Training on Information Security and Data Management

Vulnerabilities and lack of necessary security skills applicable to today's technology environments have reached a crisis point and therefore, in order to maintain privacy required and to facilitate efficient communication between agencies, issues of information security, interoperability, and data management must be addressed. Information Security and Data Management training equip participants with knowledge and skills on how to integrate truly effective information security and data management best practices and standards to organizations existing processes, technology assets and management.

Course Objectives

At the end of the course, the participants will be able to:

o   Security Investment & Measurement

o   Cyber Risk Management & Security Metrics

o   Enterprise Security Governance & Planning

o   Realistic Security

o   Effective Incident Response

o   Managing Operational Threat

o   Developing a Crisis Communications Strategy

o   Building an Insider Threat Program

o   External Dependency Management

Duration

5 Days

Who Should Attend?

This course targets employees in the information technology department, managers, and all supervisors in all departments. The course also targets new start-ups that want to learn about information security to ensure their information is protected.

Course Content

Introduction & Overview

o   Introduction

o   Significance of Information Security

Information Security Governance

o   Information security governance

o   Significance of information security

o   Security management programs

Risk Management

o   Introduction to information security risk management

o   Information security risk assessment

o   Information security risk analysis

o   Mitigation of information security risk

o   Continuous information security risk Monitoring

Developing Information Security Strategy

o   Importance/significance of information security strategy

o   Factors to consider while developing Information security strategy

o   Information security Management Responsibilities

Policies, procedures, standards & guidelines

o   Introduction and Liability

o   Policy Basics

o   Policy Lifecycle

o   Best Practices and Guidelines

Information security technology

o   Introduction to information security technology

o   Trusted vs Untrusted technologies

o   VLANs

o   Information Encryptions

Incident management

o   Introduction to Information Security incident management

o   Incident management response lifecycle preparation

o   Intrusion detection technologies and systems

o   Security incident response

Business continuity & disaster recovery

o   Introduction to business continuity planning and disaster recovery

o   Business continuity phases

o   Disaster recovery

o   Recovery strategies

Date

Venue

Register

25th-29th Nov 2024

Nairobi

9th-13th Dec 2024

Mombasa

10th-14th Feb 2025

Nairobi

10th-14th March 2025

Istanbul

7th-11th April 2025

Nairobi

9th-13th June 2025

Dubai

7th-11th July 2025

Nairobi

8th-12th Sept 2025

Nairobi

6th-10th Oct 2025

Nairobi

3rd-7th Nov 2025

Mombasa

1st-5th Dec 2025

Nairobi

12th-16th Jan 2026

Nairobi

Multiple Training Categories

We offer broad training categories  suitable for your needs depending on your profession.

Wish to get more details about this training?


+254706345988

[email protected]

Scroll to Top