General Information on Information-Security

General Info 2019-01-08T16:54:57+00:00

Certification seminars

The various seminars, workshops and courses conducted by the Information Security Institute prepares the participants to advantageously manage information security challenges in a business, data, IT context, developing the basic technical skills in computer systems and gaining knowledge in the data privacy, ePrivacy, data protection and the cyber security area, to prepare the participants with the competencies to make prudent management decisions based on data, information security and business risks.

In addition,we place another dimension to implement a holistic security solution that also focuses on detecting the information security threats, assess IT and cyber risks, and develop innovative methods to make the organisation resistant to many threats and disruptions.

As the IT and Data evolution enters a new decade most companies now completely rely on IT and data systems and automation rather than manual procedures and controls for handling and processing the information supporting most of the processes and activities. Therefore, corporate data and information must be appropriately secured to protect against consequences of breaches of confidentiality, failures of integrity, interruption to availability and failure to comply with legal, statutory or regulatory requirements.

IFS Certification Seminar

One-day The Information Security Foundation (IFS) Certification Seminar. How to;

  • Interconnect business management and technology in a collaborative approach to information security.
  • Manage the development, acquisition, and progress of an information security infrastructure.
  • Design and implement networks, software, and distributed systems from an information security perspective.
  • Create information security policies in an organisation and demonstrate how to enforce compliance.
  • Develop security plans and conduct gap analyses for comparison of various systems.

Program Knowledge

Program Knowledge and Hands-on workshops and breakout sessions on;

  • Information Security Risk Management
  • Information Security Controls
  • Application Security Implementation
  • Application Security Audit
  • Computer Forensics
  • Penetration Testing
  • Ethical Hacking
  • Data Protection
  • Supervisory control and data acquisition (SCADA) Security Management
  • Information Security in a particular trade based on the participants

Ready to talk?

Let’s Talk