Call Now+234 803 304 5484, +234 906 000 2299

Send Message[email protected]

Location: Lagos - Nigeria

Start Date: 20 Apr, 2021

End Date: 23 Apr, 2021

WiFiFree WiFi available

$1,200

Event Details

The Managing Security in an IT (Enabled) Environment workshop is designed to provide participants with relevant skill and knowledge to manage security of modern IT-enabled business services. It will provide them with an understanding of the best practices, key concepts and to show them how they can improve their work and the work of their organization using latest security technologies. Furthermore, the workshop will provide participants with understanding of how technology risks translate business risk and how to mitigate them.

CONTENT

Security and Risk Management

  • Understand and apply concepts of confidentiality, integrity and availability
  • Evaluate and apply security governance principles
  • Determine compliance requirements
  • Understand legal and regulatory issues that pertain to information security in a global context
  • Understand, adhere to, and promote professional ethics
  • Develop, document, and implement security policy, standards, procedures, and guidelines
  • Identify, analyze, and prioritize Business Continuity (BC) requirements
  • Contribute to and enforce personnel security policies and procedures
  • Understand and apply risk management concepts
  • Understand and apply threat modeling concepts and methodologies
  • Apply risk-based management concepts to the supply chain
  • Establish and maintain a security awareness, education, and training program

Asset Security

  • Identify and classify information and assets
  • Determine and maintain information and asset ownership
  • Protect privacy
  • Ensure appropriate asset retention
  • Determine data security controls
  • Establish information and asset handling requirements

Security Architecture and Engineering

  • Implement and manage engineering processes using secure design principles
  • Understand the fundamental concepts of security models
  • Select controls based upon systems security requirements
  • Understand security capabilities of information systems (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)
  • Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
  • Assess and mitigate vulnerabilities in web-based systems
  • Assess and mitigate vulnerabilities in mobile systems
  • Assess and mitigate vulnerabilities in embedded devices
  • Apply cryptography
  • Apply security principles to site and facility design
  • Implement site and facility security controls

Communication and Network Security

  • Implement secure design principles in network architectures
  • Secure network components
  • Implement secure communication channels according to design

Identity and Access Management (IAM)

  • Control physical and logical access to assets
  • Manage identification and authentication of people, devices, and services
  • Integrate identity as a third-party service
  • Implement and manage authorization mechanisms
  • Manage the identity and access provisioning lifecycle

Security Assessment and Testing

  • Design and validate assessment, test, and audit strategies
  • Conduct security control testing
  • Collect security process data (e.g., technical and administrative)
  • Analyze test output and generate report
  • Conduct or facilitate security audits

Security Operations

  • Understand and support investigations
  • Understand requirements for investigation types
  • Conduct logging and monitoring activities
  • Securely provisioning resources
  • Understand and apply foundational security operations concepts
  • Apply resource protection techniques
  • Implement and support patch and vulnerability management
  • Implement and manage physical security
  • Address personnel safety and security concerns

 

FOR WHOM:      CIOs, IT Development Managers, Heads of Department, System Administrators/Engineers, IT Professionals and others who want to sharpen their knowledge in IT world.

 

TRAINING METHODOLOGY

The training methodology combines lectures, discussions, group exercises and illustrations. Participants will gain both theoretical and practical knowledge of the topics. The emphasis is on the practical application of the topics and as a result participant will go back to the workplace with both the ability and the confidence to apply the techniques learned to their duties.

 

DATE:

1ST BATCH: 24th – 27th November, 2020

2ND BATCH: 20th – 23rd April, 2021

 

THE COURSE FEE WILL COVER YOUR:

Tea/Coffee with snacks for breakfast, Lunch, Flash Drive & Training materials, Executive bag and writing materials, Group Photographs and Certificate.

Venue

Alpha Partners Professional Training Conference Centre. 200, Muritala Mohammed Way (3rd Floor), Yaba Lagos.

Other Dates

Start Date End Date
20 Apr, 2021 23 Apr, 2021
Start Date End Date
24 Nov, 2020 27 Nov, 2020