made to participants’ needs
  • The participant must be conversant with english
  • Presentations are well guided, practical exercise, web based tutorials and group work. Our facilitators are expert with more than 10 years of experience.
  • Upon completion of training the participant will be issued with foscore development center certificate (fdc-k)
  • Training will be done at foscore development center (fdc-k) in nairobi kenya. We also offer more than five participants training at requested location within kenya, more than ten participants within east africa and more than twenty participant all over the world.
  • Course duration is flexible and the contents can be modified to fit any number of days.
  • The course fee includes facilitation training materials, 2 coffee breaks, buffet lunch and a certificate of successful completion of training. Participants will be responsible for their own travel expenses and arrangements, airport transfers, visa application dinners, health/accident insurance and other personal expenses.
  • Accommodation, pickup, freight booking and visa processing arrangement, are done on request, at discounted prices.
  • One year free consultation and coaching provided after the course.
  • Register as a group of more than two and enjoy discount of (10% to 50%) plus free five hour adventure drive to the national game park, in Nairobi Kenya.
  • Payment should be done two week before commence of the training, to Foscore Development Center account, so as to enable us prepare better for you.
  • For any enquiry at: [email protected] or +254712260031
  • Website: www.fdc-k.org
  • Click to view course content and register as individual or group using this link- https://bit.ly/30WccaA
  • Click to view ICT Skills courses calendar - https://fdc-k.org/trainings/Mobile-Technology
  • Click to view all courses calendar - https://fdc-k.org/trainings

What you will learn

Course Objectives

At the end of the course, the participants will be able to:

  • Security Investment & Measurement
  • Cyber Risk Management & Security Metrics
  • Enterprise Security Governance & Planning
  • Realistic Security
  • Effective Incident Response
  • Managing Operational Threat
  • Developing a Crisis Communications Strategy
  • Building an Insider Threat Program
  • External Dependency Management