INFORMATION SECURITY AND DATA PROTECTION

Content

 

Introduction to Information Security

  • Information Security Fundamentals
  • Information Security Models
  • IS Standards
  • Attack Overview

Risk Management

  • Risk Management Process
  • Risk Analysis
  • Risk Control

Access Control

  • Types of Access Control
  • Physical Access
  • Controlling Resource Access

Security Process

  • Security Layers
  • Authentication, Authorization and Accounting
  • Security Policies and Procedures
  • Security Encryption Basics
  • User/Group Management
  • Password Policies
  • Windows Encryption Technologies

Command Tools for Database Activities

  • Deletion of Records and Information
  • Updating of Records and Information
  • Inserting of Records and Information
  • Sorting of Records and Information

Roles and Responsibilities of Database Administrators

  • Define the Parameters of Each Database in a Company’s Platform
  • Ensure Access, Up-Time and Data Integrity
  • Manage both the Physical Equipment and the Software
  • Defend Data Platforms against Threats from External Sources and Internal Failures

Business Continuity and Backup Strategy

  • Protecting and Recovering Content
  • Backup and Restore for Disaster Recovery

FOR WHOM: CIOs, Heads of Departments, IT Professionals, System Analysts, Database Administrators, Data Managers, Servers Managers, Network Engineers, Systems/Security Administrators, IT Development Managers and others who perform related functions.

DATE:         29th June – 1st July 2022

14th – 16th December, 2022

 

Category:

Objective

This 3-day workshop designed to serves as an in depth introduction to the field of information security and build an understanding of these topics: Security Layers, Operating System Security, Data Protection and Security Software. Upon completion of this workshop, participants will be able to:

  • Understand the IT Security Threats faced by a modern network
  • Understand the techniques used to manage data and protect it from unauthorized people
  • IT Security Policies, Authentication Mechanisms and Physical Security

Reviews

There are no reviews yet.

Be the first to review “INFORMATION SECURITY AND DATA PROTECTION”

Your email address will not be published.

Shopping Cart