Fundamentals of Information and Security Controls
Course Overview
• Understand the principles of information security and controls
• Learn how to identify and mitigate security threats and vulnerabilities
• Develop skills to design and implement effective security controls
Training Format:In-class, Virtual, In-house
Location:Lagos, Accra, Nairobi, Kigali
Language:English, French
Nigeria Price:
₦350000
Int'l., (Nigeria) Price:
$1000
Ghana Price:
$4000
Kenya Price:
$5500
Rwanda Price:
$6000
Nigeria Price:₦350000
Int'l., (Nigeria) Price:
$1000
Ghana Price:
$4000
Kenya Price:
$4000
Rwanda Price:
$4000
Nigeria Price: ₦350000
Int'l., (Nigeria) Price:
$1000
Ghana Price: $4000
Kenya Price: $4000
Rwanda Price: $4000
Introduction to Information Security
• Overview of information security and its evolution
• Core goals of information security: confidentiality, integrity, and availability (CIA triad)
• Common information security terms and processes
Threats and Attack Modes
• Common threats and attack modes on information systems
• Modes of threats and attacks on information systems
• Cryptography and its role in threat mitigation
Access Control and Identification
• Basic access control models
• Fundamentals of identification and authentication methods
• User identification and authentication and access control based on individual or group
Network Security
• Designing secure networks using firewalls, tunneling, and encryption
• Tools to secure networks: honeypots, network sniffers, and packet capturing
Operating System Security
• Hardening operating systems to prevent unauthorized disclosure
• Methods and tools: patching, logging, antivirus, and antimalware tools
Global Privacy Laws
• Overview of global privacy laws
• Adverse effects and penalties of unauthorized disclosure or breach of information
Who Can Attend:
This course is designed for individuals interested in understanding the fundamentals of information security and controls, including those in the field of Criminology and Security Studies, as well as students and professionals from various disciplines who want to enhance their knowledge of information security management.
1ST BATCH: Tuesday, March 3, 2026 — Friday, March 6, 2026.
2ND BATCH: Tuesday, June 23, 2026 — Friday, June 26, 2026.
3RD BATCH: Tuesday, October 20, 2026 — Friday, October 23, 2026.
The training methodology integrates lectures, interactive discussions, collaborative group exercises, and
illustrative examples. Participants will acquire a blend of theoretical insights and hands-on practical
experience, emphasizing the application of learned techniques. This approach ensures that attendees return
to their professional environments equipped with both the competence and self-assurance to effectively
implement the acquired skills in their responsibilities.
