تفاصيل الدورة
Day One:
Information Security Management - An Overview· IT Risk Management
· Categorizing Physical and Electronic Risk
· IT and Networks
· Computer Systems Design
· Legal and Regulatory Considerations
· Information, Business and Risk - Case Study
Day Two:
Information Security Management· Ensuring Information Security
· Confidentiality
· Integrity
· Availability
· Authenticity
· Non Repudiation of Data
· Ethical hacking and
… + المزيد تفاصيل الدورة
Day One:
Information Security Management - An Overview· IT Risk Management
· Categorizing Physical and Electronic Risk
· IT and Networks
· Computer Systems Design
· Legal and Regulatory Considerations
· Information, Business and Risk - Case Study
Day Two:
Information Security Management· Ensuring Information Security
· Confidentiality
· Integrity
· Availability
· Authenticity
· Non Repudiation of Data
· Ethical hacking and Industrial Espionage
· Where to design and place effective computer and management controls
Day Three:
Information Management - International Standards· Code or Practice for Information Security Management - ISO 17799 / ISO27002
· Best Practice and Implementing Guidance and Controls For ISO27002
· Information Security Management Overview
· Risk Assessment and Controls
· Security Policy Documentation
· Organizing Information Security Management
· IT Asset Management
· Personnel and Human Resources
Day Four:
Information Management ISO27002· Best Practice and Implementing Guidance and Controls For ISO27002
· Physical and Environmental Security
· Operations Management and Communications
· Access Control
· Information Systems (Design, Development, Maintenance)
· Incident Management
· Business Continuity
· Regulatory Compliance
· Best Practice and Implementation Guidance for BS ISO/IEC 38500:2008
· Case Study
Day Five:
Implementing Effective Information Security Management Frameworks· Successful steps for IT Security Management
· Audit and Compliance for IT Resources
· Business Process Engineering
· Case Study
تحديث بتاريخ 16 May, 2024 - أقل