An intensive professional development training course on
Information Security Management
The Recipe for Insuring your Privacy
Why Choose Information Security Management Training Course?
Information is the lifeblood to all organisations, without it, it would be severely impacted and ultimately cease to function. Information is knowledge and knowledge is power. With an ever-changing climate of technology and threats (both technical and human), the need for trained security personnel to protect our information becomes increasingly critical evolutionary task.
Information is at risk from many sources, legal, electronic, physical, internal and external to mention a few. It is paramount that security and related management personnel have an understanding of the risks, controls and countermeasures that are available to secure information and technology within an effective management framework. Furthermore, this Information Security Management training course will feature utilising counter measures, best practice and management techniques will mitigate electronic and physical risks and enhance protection to an organisation.
What are the Goals?
By the end of This Information Security Management training course, participants will be able to:
- Gain knowledge of the concepts relating to information security management (confidentiality, integrity, availability, vulnerability, threats, risks, counter measures, etc.)
- Understand the current legislation and regulations which impact upon information security management
- Be fully Aware of current national and international standards such as ISO 27002, frameworks and organisations which facilitate the management of information security
- Understand the current business and common technical environments in which information security management has to operate
- Gain knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics
Who is this Training Course for?
This Information Security Management training course is suitable for a wide range of professionals but will greatly benefit individuals responsible for:
- Risk Management
- IT Security and IT Security Auditing
- Technical IT Management
- Those with involvement of systems integration and corporate IT development
- Financial controllers with a technical interest may also benefit from the seminar
How will this Training Course be Presented?
How will this Training be Presented?
This Information Security Management training course will utilise a variety of proven adult learning techniques to ensure maximum understanding, comprehension and retention of the information presented. Participants will gain detailed knowledge by active participation in seminars, group discussions and real-life case studies. Delivery will be by presentation, group syndicate investigations, training videos and interactive seminars.
The Course Content
- What is Information Security?
- Examples of Information Security Incidents
- What is Information Security Management?
- Human Aspect of Information Security
- Social Engineering
- Attacks for Personal Computers and Smart phones and counter measure
- Information Security Risk Management
- What is Risk Management process?
- Identifying Information Assets
- Identifying Security Risk and evaluation
- Risk Treatment
- Information Security Governance
- Information Security Management System (ISMS)
- Information Security Policy, Standards and Procedures
- Information Security Evaluation
- Security Incident Response
- Requirements for Secure Communication
- What is Cryptography?
- Classic and Modern Cryptography
- Common Key Cryptography algorithms: DES, Triple DES, AES
- Problems of Key distribution for Common Key Cryptography
- Integrity of Data
- Hash Function
- Digital Signature
- Public Key Certificate and Public Key Infrastructure (PKI)
- Certificate Authority
Certificate and Accreditation
- AZTech Certificate of Completion for delegates who attend and complete the training course
In Partnership With

Do you want to learn more about this course?
© 2024. Material published by AZTech shown here is copyrighted. All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing (in any medium), transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.
Frequently Asked Questions
There are several convenient ways to register for our training programs:
- Online: Explore our training calendar, choose the course that suits your needs, and click the “Register Now” button on the course details page.
- Email: Share your details, including your name, organization, email address, and selected course, by sending an email to info@aztechtraining.com
- Phone: Reach out to us directly at +971 4 427 5400 or +971 4 427 5407, and our team will guide you through the registration process.
Once your registration is successfully completed, you will receive a confirmation email within 24 hours. This email will contain your registration details, invoice, and the necessary joining instructions for the course.
Our training programs are hosted at luxurious five-star hotels in prestigious destinations across the globe. Some of our popular locations include Dubai, London, Kuala Lumpur, Amsterdam, New York, Paris, Vienna, and many other iconic cities.
Yes, we offer tailored corporate training solutions to meet your organization's specific needs. Please contact us at info@aztechtraining.com or call +971 4 427 5400 for more information.