Our Office
College House, University way, Nairobi
Email Us
info@datastatresearch.org
Call Us
+254724527104
+254734969612

No of Days 5

Price: Ksh 90000/ USD 1100

Training Course on Information security management, Nairobi and Mombasa, Kenya

Information is the lifeblood to all organizations, without it, it would severely impacted and ultimately cease to function. Information is knowledge and knowledge is power. With an ever-changing climate of technology and threats (both technical and human), the need for trained security personnel to protect our information becomes increasingly critical evolutionary task. Information is at risk from many sources, legal, electronic, physical, internal and external to mention a few. It is paramount that security and related management personnel have an understanding of the risks, controls and countermeasures that are available to secure information and technology within an effective management framework. Furthermore, utilizing countermeasures, best practice and management techniques will mitigate electronic and physical risks and enhance protection to an organization.

This course encompasses all new developments in the field of IT security with focus on threats and risks, compliance and regulations, strategic alignment with business needs, security frameworks, architecture, effective policies and effective integration of standards and metrics.

Duration

5 days.

Who should attend?

This advanced training course is ideal for:

i. Software Developers, Project Managers and others involved with creating and/or maintaining the information environment for an organization.

ii. Business and IT Managers/Executives who need to understand the implications of security on their technology operations

iii. Anyone involved in the creation, maintenance, or enforcement of the organisational information security policy, practices and procedures

Course Objectives

After completion of the course, delegates will have an understanding of:

i. Information security management, which can be approached from various perspectives;

ii. Corporate governance, policies and pure management issues;

iii. The human side of information security management, focusing on issues such as security culture, awareness, training, ethics and other human-related issues;

iv. Software and hardware products;

v. The establishment of an information security architecture (ISA);

vi. Information security architecture; and

v. Risk and the assessment of the current controls, as well as the alignment of controls to meet the requirements of the organisation.

Course Content

a. Cyber Threat Landscape

b. Strategic Information Security Response

c. Security Policy

d. Risk Management

e. Strategic Access Management

f. Strategic Authentication Management

g. Strategic Data Integrity Management

h. Strategic Availability Management

i. Application Lifecycle Management

j. Controls and Technology – Working Together

k. Business Continuity Planning (BCP)

l. Incident Management and Response

m. Information Security Management System

n. Information Systems Acquisition, Development, and Maintenance.

o. Access Control

p. Physical and Environmental Security

q. Information Security Strategic Management Summary and Lessons Learned 

Methodology

The instructor led trainings are delivered using a blended learning approach and comprises of presentations, guided sessions of practical exercise, web-based tutorials and group work. Our facilitators are seasoned industry experts with years of experience, working as professional and trainers in these fields.

Key Notes

i. The participant must be conversant with English.

ii. Upon completion of training the participant will be issued with an Authorized Training Certificate

iii. Course duration is flexible and the contents can be modified to fit any number of days.

iv. The course fee includes facilitation training materials, 2 coffee breaks, buffet lunch and A Certificate upon successful completion of Training.

v. One-year post-training support Consultation and Coaching provided after the course.

vi. Payment should be done at least a week before commence of the training, to DATASTAT CONSULTANCY LTD account, as indicated in the invoice so as to enable us prepare better for you.

Course Schedule

Start Date End Date Register
07/07/2025 11/07/2025 Register
21/07/2025 25/07/2025 Register
21/04/2025 25/04/2025 Register
05/05/2025 09/05/2025 Register
19/05/2025 23/05/2025 Register
17/03/2025 21/03/2025 Register
03/03/2025 07/03/2025 Register
08/09/2025 12/09/2025 Register
04/08/2025 08/08/2025 Register
18/08/2025 22/08/2025 Register
07/04/2025 11/04/2025 Register
06/10/2025 10/10/2025 Register
22/09/2025 26/09/2025 Register
20/10/2025 24/10/2025 Register
18/11/2024 22/11/2024 Register
02/12/2024 06/12/2024 Register
16/12/2024 20/12/2024 Register
20/01/2025 24/01/2025 Register
07/10/2024 11/10/2024 Register
21/10/2024 25/10/2024 Register
04/11/2024 08/11/2024 Register
02/06/2025 06/06/2025 Register
16/06/2025 20/06/2025 Register
17/02/2025 21/02/2025 Register
03/02/2025 07/02/2025 Register
06/01/2025 10/01/2025 Register
03/11/2025 07/11/2025 Register
17/11/2025 21/11/2025 Register
01/12/2025 05/12/2025 Register
15/12/2025 19/12/2025 Register
Get In Touch

College House , Along University Way , Nairobi, Kenya

+254724527104/ +254734969612

info@datastatresearch.org

Newsletter

Subscribe to our newsletter to receive the latest updates on upcoming courses, industry trends, expert insights, and exclusive offers straight to your inbox. Don't miss out on valuable resources and opportunities for professional development

© Datastat Training Institute. All Rights Reserved. Designed by Datastat