Information Security Practitioner - SECO
COURSE OUTLINE:
This course consists of 5 Modules:
- Module 1: Introduction to the World of Information Security
- Module 2: Organizational Aspects of Information Security
- Module 3: Human Aspects of Information Security
- Module 4: Technological Aspects of Information Security
- Module 5: The Future of Information Security
Audience
- Information security consultants
- Security managers who perform at a tactical level
- Information security coordinators
- IT auditors
Prerequisites
Students should have a basic understanding of cybersecurity.
Learning Objectives
The Information Security Practitioner course is a five day course aimed at enhancing candidates� understanding of the varied aspects of information security and equipping candidates with the necessary skills and knowledge to be able to translate information security concepts to their own environment and apply the translated concepts to their own work practices, implementing and embedding information security in their organizations.
Module 1: Introduction to the World of Information Security
- The playing field of information security and cybersecurity
- The balance of organizational interests and security threats.
- Laws and regulations relating to cybersecurity
- Security standards and best practices
Module 2: Organizational Aspects of Information Security
- Elements of an organization�s mission and strategy that provide information security vision
- Information security roles, tasks, and responsibilities within an organization
- Information security risk assessments performance
- Information security control demonstration
Module 3: Human Aspects of Information Security
- Problems posed by inappropriate information handling
- Information security risks translated to human behavior
- Identifying and selecting the suitable awareness measures and activities
- Relevant instrumentation of cybersecurity
- Measuring the effectiveness of an awareness program
Module 4: Technological Aspects of Information Security
- Information security from a hacker�s perspective
- Potential risks from a cyber threat perspective
- Technical countermeasures to remediate information security risks
Module 5: The Future of Information Security
- The primary consequences of the 4th industrial revolution
- The concept of the digital economy
- New digital work competencies
- Disruptive business models and examples