This one day theory based course has been designed by security consultants, which aims to provide candidates with an understanding of the principles of security, risk management and the role of cybersecurity professionals within an organization.
This one day theory based course has been designed by security consultants, which aims to provide candidates with an understanding of the principles of security, risk management and the role of cybersecurity professionals within an organization.
The course is designed with interactive discussions to focus the participants attention on the relevant risks facing organizations in the current evolving threat landscape.
The course provides participants with a comprehensive overview of information security threats as well as an understanding of appropriate risk assessment and mitigation strategies.
This course can be used as a platform to bridge gaps for those looking to progress to other security courses or to gain an understanding of information systems security.
Who should attend?
Candidates should have a general awareness of information systems and networking.
Systems administrators
Network staff
Developers
IT managers,
Data Protection Officers
Managers looking to gain an understanding of information security
Participants looking to progress onto a Certified Information Systems Security Professional (CISSP) or similar course who do not possess the required knowledge
What will I learn?
The programme is broken into ten modules:
Module 1: Overview of information systems security
Module 2: Threats to information security
Module 3: Information security program structure
Module 4: Policies, standards, procedures and guidelines
Module 5: Training and awareness
Module 6: Asset classification
Module 7: Identification, Authentication, Authorisation and Accounting (IAAA)
Module 8: Physical security
Module 9: Risk analysis and risk management
Module 10: Business continuity planning
How will I benefit?
Understand the key elements and structure of an information systems security program
How to address the range of issues which security practitioners are faced with
Awareness of information security policies
Understand asset classifications and identity and access management
Learn the process of risk management
Gain a greater understanding of business continuity planning
What's included?
Lunch
Refreshments
Comprehensive course notes
A certificate of attendance
BSI is your business improvement partner. We have shaped best practice for over 100 years, helping organizations around the world embed excellence, build competence and capability for sustainable growth.
A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart.
The CompTIA CySA+ is an internationally targeted validation of intermediate-level security skills and knowledge. While there is no required prerequisite, the CompTIA CySA+ certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, “hands-on” focus on IT ...
Malware Analysis training introduces you to the principles, tools and techniques used to reverse engineer binaries, including how to avoid anti-reversing traps. This highly demanding course provided by specialised trainers of cybersecurity
Certified in Risk and Information System Control (CRISC) is another globally recognized certification from ISACA (Information System Audit and Control Association).
CRISC course is offered by Net Security Training for all skill level. Net Security Training is an independent specialist Cyber Security training company whose total focus is the provision of specialised courses and appreticeships catering for Cyber Security and Information Assurance professionals...
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy