Mountains

Information Security and Data Management

What Will I Learn?

Vulnerabilities and lack of necessary security skills applicable to today's technology environments have reached a crisis point and therefore, in order to maintain privacy required and to facilitate efficient communication between agencies, issues of information security, interoperability, and data management must be addressed. Information Security and Data Management training equip participants with knowledge and skills on how to integrate truly effective information security and data management best practices and standards to organizations existing processes, technology assets and management.

Fee In Different Currencies
RWF 70,000 Or USD 0 Or EURO 0
Enroll Now

Indicative Content

    • Introduction & Overview

      • Introduction

      • Significance of Information Security

    • Information Security Governance

      • Information security governance

      • Significance of information security

      • Security management programs

    • Risk Management

      • Introduction to information security risk management

      • Information security risk assessment

      • Information security risk analysis

      • Mitigation of information security risk

      • Continuous information security risk Monitoring

    • Developing Information Security Strategy

      • Importance/significance of information security strategy

      • Factors to consider while developing Information security strategy

      • Information security Management Responsibilities

    • Policies, procedures, standards & guidelines

      • Introduction and Liability

      • Policy Basics

      • Policy Lifecycle

      • Best Practices and Guidelines

    • Information security technology

      • Introduction to information security technology

      • Trusted vs Untrusted technologies

      • VLANs

      • Information Encryptions

    • Incident management

      • Introduction to Information Security incident management

      • Incident management response lifecycle preparation

      • Intrusion detection technologies and systems

      • Security incident response

    • Business continuity & disaster recovery

      • Introduction to business continuity planning and disaster recovery

      • Business continuity phases

      • Disaster recovery

      • Recovery strategies

70,000
Enroll Now

Objectives

  • Security Investment & Measurement

  • Cyber Risk Management & Security Metrics

  • Enterprise Security Governance & Planning

  • Realistic Security

  • Effective Incident Response

  • Managing Operational Threat

  • Developing a Crisis Communications Strategy

  • Building an Insider Threat Program

  • External Dependency Management

70,000
Enroll Now

Course Features

  • Lectures 0
  • Duration 90 Days
  • Certificate Yes
  • Enroll Now

Ready to Begin?

Find subjects you're passionate about by browsing our online course categories. Start
learning with top courses Built With Industry Experts.

Start Learning Apply for Job Opportunity