This one day theory based course has been designed by security consultants, which aims to provide candidates with an understanding of the principles of security, risk management and the role of cybersecurity professionals within an organization.
This one day theory based course has been designed by security consultants, which aims to provide candidates with an understanding of the principles of security, risk management and the role of cybersecurity professionals within an organization.
The course is designed with interactive discussions to focus the participants attention on the relevant risks facing organizations in the current evolving threat landscape.
The course provides participants with a comprehensive overview of information security threats as well as an understanding of appropriate risk assessment and mitigation strategies.
This course can be used as a platform to bridge gaps for those looking to progress to other security courses or to gain an understanding of information systems security.
Who should attend?
Candidates should have a general awareness of information systems and networking.
Systems administrators
Network staff
Developers
IT managers,
Data Protection Officers
Managers looking to gain an understanding of information security
Participants looking to progress onto a Certified Information Systems Security Professional (CISSP) or similar course who do not possess the required knowledge
What will I learn?
The programme is broken into ten modules:
Module 1: Overview of information systems security
Module 2: Threats to information security
Module 3: Information security program structure
Module 4: Policies, standards, procedures and guidelines
Module 5: Training and awareness
Module 6: Asset classification
Module 7: Identification, Authentication, Authorisation and Accounting (IAAA)
Module 8: Physical security
Module 9: Risk analysis and risk management
Module 10: Business continuity planning
How will I benefit?
Understand the key elements and structure of an information systems security program
How to address the range of issues which security practitioners are faced with
Awareness of information security policies
Understand asset classifications and identity and access management
Learn the process of risk management
Gain a greater understanding of business continuity planning
What's included?
Lunch
Refreshments
Comprehensive course notes
A certificate of attendance
BSI is your business improvement partner. We have shaped best practice for over 100 years, helping organizations around the world embed excellence, build competence and capability for sustainable growth.
This certification course is designed for IT professionals and executives who are responsible for managing, designing, developing, deploying and configuring the enterprise-level security protocols for the organization.
The growth and development of cloud technology in business requires proven security professionals who know how to ensure data, applications and infrastructure in the cloud is secure. CCSP (Certified Cloud Security Professional) holders have this knowledge.
Our Certified Incident Handler certification is a course designed to teach best practise for incident response, needed to protect your organisation and clients in the event of a cyber-attack incident through planning, triage, forensic analysis and recovery.
The Short Course in Cyber Security will provide participants with knowledge of the fundamental principles, underlying theory and practical skills employed in securing information and networks.
CISM Certified Information Security Manager is a five-day course. This course is designed for candidates who wish to gain knowledge about manage information security, information assurance and information risk-based processes.
© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy