+964 750 205 0007
Empire Business Tower, T4, First Floor
Contact us now
If need help!
+964 750 205 0007
or go to contact form:
Let’s start now

Security Management Training Course

Security Management is the identification of an organization’s assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets.



Threats and Vulnerabilities

  • Threats

  • Physical Threats

  • Vulnerabilities


The Information Security Manager

  • Information Security Job Roles

  • Training, Experience, and Professionalism

  • Started in Security Management


Organizational Security

  • Security in Organizational Structures

  • Working with Specialist Groups

  • Working with Standards and Regulations

  • Working with Risk Management

  • Working with Enterprise Architecture

  • Working with Facilities Management


Information Security Implementation

  • Integration with Risk Management

  • Secure Development

  • Organizational Interfaces

  • Post Implementation


Standards, Frameworks, Guidelines, and Legislation

  • Why Do We Need Standards?

  • Legislation

  • ISO/IEC 27000 Series of Standards

  • Business Continuity

  • Risk Management Standards


Protection of Information

  • Information Classification

  • Identification, Authentication, and Authorization


Protection of People

  • Human Vulnerabilities

  • Building a Security Culture

  • Personnel Security Life Cycle


Protection of Premises

  • What Is Physical Security?

  • Start with a Risk Assessment

  • Perimeter Design

  • Internal Building Security


Protection of Systems

  • Introducing Malware

  • Threat Vectors

  • Technical Countermeasures

  • Network Security


Digital Evidence and Incident Response

  • The Digital Forensic Process

  • Forensic Readiness

  • Incident Response and Digital Investigations

  • Investigating a Malware Outbreak


Cloud Computing Security

  • Cloud Computing

  • Cloud Security

  • Cloud Security Architectures

  • Old Threat with New Targets

  • Virtualization


Secure Systems Development

  • Secure Development

  • Secure Development Business Processes

  • Security Testing

  • Auditing




No archives to show.


  • No categories