Introduction to Information Security

Course Overview

This introductory course aims to provide a broad view of the information security field to managers and non-technical audience. It also introduces the field to professionals who are considering to become security practitioners. An overview of the current threats to information security will be provided also the trends and challenges that are expected to emerge in the near future. The course also tackles all the basic principles of information security and how can security controls be used to manage the risks posed by the emerging threats.

course syllabus

The Principles of Information Security

  • ¬†Confidentiality
  • ¬†Integrity
  • Availability

The Changing Threat Spectrum

  • The proliferation of computing devices
  • Threats to personal Information
  • Threats to critical nation infrastructure
  • Threats to the financial sector
  • Cyber War

Key Security Concepts

  • Threats
  • Vulnerabilities
  • Risks
  • Controls
  • Information Security in the Enterprise

Information Governance and Information Security Policy

  • Security Governance and Policy
  • Information Classification/Ownership
  • Personnel Security
  • Security Education, Training and Awareness

Access Control

  • Concepts of Access Control
  • Identification
  • Authentication
  • Authorization
  • Types of Access Control
  • Privileges and Access Management

Telecommunications and Network Security

  • Principles and Concepts of Network Security
  • Network Security Controls

Operations Security

  • Change Management
  • Capacity Planning
  • Backup
  • Monitoring and Surveillance

Business Continuity and Disaster Recover Planning

  • Business Continuity vs Disaster Recovery Planning
  • Business Impact Analysis

Incident Response and Management

  • Principles of Incident Response
  • The Incident Response Team

Legal, Regulations, Investigations and Compliance

  • Legal and Regulatory Standards
  • Incident Investigation and Evidence Management
  • Criminal Prosecution of Electronic Crimes

Information Security Assurance

  • Penetration Testing
  • Vulnerability Assessment
  • Auditing Information Security

Wrap up

  • Core Concepts
  • Key Messages

Who Should Attend?

  • Employees who are new to information security and in need of an introduction to the fundamentals of security
  • Those who want to understand complex technical security terms
  • Non-IT security managers
  • Professionals in all disciplines who need to be familiar with the basic security concepts

Apply Now