INFORMATION SECURITY AND DATA PROTECTION

205,000.00

Content

Introduction to Information Security

  • Information Security Fundamentals
  • Information Security Models
  • IS Standards
  • Attack Overview

Risk Management

  • Risk Management Process
  • Risk Analysis
  • Risk Control

Access Control

  • Types of Access Control
  • Physical Access
  • Controlling Resource Access

Security Process

  • Security Layers
  • Authentication, Authorization and Accounting
  • Security Policies and Procedures
  • Security Encryption Basics
  • User/Group Management
  • Password Policies
  • Windows Encryption Technologies

Command Tools for Database Activities

  • Deletion of Records and Information
  • Updating of Records and Information
  • Inserting of Records and Information
  • Sorting of Records and Information

Roles and Responsibilities of Database Administrators

  • Define the Parameters of Each Database in a Company’s Platform
  • Ensure Access, Up-Time and Data Integrity
  • Manage both the Physical Equipment and the Software
  • Defend Data Platforms against Threats from External Sources and Internal Failures

Business Continuity and Backup Strategy

  • Protecting and Recovering Content
  • Backup and Restore for Disaster Recovery

FOR WHOM: CIOs, Heads of Departments, IT Professionals, System Analysts, Database Administrators, Data Managers, Servers Managers, Network Engineers, Systems/Security Administrators, IT Development Managers and others who perform related functions.

DATE:                   18th – 20th June, 2025

                                15th – 17th December, 2025

 

Category:

Objective

This 3-day workshop designed to serves as an in depth introduction to the field of information security and build an understanding of these topics: Security Layers, Operating System Security, Data Protection and Security Software. Upon completion of this workshop, participants will be able to:

  • Understand the IT Security Threats faced by a modern network
  • Understand the techniques used to manage data and protect it from unauthorized people
  • IT Security Policies, Authentication Mechanisms and Physical Security
Shopping Cart