2-Days Instructor Led
This is an intensive workshop filled with tools, techniques advice and process strategies for improving the security posture of your organization. Participants will gain an understanding of how to organize and oversee a risk-based enterprise information security program, drill down to the critical building blocks of information security, explore the respective roles and responsibilities of the key players, discover industry best practice and legislation.
Learning Objectives
In this course, you will learn the fundamentals of how to apply and implement Information and Security Controls:
- Defining an Information Security Environment
- Understanding the key strategic components of a security model
- Learning the criteria for Secure Business Applications
- Protecting the Network Perimeter
- Implementing successful Business Continuity Planning (BCP)
Audience
This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team, everyone from help desk staff to the Chief Information Officer, understand their role in these security processes.
Prerequisites
While there are no prerequisites for this course, please ensure you have the right level of experience to be successful in this training
Course Outline
- Defining the Information Security Environment
- Attributes of an Information Security
- Threats and Vulnerability of Information Security
- Essential International Requirements
- Security Management: Strategic Components
- Organization Aspects
- The Security Management cycle
- Security Risk Assessment and Management
- Information Classification and Valuation
- Criteria for Secure Business Applications
- I.S. role in system development life cycle (SDLC)
- Cryptography: Key management and application
- Protecting the Network Perimeter
- Fireworks
- Intrusion Detection and Incident response
- Virtual private network
- Wireless and Mobile device security
- Business Continuity Planning (BCP)
- Roles and Responsibilities
- Redundancy, backup and fault Tolerance
- Plan Management and Testing.