Information Security and Data Management Course
Learn at the comfort of your home or office

Information Security and Data Management Course

5 Days Online - Virtual Training

Share this Workshop

# Start Date End Date Duration Location Registration
23 12/06/2023 16/06/2023 5 Days Live Online Training
24 10/07/2023 14/07/2023 5 Days Live Online Training
25 07/08/2023 11/08/2023 5 Days Live Online Training
26 14/08/2023 18/08/2023 5 Days Live Online Training
27 04/09/2023 08/09/2023 5 Days Live Online Training
28 18/09/2023 22/09/2023 5 Days Live Online Training
29 02/10/2023 06/10/2023 5 Days Live Online Training
30 30/10/2023 03/11/2023 5 Days Live Online Training
31 08/01/2024 12/01/2024 5 Days Live Online Training
32 05/02/2024 09/02/2024 5 Days Live Online Training
33 04/03/2024 08/03/2024 5 Days Live Online Training
34 01/04/2024 05/04/2024 5 Days Live Online Training
35 29/04/2024 03/05/2024 5 Days Live Online Training
36 27/05/2024 31/05/2024 5 Days Live Online Training
37 24/06/2024 28/06/2024 5 Days Live Online Training
38 22/07/2024 26/07/2024 5 Days Live Online Training
39 19/08/2024 23/08/2024 5 Days Live Online Training
40 16/09/2024 20/09/2024 5 Days Live Online Training
41 14/10/2024 18/10/2024 5 Days Live Online Training
42 11/11/2024 15/11/2024 5 Days Live Online Training
43 09/12/2024 13/12/2024 5 Days Live Online Training
44 16/12/2024 20/12/2024 5 Days Live Online Training


Vulnerabilities and lack of necessary security skills applicable to today's technology environments have reached a crisis point and therefore, in order to maintain privacy required and to facilitate efficient communication between agencies, issues of information security, interoperability, and data management must be addressed. Information Security and Data Management training equip participants with knowledge and skills on how to integrate truly effective information security and data management best practices and standards to organizations existing processes, technology assets and management.

Course Objectives

At the end of the course, the participants will be able to:

·         Security Investment & Measurement

·         Cyber Risk Management & Security Metrics

·         Enterprise Security Governance & Planning

·         Realistic Security

·         Effective Incident Response

·         Managing Operational Threat

·         Developing a Crisis Communications Strategy

·         Building an Insider Threat Program

·         External Dependency Management


5 Days

Who Should Attend?

This course targets employees in the information technology department, managers, and all supervisors in all departments. The course also targets new start-ups that want to learn about information security to ensure their information is protected.

Course Content

Introduction & Overview

·         Introduction

·         Significance of Information Security

Information Security Governance

·         Information security governance

·         Significance of information security

·         Security management programs

Risk Management

·         Introduction to information security risk management

·         Information security risk assessment

·         Information security risk analysis

·         Mitigation of information security risk

·         Continuous information security risk Monitoring

Developing Information Security Strategy

·         Importance/significance of information security strategy

·         Factors to consider while developing Information security strategy

·         Information security Management Responsibilities

Policies, procedures, standards & guidelines

·         Introduction and Liability

·         Policy Basics

·         Policy Lifecycle

·         Best Practices and Guidelines

Information security technology

·         Introduction to information security technology

·         Trusted vs Untrusted technologies

·         VLANs

·         Information Encryptions

Incident management

·         Introduction to Information Security incident management

·         Incident management response lifecycle preparation

·         Intrusion detection technologies and systems

·         Security incident response

Business continuity & disaster recovery

·         Introduction to business continuity planning and disaster recovery

·         Business continuity phases

·         Disaster recovery

·         Recovery strategies

General Notes

·         All our courses can be Tailor-made to participants' needs

·         The participant must be conversant in English

·         Presentations are well-guided, practical exercises, web-based tutorials, and group work. Our facilitators are experts with more than 10 years of experience.

·         Upon completion of training the participant will be issued with a Foscore development center certificate (FDC-K)

·         Training will be done at the Foscore development center (FDC-K) centers. We also offer inhouse and online training on the client schedule

·         Course duration is flexible and the contents can be modified to fit any number of days.

·         The course fee for onsite training includes facilitation training materials, 2 coffee breaks, a buffet lunch, and a Certificate of successful completion of Training. Participants will be responsible for their own travel expenses and arrangements, airport transfers, visa application dinners, health/accident insurance, and other personal expenses.

·         Accommodation, pickup, freight booking, and Visa processing arrangement, are done on request, at discounted prices.

·         Tablet and Laptops are provided to participants on request as an add-on cost to the training fee.

·         One-year free Consultation and Coaching provided after the course.

·         Register as a group of more than two and enjoy a discount of (10% to 50%)

·         Payment should be done before commence of the training or as agreed by the parties, to the FOSCORE DEVELOPMENT CENTER account, so as to enable us to prepare better for you.

·         For any inquiries reach us at or +254712260031



Foscore Development Center |Training Courses | Monitoring and Evaluation|Data Analysis|Market Research |M&E Consultancy |ICT Services |Mobile Data Collection | ODK Course | KoboToolBox | GIS and Environment |Agricultural Services |Business Analytics specializing in short courses in GIS, Monitoring and Evaluation (M&E), Data Management, Data Analysis, Research, Social Development, Community Development, Finance Management, Finance Analysis, Humanitarian and Agriculture, Mobile data Collection, Mobile data Collection training, Mobile data Collection training Nairobi, Mobile data Collection training Kenya, ODK, ODK training, ODK training Nairobi, ODK training Kenya, Open Data Kit, Open Data Kit training, Open Data Kit Training, capacity building, consultancy and talent development solutions for individuals and organisations, through our highly customised courses and experienced consultants, in a wide array of disciplines

Other Upcoming Online Workshops

1 Photography Videography and Film Production course
2 Non-Governmental Organizations (NGO) Management course
3 Public Sector Management course
4 Project Information Management System for Development Organizations and NGOs Course
5 Rural Development course
6 Quantitative Data management, analysis and Visualization with Python
7 GIS for Water Resource Management Course
8 GIS Disease Surveillance Monitoring Course
9 Monitoring and Evaluation for Governance course
10 Irrigation and Operational Maintenance Course
Chat with our Consultants WhatsApp