Information Security and Confidentiality Management
Select Other "city & date"
Information Security and Confidentiality Management Course
Introduction:
Data serves as the vital essence for all organizations, as its absence would severely hinder their functionality and eventually lead to their demise. Information represents knowledge, and knowledge equates to power. In a constantly evolving landscape of technology and various threats, both technical and human, the demand for skilled security professionals to safeguard our information has become an increasingly imperative and evolving responsibility.
Course Objectives:
Upon the successful completion of this course, each participant will be able to:-
- Apply up-to-date knowledge & skills in information security & confidentiality management and identify challenges in managing information security
- Practice information security and risk management and operate access control for authentication tokens, accountability, and rootkits: the ultimate malware threat
- Use cryptography and apply physical security
- Illustrate security architecture and design and analyze telecommunications & network and application security
- Gain knowledge of the concepts relating to information security management (confidentiality, integrity, availability, vulnerability, threats, risks, counter measures, etc.)
- Understand the current legislation and regulations which impact upon information security management
- Be fully Aware of current national and international standards such as ISO 27002, frameworks and organizations which facilitate the management of information security
- Understand the current business and common technical environments in which information security management has to operate
- Gain knowledge of the categorization, operation and effectiveness of controls of different types and characteristics
- Recognize legal, regulation, compliance and investigation in information security and confidentiality management
Who Should Attend?
This course is intended for information technology management staff, security management staff, and corporate managers and officers. Also, this training course is suitable for a wide range of professionals but will greatly benefit individuals responsible for:
- Risk Management
- IT Security and IT Security Auditing
- Technical IT Management
- Those with the involvement of systems integration and corporate IT development
- Financial controllers with a technical interest may also benefit from the course
Course Outlines:
Overview of Information Security
- What is Information Security?
- Examples of Information Security Incidents
- What is Information Security Management?
- Human Aspect of Information Security
- Social Engineering
Information Security for Server Systems
- Attacks for Personal Computers and Smartphones and countermeasure
- Information Security Risk Management
- What is the Risk Management process?
- Identifying Information Assets
- Identifying Security Risk and evaluation
- Risk Treatment
Security Risk management as an organization
- Information Security Governance
- Information Security Management System (ISMS)
- Information Security Policy, Standards, and Procedures
- Information Security Evaluation
- Security Incident Response
Information Security and Cryptography
- Requirements for Secure Communication
- What is Cryptography?
- Classic and Modern Cryptography
- Common Key Cryptography algorithms: DES, Triple DES, AES
- Problems of Key distribution for Common Key Cryptography
Data Integrity and Digital Signature
- Integrity of Data
- Hash Function
- Digital Signature
- Public Key Certificate and Public Key Infrastructure (PKI)