An intensive professional development training course on

IT Security

Safeguarding Your Information Assets

We currently have no scheduled sessions for this course. If you are interested in running this course, please contact our Training Department at [email protected]

brochure image
Download the
Brochure

Why Choose this Training Course?

Technology is pervasive across many organisations today, processing information and data.  In order to preserve the confidentiality, integrity and availability of information, all infrastructure, applications and process should be robust and secure. Organisations face an array of technical and third party risks, with significant security breaches reported daily, resulting in substantial costs to those affected.

This AZTech training course in Dubai will provide a practitioner approach to Information Security Management and how to address the commercial risks and realities with current best practice guidance in line with international standards.  It will detail how to be proactive in your defense solutions, and have counter measures in place to deal with any appropriate security breach.

This AZTech training course will feature:

  • An Overview of Information Security
  • Adaptation and Approach of Technical and Commercial Considerations of IT Security
  • Governance of IT Security
  • Risk Appraisal of Electronic and Physical Data Risk
  • How To Select Appropriate Tools to Achieve the Best from Data Analytics

 

What are the Goals?

By the end of this AZTech training course, participants will be able to:

  • Understand the risk to electronic information
  • Appreciate current threat and trend analysis for cyber crime and IT security breaches
  • Understand, identify and respond to an information security breach
  • Appreciate corporate governance and best practice framework for Information Security Management
  • Consider the most appropriate technology defenses  for mitigating information security risk

 

Who is this Training Course for?

This AZTech training course has been designed for senior executives, technical engineers and those involved in the technology, application development, risk mitigation and IT security management.

This AZTech training course is suitable to a wide range of professionals but will greatly benefit:

  • Technology Engineers, Chief Technology Officer (CTO) and Chief Information Officer (CIO)
  • Chief Risk Officers
  • Senior Inhouse Legal Counsel
  • Human Resource Professionals
  • Key Application Development and data Research Personnel
  • Strategic Development Directors
  • Crisis Management and Business Resumption Specialist Team Members

 

How will this Training Course be Presented?

This AZTech training course will utilize a variety of proven adult learning techniques to ensure maximum understanding, comprehension and retention of the information presented.  Participants will gain detailed knowledge by active participation in seminars, group discussions and real life case studies. Delivery will be by presentation, group syndicate investigations, training DVD and interactive seminars.

 

The Course Content

Day One: Introduction - IT Security Evolution
  • Categorising Physical and Electronic Risk
  • Networking and Communication Technology
  • Computer Systems Design
  • Legal and Regulatory Considerations
  • Current Threat and Trend Analysis
  • Review and Case Study
Day Two: Information Security and Vulnerabilities
  • Ensuring Information Security
    • Confidentiality
    • Integrity
    • Availability
    • Non Repudiation of Data
  • Information Security and Key Vulnerabilities with Electronic Data
  • Ethical hacking and Industrial Espionage
  • Cyber Warfare and Cyber Crime
  • Security Controls and Protocols
  • Review and Case Study
Day Three: IT Security Management and Corporate Issues
  • Corporate issues with IT Security From the Boardroom to the Basement
  • IT Security Management - How do we Approach this?
  • How to Approach Security Vendor and Staff Selection
  • Defining our Risk and Data Vulnerability
  • Approaching and Mitigating, Data Integration, Network Architecture and Applications Integrations
  • Review and Case Study
Day Four: Governance, Technical and Practical Matters
  • ISO/IEC 27001- Code of Practice for Information Security Management
  • ISO/IEC 27001 - Risk Management and Framework
  • ISO/IEC 27001 - Key Controls and Objectives
  • Understanding the Key Benefits and Drawbacks of ISO/IEC Framework to address IT Security Challenges
  • Legal and Policy Considerations with IT Security and Data
  • Review and Case Study
Day Five: Identifying and Responding to Data Breaches
  • Key factors to identify a security breach
  • Crisis Management Planning
  • Dealing with the initial crisis and media management
  • Forensic and Electronic investigations
  • Responding to Business Continuity
  • Review and Case Study

The Certificate

  • AZTech Certificate of Completion for delegates who attend and complete the training course

DO YOU WANT TOLEARN MORE ABOUT THIS COURSE?

in-house
Request for
In-House Solutions
in-house
Request for
More Details
in-house
Share this Course
With a Colleague
in-house
Download the
Course Brochure

AZTech Training & Consultancy
Chat with an assistant

Amina
Hello there
how can I assist you?
1:40
×