Datastat Research

Email: info@datastatresearch.org
Telephone: +254724527104


Training Course on Information security management»

INTRODUCTION

Information is the lifeblood to all organizations, without it, it would severely impacted and ultimately cease to function. Information is knowledge and knowledge is power. With an ever changing climate of technology and threats (both technical and human), the need for trained security personnel to protect our information becomes increasingly critical evolutionary task. Information is at risk from many sources, legal, electronic, physical, internal and external to mention a few. It is paramount that security and related management personnel have an understanding of the risks, controls and countermeasures that are available to secure information and technology within an effective management framework. Furthermore utilizing countermeasures, best practice and management techniques will mitigate electronic and physical risks and enhance protection to an organization.

This course encompasses all new developments in the field of IT security with focus on threats and risks, compliance and regulations, strategic alignment with business needs, security frameworks, architecture, effective policies and effective integration of standards and metrics.

DURATION

5 days.

WHO SHOULD ATTEND

This advanced training course is ideal for:

  • Software Developers, Project Managers and others involved with creating and/or maintaining the information environment for an organization
  • Business and IT Managers/Executives who need to understand the implications of security on their technology operations
  • Anyone involved in the creation, maintenance, or enforcement of the organisational information security policy, practices and procedures

COURSE OBJECTIVES

After completion of the course, delegates will have an understanding of:

·   information security management, which can be approached from various perspectives;

·   corporate governance, policies and pure management issues;

·   the human side of information security management, focusing on issues such as security culture, awareness, training, ethics and other human-related issues;

·   software and hardware products;

·   the establishment of an information security architecture (ISA);

·   information security architecture; and

·   risk and the assessment of the current controls, as well as  the alignment of controls to meet the requirements of the organisation.

COURSE CONTENT

  • Cyber Threat Landscape
  • Strategic Information Security Response
  • Security Policy
  • Risk Management
  • Strategic Access Management
  • Strategic Authentication Management
  • Strategic Data Integrity Management
  • Strategic Availability Management
  • Application Lifecycle Management
  • Controls And Technology – Working Together
  • Business Continuity Planning (BCP)
  • Incident Management And Response
  • Information Security Strategic Management Summary And Lessons Learned

METHODOLOGY

The instructor led trainings are delivered using a blended learning approach and comprises of presentations, guided sessions of practical exercise, web based tutorials and group work. Our facilitators are seasoned industry experts with years of experience, working as professional and trainers in these fields.

 

All facilitation and course materials will be offered in English. The participants should be reasonably proficient in English.

Start Date: 02/04/2019
End Date: 02/08/2019

Ksh 80000, $ 900

Course Description

Course Duration: 5 days

Training Center: Datastat Research Center

Start Date: 02/04/2019

End Date: 02/08/2019

Fee: Ksh 80000, $ 900

Group rates for our 2018 -2019 courses

No. of days
5 Days per person
10 Days per person
No.
Pacs
Kes
Usd
Kes
Usd
1. 1 80,000.00 900.00 160,000.00 1800.00
2. 2 - 6 65,000.00 830.00 130,000.00 1,660.00
3. 7 - 11 63,000.00 800.00 126,000.00 1,600.00
4. 12 - 16 59,000.00 750.00 118,000.00 1,500.00
5. 17 - 21 57,000.00 700.00 114,000.00 1,400.00
6. 22 - 26 53,000.00 670.00 106,000.00 1,340.00
7. 27 - 31 51,000.00 650.00 102,000.00 1,300.00
8. 32 - 36 47,000.00 580.00 94,000.00 1,160.00
9. 37 - 41 45,500.00 670.00 91,000.00 1,100.00
10. 42 - 46 41,000.00 500.00 82,000.00 1,000.00
11. 47 - 51 35,000.00 480.00 70,000.00 960.00
12. 52 > Above 30,000.00 450.00 60,000.00 900.00

View more Information Technology courses »

datastat

Training Course on ICT For Monitoring & Evaluation (M&E)...

The demand to secure and visualize Quantifiable results is now greater than ever. It is therefore nearly impossible to apply conventional methods to analyze huge chunks of data that are normally the order of modern business. 

...

Start Date: 12/24/2018 End Date: 12/28/2018

Price
KES80000, $ 900

View details »

datastat

Training course on Introduction to VBA Programming...

INTRODUCTION

Start Date: 12/17/2018 End Date: 12/21/2018

Price
KES80000, $ 900

View details »

datastat

Training Course on The Use Of ICT Tools In Epidemiology...

The collection and integration of clinical data for the purpose of patient health management is becoming a reality at different aggregation levels. Although there is no world-wide Electronic Health Record format agreement, integration at regional and national levels is habitual in many countries....

Start Date: 12/17/2018 End Date: 12/21/2018

Price
KES80000, $ 900

View details »

Contact Us

Mobile No: +254724527104/ +254734969612

Email Add: info@datastatreseach.org

Postal Add: 5402-00100

Head Office: Comet House 1st floor room 12A, Along Monrovia Street, Nairobi, Kenya