Information Security Academy
This four-day event will guide you through the basics of establishing and managing an information security program in today’s business environment. This class will cover internal and external threats, effective security policies, contingency planning, legislation, regulations, employee privacy issues, awareness programs and more. You will learn about emerging security architectural issues and technologies to assist you, how they can affect computer security in your organization, and what you can do to provide a secure environment as technologies evolve.
Participants will learn the components of a comprehensive strategy, covering such critical areas as planning and managing a security program, getting the business more involved with information security, developing an enterprise security architecture, establishing identity and access control management and network perimeter protection, ensuring physical protection of your business and computing facilities, and complying with the legal and regulatory aspects of information security. The agenda will focus on risk analysis and business impact analysis (BIA) as tested methodologies for measuring the level of security risk and prioritizing information risk reduction in your organization. You are invited to bring your own information risk analysis evaluation criteria and targets, and explore how you can make best use of today’s techniques.
In addition, if you audit the security environment, this course will help you identify the essential elements that need to be developed and in place for your organization to maintain effective controls. Throughout the seminar videos, real-life scenarios and case studies will reinforce learning. You will leave this pragmatic course with a blueprint for building an effective information security program or for measuring an existing one.
In light of COVID-19, this provider is now delivering some or all of their courses online. Contact them for more information!
Who should attend?
Information Security Managers, newly appointed CISOs, IT Managers, IT Auditors, Financial and Operational Auditors; Business Executives, Risk Managers, Business Continuity Specialists
- Defining the Information Security Business Case
- Security Management/Strategic Components
- Legislation and Standards
- Creating a Strong Foundation Through Policy
- Information Risk Analysis
- Business Impact Analysis (BIA)
- Detecting Computer Crime, Accidents and Errors
- Physical, Hardware and Environmental Security
- Awareness Tools
- Business Continuity Planning (BCP)
- The Basics of Cryptography
- The Future of Information Security in the Organization
Certification / Credits
Completion of this course is worth 32 CPE Credits
At ACI Learning, we train leaders in Cybersecurity, Audit, and Information Technology. Whether you're starting your IT career, mastering your profession, or developing your team, we're with you every step of the way. We believe that training is not a...
Average rating 4.8Based on 5 reviews
Have a question about this course? Fill out this form and the provider will get in touch with you shortly
Need help with your search?
findcourses.com offers a free consultancy service to help compare training for you and your team
You may also like...