Information Security Practitioner - SECO

COURSE OUTLINE:

Description

This course consists of 5 Modules:

  • Module 1: Introduction to the World of Information Security
  • Module 2: Organizational Aspects of Information Security
  • Module 3: Human Aspects of Information Security
  • Module 4: Technological Aspects of Information Security
  • Module 5: The Future of Information Security

Audience

  • Information security consultants
  • Security managers who perform at a tactical level
  • Information security coordinators
  • IT auditors

Prerequisites

Students should have a basic understanding of cybersecurity.

Learning Objectives

The Information Security Practitioner course is a five day course aimed at enhancing candidates� understanding of the varied aspects of information security and equipping candidates with the necessary skills and knowledge to be able to translate information security concepts to their own environment and apply the translated concepts to their own work practices, implementing and embedding information security in their organizations.

Module 1: Introduction to the World of Information Security

  • The playing field of information security and cybersecurity
  • The balance of organizational interests and security threats.
  • Laws and regulations relating to cybersecurity
  • Security standards and best practices

Module 2: Organizational Aspects of Information Security

  • Elements of an organization�s mission and strategy that provide information security vision
  • Information security roles, tasks, and responsibilities within an organization
  • Information security risk assessments performance
  • Information security control demonstration

Module 3: Human Aspects of Information Security

  • Problems posed by inappropriate information handling
  • Information security risks translated to human behavior
  • Identifying and selecting the suitable awareness measures and activities
  • Relevant instrumentation of cybersecurity
  • Measuring the effectiveness of an awareness program

Module 4: Technological Aspects of Information Security

  • Information security from a hacker�s perspective
  • Potential risks from a cyber threat perspective
  • Technical countermeasures to remediate information security risks

Module 5: The Future of Information Security

  • The primary consequences of the 4th industrial revolution
  • The concept of the digital economy
  • New digital work competencies
  • Disruptive business models and examples