| Course Date |
Duration |
Location |
Registration |
| 09/03/2026
To 13/03/2026 |
5 Days |
Mombasa, Kenya |
|
|
|
| 16/03/2026
To 20/03/2026 |
5 Days |
Mombasa, Kenya |
|
|
|
| 23/03/2026
To 27/03/2026 |
5 Days |
Nairobi, Kenya |
|
|
|
| 30/03/2026
To 03/04/2026 |
5 Days |
Addis Ababa, Ethiopia |
|
|
|
| 06/04/2026
To 10/04/2026 |
5 Days |
Guangzhou, China |
|
|
|
| 13/04/2026
To 17/04/2026 |
5 Days |
Pretoria, South Africa |
|
|
|
| 20/04/2026
To 24/04/2026 |
5 Days |
Nairobi, Kenya |
|
|
|
| 27/04/2026
To 01/05/2026 |
5 Days |
Guangzhou, China |
|
|
|
| 04/05/2026
To 08/05/2026 |
5 Days |
Singapore |
|
|
|
| 11/05/2026
To 15/05/2026 |
5 Days |
Nairobi, Kenya |
|
|
|
| 18/05/2026
To 22/05/2026 |
5 Days |
Dubai, UAE |
|
|
|
| 25/05/2026
To 29/05/2026 |
5 Days |
Singapore |
|
|
|
| 01/06/2026
To 05/06/2026 |
5 Days |
Addis Ababa, Ethiopia |
|
|
|
| 08/06/2026
To 12/06/2026 |
5 Days |
Shenzhen, China |
|
|
|
| 15/06/2026
To 19/06/2026 |
5 Days |
Addis Ababa, Ethiopia |
|
|
|
| 22/06/2026
To 26/06/2026 |
5 Days |
Singapore |
|
|
|
| 29/06/2026
To 03/07/2026 |
5 Days |
Nairobi, Kenya |
|
|
|
| 06/07/2026
To 10/07/2026 |
5 Days |
Dar es Salaam, Tanzania |
|
|
|
| 13/07/2026
To 17/07/2026 |
5 Days |
Shanghai, China |
|
|
|
| 20/07/2026
To 24/07/2026 |
5 Days |
Guangzhou, China |
|
|
|
| 27/07/2026
To 31/07/2026 |
5 Days |
Kigali, Rwanda |
|
|
|
| 03/08/2026
To 07/08/2026 |
5 Days |
Dubai, UAE |
|
|
|
| 10/08/2026
To 14/08/2026 |
5 Days |
Cape Town, South Africa |
|
|
|
| 17/08/2026
To 21/08/2026 |
5 Days |
Singapore |
|
|
|
| 24/08/2026
To 28/08/2026 |
5 Days |
Istanbul, Turkey |
|
|
|
| 31/08/2026
To 04/09/2026 |
5 Days |
Beijing, China |
|
|
|
| 07/09/2026
To 11/09/2026 |
5 Days |
Pretoria, South Africa |
|
|
|
| 14/09/2026
To 18/09/2026 |
5 Days |
Guangzhou, China |
|
|
|
| 21/09/2026
To 25/09/2026 |
5 Days |
Singapore |
|
|
|
| 28/09/2026
To 02/10/2026 |
5 Days |
Beijing, China |
|
|
|
| 05/10/2026
To 09/10/2026 |
5 Days |
Shenzhen, China |
|
|
|
| 12/10/2026
To 16/10/2026 |
5 Days |
Addis Ababa, Ethiopia |
|
|
|
| 19/10/2026
To 23/10/2026 |
5 Days |
Cape Town, South Africa |
|
|
|
| 26/10/2026
To 30/10/2026 |
5 Days |
Pretoria, South Africa |
|
|
|
| 02/11/2026
To 06/11/2026 |
5 Days |
Cape Town, South Africa |
|
|
|
| 09/11/2026
To 13/11/2026 |
5 Days |
Singapore |
|
|
|
| 16/11/2026
To 20/11/2026 |
5 Days |
Beijing, China |
|
|
|
| 23/11/2026
To 27/11/2026 |
5 Days |
Mombasa, Kenya |
|
|
|
| 30/11/2026
To 04/12/2026 |
5 Days |
Shanghai, China |
|
|
|
| 07/12/2026
To 11/12/2026 |
5 Days |
Guangzhou, China |
|
|
|
| 14/12/2026
To 18/12/2026 |
5 Days |
Kigali, Rwanda |
|
|
|
| 21/12/2026
To 25/12/2026 |
5 Days |
Mombasa, Kenya |
|
|
|
| 28/12/2026
To 01/01/2027 |
5 Days |
Shenzhen, China |
|
|
|
Information Security and Data Management Course
Introduction
In today’s digital economy, organizations are increasingly exposed to cyber threats, data breaches, and regulatory compliance risks. The Information Security and Data Management Course is designed to equip professionals with advanced competencies in cybersecurity, data protection, data governance, risk management, access control, network security, and secure information systems management. This training provides practical and policy-oriented skills needed to safeguard organizational data assets while ensuring efficient data utilization and compliance with international standards.
With growing adoption of cloud computing, mobile technologies, and digital transformation initiatives, the need for robust information security frameworks, data privacy management, ISO 27001 standards, GDPR compliance, business continuity, and disaster recovery planning has become critical. This course focuses on developing secure data management systems, implementing access control mechanisms, and protecting sensitive information from cyber threats, insider risks, and system vulnerabilities.
Participants will gain hands-on knowledge in data classification, encryption techniques, network security architecture, cybersecurity risk assessments, vulnerability management, secure backup systems, and incident response procedures. Real-world case studies and simulations will enable learners to design, implement, and manage comprehensive information security programs that support operational continuity and digital trust.
