Information Security and Data Management

Purpose

Information security, interoperability, and data management concerns must be resolved in order to maintain the appropriate privacy and to enable effective communication between agencies due to vulnerabilities and a lack of security skills applicable to today’s technological contexts. Participants in information security and data management training get knowledge and skills on how to incorporate highly effective best practices and standards for information security and data management into enterprises’ existing processes, technological assets, and management.

Course Objectives

By completion of the course, participants will be able to:

  • Security Investment & Measurement at the conclusion of the course.
  • Crisis communications strategy development
  • Enterprise security governance and planning
  • Realistic security; • Effective incident response
  • Managing operational threat
  • Building an insider threat program
  • External dependability management

Duration: 5 Days

Target Audience

This training program is intended for IT staff members, managers, and all departmental supervisors. The course is also intended for brand-new businesses that want to learn about information security to make sure their data is secure.

Program Outline

TOPIC 1: Information Security Overview

Introduction and Information Security Importance

TOPIC 2: Information security governance

Value of information security

Security management programs

TOPIC 3: Information Security Risk Assessment

Information Security Risk Analysis, Information Security Risk Mitigation, and Continuous Information Security Risk Monitoring, Risk Management.

TOPIC 4: Information security strategies

Factors to take into consideration when creating IS Strategies, Information security management,  Developing Information Security Strategies. Responsibilities

TOPIC 5: Standards, guidelines, policies, and procedures

Introduction and Liability; Policy Fundamentals; Policy Lifecycle; Best Practices and Guidelines; Policy Lifecycle, Introduction to information security technology, trusted vs. untrusted technologies, VLANs, Information encryptions

TOPIC 7: Incident management

Introduction to information security incident management, preparation for the incident management response lifecycle, and discussion of intrusion detection methods and systems.

TOPIC 8: Business Continuity & Disaster Recovery

Introduction to Business Continuity Planning, Business Continuity Phases, Disaster Recovery Strategies