Information Security and Data Management Course

Information Security and Data Management Course

INTRODUCTION

Vulnerabilities and lack of necessary security skills applicable to today's technology environments have reached a crisis point and therefore, in order to maintain privacy required and to facilitate efficient communication between agencies, issues of information security, interoperability, and data management must be addressed. Information Security and Data Management training equip participants with knowledge and skills on how to integrate truly effective information security and data management best practices and standards to organizations existing processes, technology assets and management.

WHO SHOULD ATTEND?

  • Technology Engineers, Chief Technology Officer (CTO) and Chief Information Officer (CIO)
  • Chief Risk Officers
  • Key Application Development and Data Research Personnel
  • Professionals and leaders who wish to learn more about cyber security strategies, information governance and ISO standards
  • Personnel who work in IT systems management, legal, risk management, information security, projects, HR and procurement
  • Personnel moving into management and IT security roles who wish to learn about latest trends in cyber security, information audit and risk management

PROGRAMME OBJECTIVES 

  • Know how to determine cyber security risks in Data Management stages
  • Understand the elements of Data Life Cycle
  • Learn how to identify cyber security threats
  • Learn how to apply cybersecurity controls to help reduce risks, issues and threats through policy, strategies and systems
  • Manage the increasing number of audit, risk and legal compliance standards
  • Build solutions that meet ISO requirements in information security
  • Apply the holistic approach to cyber security
  • Understand the benefits and threats of new technologies like Cloud, Artificial Intelligence, Internet of Things and Blockchain
  • Develop skills in identifying and combating threats related to cyber security
  • Learn about the whole range of cyber security risks, issues and threats and how to put effective controls and solutions in place
  • Develop policy and communications to help address information governance, compliance and standards whilst addressing legal and audit requirements
  • Understand how to communicate security awareness and training
  • Improve cyber security strategies, review tools and discuss security, confidentially and business solutions to reduce operational risks
  • Improve working knowledge, global industry standards and best practices in cyber security and information risk management
  • Learn how to apply ISO standards including ISO15489 Records Management Compliance and ISO 27001 Information security management to reduce threats and risks

PROGRAM OUTLINE

Day 1: Cyber Security and Information Security Management

  • Introduction to cyber security
  • Online threats, risks and issues
  • Business continuity, fraud and disaster management
  • ISO 27001 and its family of standards
  • Data, information and records governance
  • Establishing information governance, roles and responsibilities

Day 2: Audit, Legal, Risk and ISO Standards

  • Categorizing Physical and Electronic Risk
  • Audit, legal risks and management of compliance
  • Document and records management compliance
  • ISO 15489 Records Management review
  • Applying ISO27001 Information Security controls
  • Developing policies, procedures and standards
  • Current Threat and Trend Analysis

Day 3: Project Implementation and Training for the New Technologies

  • Key Risk Indicator (KRI)
  • Project implementation plans and controls
  • Risk and issue management
  • Developing business continuity plan
  • Cybersecurity Incident Management
  • Cybersecurity Crisis Management

Day 4: Systems and IT Applications

  • Network Protocols and Communications
  • Network Access
  • Firewalls, application and network security
  • Role based access controls and user management
  • Encryption technologies and standards
  • Email and web security
  • Cyber security systems

Day 5: New Trends in Cybersecurity - Cloud, IoT and Blockchain

  • Cloud types (public, private, hybrid)
  • Blockchain technology
  • Hacking principles
  • Mathematics of hacking
  • Vulnerabilities in the systems and how they are traced

General Notes

·         All our courses can be Tailor-made to participants needs

·         The participant must be conversant with English

·         Presentations are well guided, practical exercise, web based tutorials and group work. Our facilitators are expert with more than 10years of experience.

·         Upon completion of training the participant will be issued with Foscore development center certificate (FDC-K)

·         Training will be done at Foscore development center (FDC-K) center in Nairobi Kenya. We also offer more than five participants training at requested location within Kenya, more than ten participant within east Africa and more than twenty participant all over the world.

·         Course duration is flexible and the contents can be modified to fit any number of days.

·         The course fee includes facilitation training materials, 2 coffee breaks, buffet lunch and a Certificate of successful completion of Training. Participants will be responsible for their own travel expenses and arrangements, airport transfers, visa application dinners, health/accident insurance and other personal expenses.

·         Accommodation, pickup, freight booking and Visa processing arrangement, are done on request, at discounted prices.

·         One year free Consultation and Coaching provided after the course.

·         Register as a group of more than two and enjoy discount of (10% to 50%) plus free five hour adventure drive to the National game park, in Nairobi.

·         Payment should be done two week before commence of the training, to FOSCORE DEVELOPMENT CENTER account, so as to enable us prepare better for you.

·         For any enquiry at:training@fdc-k.org or +254712260031

·         Website:www.fdc-k.org

 

Date: 16/12/2019 to 20/12/2019

Course date, duration and fee

Start Date: 16/12/2019

End Date: 20/12/2019

Duration: 5 Days

Cost: USD 1,000, KES 70,000

Upcoming Courses

Information Security and Data Management Course

Software: Cyber Risk Management

Cost: USD 1,000, KES 70,000

Start Date: 16/12/2019

End Date 20/12/2019

View Course Content

Information Security and Data Management Course

Software: Field practicals

Cost: USD 1,000, KES 70,000

Start Date: 09/03/2020

End Date 13/03/2020

View Course Content

Information Security and Data Management Course

Software: Cyber Risk Management

Cost: USD 1,000, KES 70,000

Start Date: 18/05/2020

End Date 22/05/2020

View Course Content

Information Security and Data Management Course

Software: Cyber Risk Management

Cost: USD 1,000, KES 70,000

Start Date: 27/07/2020

End Date 31/07/2020

View Course Content

Information Security and Data Management Course

Software: Cyber Risk Management

Cost: USD 1,000, KES 70,000

Start Date: 05/10/2020

End Date 09/10/2020

View Course Content

Information Security and Data Management Course

Software: Cyber Risk Management

Cost: USD 1,000, KES 70,000

Start Date: 14/12/2020

End Date 18/12/2020

View Course Content

Download our 2019 course calendar with the list of all course schedule

Our goal is to deliver professional, practical, educational and cultivated training solutions aimed at bettering the performance of individuals and groups within the organization