+964 750 205 0007
Empire Business Tower, T4, First Floor
info@ptcs.krd
Contact us now
If need help!
+964 750 205 0007
or go to contact form:
Let’s start now
gallery6

Security Management Training Course

Security Management is the identification of an organization’s assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets.

 

 COURSE OUTLINE 

Threats and Vulnerabilities

  • Threats

  • Physical Threats

  • Vulnerabilities

 

The Information Security Manager

  • Information Security Job Roles

  • Training, Experience, and Professionalism

  • Started in Security Management

 

Organizational Security

  • Security in Organizational Structures

  • Working with Specialist Groups

  • Working with Standards and Regulations

  • Working with Risk Management

  • Working with Enterprise Architecture

  • Working with Facilities Management

 

Information Security Implementation

  • Integration with Risk Management

  • Secure Development

  • Organizational Interfaces

  • Post Implementation

 

Standards, Frameworks, Guidelines, and Legislation

  • Why Do We Need Standards?

  • Legislation

  • ISO/IEC 27000 Series of Standards

  • Business Continuity

  • Risk Management Standards

 

Protection of Information

  • Information Classification

  • Identification, Authentication, and Authorization

 

Protection of People

  • Human Vulnerabilities

  • Building a Security Culture

  • Personnel Security Life Cycle

 

Protection of Premises

  • What Is Physical Security?

  • Start with a Risk Assessment

  • Perimeter Design

  • Internal Building Security

 

Protection of Systems

  • Introducing Malware

  • Threat Vectors

  • Technical Countermeasures

  • Network Security

 

Digital Evidence and Incident Response

  • The Digital Forensic Process

  • Forensic Readiness

  • Incident Response and Digital Investigations

  • Investigating a Malware Outbreak

 

Cloud Computing Security

  • Cloud Computing

  • Cloud Security

  • Cloud Security Architectures

  • Old Threat with New Targets

  • Virtualization

 

Secure Systems Development

  • Secure Development

  • Secure Development Business Processes

  • Security Testing

  • Auditing

 

 

Archives

No archives to show.

Categories

  • No categories