Information Security and Data Management
PurposeInformation security, interoperability, and data management concerns must be resolved in order to maintain the appropriate privacy and to enable effective communication between agencies due to vulnerabilities and a lack of security skills applicable to today’s technological contexts. Participants in information security and data management training get knowledge and skills on how to incorporate highly effective best practices and standards for information security and data management into enterprises’ existing processes, technological assets, and management. Course ObjectivesBy completion of the course, participants will be able to:
Duration: 5 DaysTarget AudienceThis training program is intended for IT staff members, managers, and all departmental supervisors. The course is also intended for brand-new businesses that want to learn about information security to make sure their data is secure. Program OutlineTOPIC 1: Information Security OverviewIntroduction and Information Security Importance TOPIC 2: Information security governanceValue of information security Security management programs TOPIC 3: Information Security Risk AssessmentInformation Security Risk Analysis, Information Security Risk Mitigation, and Continuous Information Security Risk Monitoring, Risk Management. TOPIC 4: Information security strategiesFactors to take into consideration when creating IS Strategies, Information security management, Â Developing Information Security Strategies. Responsibilities TOPIC 5: Standards, guidelines, policies, and proceduresIntroduction and Liability; Policy Fundamentals; Policy Lifecycle; Best Practices and Guidelines; Policy Lifecycle, Introduction to information security technology, trusted vs. untrusted technologies, VLANs, Information encryptions TOPIC 7: Incident managementIntroduction to information security incident management, preparation for the incident management response lifecycle, and discussion of intrusion detection methods and systems. TOPIC 8: Business Continuity & Disaster RecoveryIntroduction to Business Continuity Planning, Business Continuity Phases, Disaster Recovery Strategies |
|