General Information


The various seminars, workshops and courses conducted by the information security institute prepares the participants to advantageously manage information security challenges in a business, data, IT Context, developing the basic technical skills in computer systems and gaining knowledge in the data privacy, E-Privacy, Data Protection and the Cyber Security area, to prepare the participants with the competencies to make prudent management decision based on data, information security and business risks.

In addition, we place another dimension to implement a holistic security solution that also focus on detecting the information security threats, assess IT and cyber risks, and develop innovative methods to make the organization resistant to many threats and disruptions.

As the IT and Data evolution enters a new decade most companies now completely rely on IT and data systems and automation rather than manual procedures and controls for handling and processing the information supporting most of the process and activities. Therefore Corporate data and information must be appropriately secured to protect against consequences of beaches of confidentiality, failures of integrity, interruption to availability and failure to comply with legal, statutory or regulatory requirements.


One-day The Information Security Foundation(IFS) Certification Seminar. How to:

  • Interconnect business management and technology in a collaborative approach to information security.
  • Manage the development, acquisition, and progress of an information security infrastructure.
  • Design and implement networks, software, and distributed systems from an information security perspective.
  • Create information security policies in an organization and demonstrate how to enforce compliance.
  • Develop security plans and conduct gap analyses for comparison of various systems.
  • Design and implement networks, software, and distributed systems from an information security perspective.

Program knowledge and Hand on workshops and breakout session on:

  • Information Security Risk Management
  • Information Security Risk Management
  • Application Security Implementation
  • Computer Forensics
  • Penetration Testing
  • Ethical Hacking
  • Data Protection
  • Supervisory Control and Data Acquisition (SCADA) Security Management
  • Information Security in a particular trade based on the participants