This course examines the myriad security threats faced by organisations today and how to prepare for them, respond to them, and prevent them.
This is an intermediate-level security course for working or aspiring IT professionals seeking to deepen their understanding of best practice in data, cloud, and information security.
Awarded 30 CPD points upon successful completion
Start Date
Study Type
Training Type
Duration
For further information and pricing please fill in your details below and we will get back to you as soon as we can. Or, call the team on +254 (0)743144753.
To mitigate cyber, data, cloud, and information security risks, you need solid knowledge of the complete network security process, from network design to deployment to continuous monitoring. In this course, you’ll explore a variety of network security concepts and techniques for mitigating security risks.
Effective cybersecurity risk management requires intricate knowledge of day-to-day IT security risks, network vulnerabilities, and cyber attacks. You’ll learn about cybersecurity breaches and how best to prevent them. You’ll explore commonly used techniques to assess data security and you’ll learn how to protect your organisation’s data.
You’ll also learn how to manage risks from both external and internal sources. You’ll explore the policies, procedures, standards, and guidelines that underpin effective information security for an organisation.
You’ll learn best practices for security breach incident management. And you’ll explore business continuity planning to ensure that your organisation functions smoothly during an unplanned incident or disaster.
Module 1 – Managing Network & Infrastructure Security Risks
Module 2 – Managing Physical Security Risks
Module 3 – Cyber Security Risks
Module 4 – Managing Security in a Hybrid Workplace
Module 5 – Managing Social Engineering Risks
Module 6 – Information, Cloud & Data Security Risk Considerations
Module 7 – Managing Information, Cloud & Data Security Risks
Module 8 – Handling Natural Threats
Module 9 – Managing Risks from Internal Stakeholders
Module 10 – Maintaining a Secure Workplace
Module 11 – Information Security Governance
Module 12 – Managing the Incidents
Module 13 – Maintaining Business Continuity