This one day theory based course has been designed by security consultants, which aims to provide candidates with an understanding of the principles of security, risk management and the role of cybersecurity professionals within an organization.
This one day theory based course has been designed by security consultants, which aims to provide candidates with an understanding of the principles of security, risk management and the role of cybersecurity professionals within an organization.
The course is designed with interactive discussions to focus the participants attention on the relevant risks facing organizations in the current evolving threat landscape.
The course provides participants with a comprehensive overview of information security threats as well as an understanding of appropriate risk assessment and mitigation strategies.
This course can be used as a platform to bridge gaps for those looking to progress to other security courses or to gain an understanding of information systems security.
Who should attend?
Candidates should have a general awareness of information systems and networking.
Systems administrators
Network staff
Developers
IT managers,
Data Protection Officers
Managers looking to gain an understanding of information security
Participants looking to progress onto a Certified Information Systems Security Professional (CISSP) or similar course who do not possess the required knowledge
What will I learn?
The programme is broken into ten modules:
Module 1: Overview of information systems security
Module 2: Threats to information security
Module 3: Information security program structure
Module 4: Policies, standards, procedures and guidelines
Module 5: Training and awareness
Module 6: Asset classification
Module 7: Identification, Authentication, Authorisation and Accounting (IAAA)
Module 8: Physical security
Module 9: Risk analysis and risk management
Module 10: Business continuity planning
How will I benefit?
Understand the key elements and structure of an information systems security program
How to address the range of issues which security practitioners are faced with
Awareness of information security policies
Understand asset classifications and identity and access management
Learn the process of risk management
Gain a greater understanding of business continuity planning
What's included?
Lunch
Refreshments
Comprehensive course notes
A certificate of attendance
BSI is your business improvement partner. We have shaped best practice for over 100 years, helping organizations around the world embed excellence, build competence and capability for sustainable growth.
Focusing on detection and response to cyber threats E|CIH covers incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication
Our Network Security qualification prepares you for tasks like these by developing the skills needed to design, implement and support security for network devices and ensure their integrity.
The purpose of the Level 2 Certificate in Cyber Security is to provide learners with sector awareness. It will do this by introducing the knowledge and understanding in roles and issues relating to Cyber Security. The secondary purpose is to act as a stepping stone that will lead learners into stud...
This training package is comprised of three globally recognized professional certifications. After completing the training, you will also be offered to work as trainee IT Support engineer with one of our many partner companies and getting chance to apply your knowledge in real world environment.
Certified Information System Security Professional (CISSP) is a well-reputed recognition for any Cyber Security professional. This training program’s subject matter will make you ready to effectively design, deploy, and configure an enterprise-level Computer network.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy