Search your Courses by Keywords

An intensive professional development training course on

IT Security

Safeguarding Your Information Assets

Why Choose this Training Course?

Technology is pervasive across many organisations today, processing information and data.  In order to preserve the confidentiality, integrity and availability of information, all infrastructure, applications and process should be robust and secure. Organisations face an array of technical and third party risks, with significant security breaches reported daily, resulting in substantial costs to those affected.

This AZTech training course in Dubai will provide a practitioner approach to Information Security Management and how to address the commercial risks and realities with current best practice guidance in line with international standards.  It will detail how to be proactive in your defense solutions, and have counter measures in place to deal with any appropriate security breach.

This AZTech training course will feature:

  • An Overview of Information Security
  • Adaptation and Approach of Technical and Commercial Considerations of IT Security
  • Governance of IT Security
  • Risk Appraisal of Electronic and Physical Data Risk
  • How To Select Appropriate Tools to Achieve the Best from Data Analytics


What are the Goals?

By the end of this AZTech training course, participants will be able to:

  • Understand the risk to electronic information
  • Appreciate current threat and trend analysis for cyber crime and IT security breaches
  • Understand, identify and respond to an information security breach
  • Appreciate corporate governance and best practice framework for Information Security Management
  • Consider the most appropriate technology defenses  for mitigating information security risk


Who is this Training Course for?

This AZTech training course has been designed for senior executives, technical engineers and those involved in the technology, application development, risk mitigation and IT security management.

This AZTech training course is suitable to a wide range of professionals but will greatly benefit:

  • Technology Engineers, Chief Technology Officer (CTO) and Chief Information Officer (CIO)
  • Chief Risk Officers
  • Senior Inhouse Legal Counsel
  • Human Resource Professionals
  • Key Application Development and data Research Personnel
  • Strategic Development Directors
  • Crisis Management and Business Resumption Specialist Team Members


How will this Training Course be Presented?

This AZTech training course will utilize a variety of proven adult learning techniques to ensure maximum understanding, comprehension and retention of the information presented.  Participants will gain detailed knowledge by active participation in seminars, group discussions and real life case studies. Delivery will be by presentation, group syndicate investigations, training DVD and interactive seminars.


The Course Content

Day One: Introduction - IT Security Evolution

  • Categorising Physical and Electronic Risk
  • Networking and Communication Technology
  • Computer Systems Design
  • Legal and Regulatory Considerations
  • Current Threat and Trend Analysis
  • Review and Case Study


Day Two: Information Security and Vulnerabilities

  • Ensuring Information Security
    • Confidentiality
    • Integrity
    • Availability
    • Non Repudiation of Data
  • Information Security and Key Vulnerabilities with Electronic Data
  • Ethical hacking and Industrial Espionage
  • Cyber Warfare and Cyber Crime
  • Security Controls and Protocols
  • Review and Case Study


Day Three: IT Security Management and Corporate Issues

  • Corporate issues with IT Security From the Boardroom to the Basement
  • IT Security Management - How do we Approach this?
  • How to Approach Security Vendor and Staff Selection
  • Defining our Risk and Data Vulnerability
  • Approaching and Mitigating, Data Integration, Network Architecture and Applications Integrations
  • Review and Case Study


Day Four: Governance, Technical and Practical Matters

  • ISO/IEC 27001- Code of Practice for Information Security Management
  • ISO/IEC 27001 - Risk Management and Framework
  • ISO/IEC 27001 - Key Controls and Objectives
  • Understanding the Key Benefits and Drawbacks of ISO/IEC Framework to address IT Security Challenges
  • Legal and Policy Considerations with IT Security and Data
  • Review and Case Study


Day Five: Identifying and Responding to Data Breaches

  • Key factors to identify a security breach
  • Crisis Management Planning
  • Dealing with the initial crisis and media management
  • Forensic and Electronic investigations
  • Responding to Business Continuity
  • Review and Case Study


The Certificate

  • AZTech Certificate of Completion for delegates who attend and complete the training course


Request for In-House Solutions
Request for
In-House Solutions
Request for More Details
Request for
More Details
Share this Course With a Colleague
Share this Course
With a Colleague
Request Brochure
Download the
Course Brochure

Send to Colleague

© 2023. Material published by Aztech shown here is copyrighted.

All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing (in any medium), transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.

Sending your message. Please wait...

Send Successfully

There was a problem sending your message. Please try again.

Please complete all the fields in the form before sending.


Online Training