By the end of this program, participants will be empowered to build secure, compliant, and resilient data management systems that improve organizational efficiency, protect intellectual property, ensure regulatory compliance, and strengthen institutional credibility in an increasingly data-driven world.
Course Objectives
- Understand core principles of information security and data management.
- Identify cybersecurity risks and vulnerabilities.
- Implement data protection and privacy controls.
- Apply international security standards and compliance frameworks.
- Design secure network and system architectures.
- Establish data governance and classification policies.
- Implement access control and authentication mechanisms.
- Manage data backup, recovery, and continuity plans.
- Respond effectively to cybersecurity incidents.
- Promote a culture of data security awareness.
Organizational Benefits
- Reduced cyber risks and data breaches.
- Improved regulatory compliance and audit readiness.
- Enhanced data integrity and confidentiality.
- Improved system reliability and uptime.
- Strengthened customer and stakeholder trust.
- Reduced operational and financial losses.
- Improved information governance practices.
- Increased staff cybersecurity awareness.
- Better decision-making using protected data.
- Strengthened institutional reputation and digital resilience.
Target Participants
- IT managers and system administrators
- Data managers and analysts
- Cybersecurity and information security officers
- Compliance and risk management officers
- Database administrators
- Government and NGO ICT staff
- Banking and financial services staff
- Healthcare and education IT personnel
- Digital transformation officers
- Business continuity and audit professionals
Course Outline
Module 1: Fundamentals of Information Security
- Information security principles (CIA triad)
- Cyber threat landscape
- Security policies and governance
- Risk assessment methodologies
- Security awareness and training
- Case Study: Preventing insider data breaches
Module 2: Data Governance and Data Management
- Data lifecycle management
- Data classification and labeling
- Data ownership and stewardship
- Metadata and data quality
- Data retention and disposal policies
- Case Study: Implementing data governance in a public institution
Module 3: Network and System Security
- Network architecture and firewalls
- Intrusion detection and prevention
- Secure system configuration
- Endpoint protection
- Patch and vulnerability management
- Case Study: Securing an enterprise network
Module 4: Data Privacy, Compliance and Legal Frameworks
- Data protection laws (GDPR, local regulations)
- Privacy impact assessments
- Consent management
- Records of processing activities
- Third-party risk management
- Case Study: Managing a data privacy compliance audit
Module 5: Business Continuity and Disaster Recovery
- Business impact analysis
- Backup and recovery strategies
- Incident response planning
- Disaster recovery site design
- Testing and drills
- Case Study: Data center disaster recovery simulation
Module 6: Cybersecurity Operations and Incident Response
- Security monitoring and logging
- Threat intelligence
- Incident detection and escalation
- Digital forensics basics
- Post-incident analysis and reporting
- Case Study: Responding to a ransomware attack
General Information
- Customized Training: All our courses can be tailored to meet the specific needs of participants.
- Language Proficiency: Participants should have a good command of the English language.
- Comprehensive Learning: Our training includes well-structured presentations, practical exercises, web-based tutorials, and collaborative group work. Our facilitators are seasoned experts with over a decade of experience.
- Certification: Upon successful completion of training, participants will receive a certificate from Foscore Development Center (FDC-K).
- Training Locations: Training sessions are conducted at Foscore Development Center (FDC-K) centers. We also offer options for in-house and online training, customized to the client's schedule.
- Flexible Duration: Course durations are adaptable, and content can be adjusted to fit the required number of days.
- Onsite Training Inclusions: The course fee for onsite training covers facilitation, training materials, two coffee breaks, a buffet lunch, and a Certificate of Successful Completion. Participants are responsible for their travel expenses, airport transfers, visa applications, dinners, health/accident insurance, and personal expenses.
- Additional Services: Accommodation, pickup services, freight booking, and visa processing arrangements are available upon request at discounted rates.
- Equipment: Tablets and laptops can be provided to participants at an additional cost.
- Post-Training Support: We offer one year of free consultation and coaching after the course.
- Group Discounts: Register as a group of more than two and enjoy a discount ranging from 10% to 50%.
- Payment Terms: Payment should be made before the commencement of the training or as mutually agreed upon, to the Foscore Development Center account. This ensures better preparation for your training.
- Contact Us: For any inquiries, please reach out to us at training@fdc-k.org or call us at +254712260031.
- Website: Visit our website at www.fdc-k.org for more information.
Foscore Development Center |Training Courses | Monitoring and Evaluation|Data Analysis|Market Research |M&E Consultancy |ICT Services |Mobile Data Collection | ODK Course | KoboToolBox | GIS and Environment |Agricultural Services |Business Analytics specializing in short courses in GIS, Monitoring and Evaluation (M&E), Data Management, Data Analysis, Research, Social Development, Community Development, Finance Management, Finance Analysis, Humanitarian and Agriculture, Mobile data Collection, Mobile data Collection training, Mobile data Collection training Nairobi, Mobile data Collection training Kenya, ODK, ODK training, ODK training Nairobi, ODK training Kenya, Open Data Kit, Open Data Kit training, Open Data Kit Training, capacity building, consultancy and talent development solutions for individuals and organisations, through our highly customised courses and experienced consultants, in a wide array of disciplines
Other Upcoming Workshops Kenya, Rwanda, Tanzania, Ethiopia and Dubai
| 1 |
Advanced Epidemiology and Biostatistics with ODK, R, Python, Stata, SPSS, Excel, NVivo, Power BI, an |
|
| 2 |
Research in the Higher Education Sector |
|
| 3 |
Research Design,ODK Mobile Data Collection,GIS Mapping,Data Analysis using NVIVO and PYTHON Course |
|
| 4 |
Treasury Cash Management Course |
|