Fundamentals of Information and Security Controls

Course Overview

• Understand the principles of information security and controls
• Learn how to identify and mitigate security threats and vulnerabilities
• Develop skills to design and implement effective security controls

Training Format:In-class, Virtual, In-house

Location:Lagos, Accra, Nairobi, Kigali

Language:English, French

Nigeria Price:
₦350000

Int'l., (Nigeria) Price:
$1000

Ghana Price:
$4000

Kenya Price:
$5500

Rwanda Price:
$6000

Nigeria Price:₦350000

Int'l., (Nigeria) Price:
$1000

Ghana Price:
$4000

Kenya Price:
$4000

Rwanda Price:
$4000

Nigeria Price: ₦350000

Int'l., (Nigeria) Price:
$1000

Ghana Price: $4000

Kenya Price: $4000

Rwanda Price: $4000

Introduction to Information Security
• Overview of information security and its evolution
• Core goals of information security: confidentiality, integrity, and availability (CIA triad)
• Common information security terms and processes

Threats and Attack Modes
• Common threats and attack modes on information systems
• Modes of threats and attacks on information systems
• Cryptography and its role in threat mitigation

Access Control and Identification
• Basic access control models
• Fundamentals of identification and authentication methods
• User identification and authentication and access control based on individual or group

Network Security
• Designing secure networks using firewalls, tunneling, and encryption
• Tools to secure networks: honeypots, network sniffers, and packet capturing

Operating System Security
• Hardening operating systems to prevent unauthorized disclosure
• Methods and tools: patching, logging, antivirus, and antimalware tools

Global Privacy Laws
• Overview of global privacy laws
• Adverse effects and penalties of unauthorized disclosure or breach of information

Who Can Attend:
This course is designed for individuals interested in understanding the fundamentals of information security and controls, including those in the field of Criminology and Security Studies, as well as students and professionals from various disciplines who want to enhance their knowledge of information security management.

1ST BATCH: Tuesday, March 3, 2026 — Friday, March 6, 2026.

2ND BATCH: Tuesday, June 23, 2026 — Friday, June 26, 2026.

3RD BATCH: Tuesday, October 20, 2026 — Friday, October 23, 2026.

The training methodology integrates lectures, interactive discussions, collaborative group exercises, and
illustrative examples. Participants will acquire a blend of theoretical insights and hands-on practical
experience, emphasizing the application of learned techniques. This approach ensures that attendees return
to their professional environments equipped with both the competence and self-assurance to effectively
implement the acquired skills in their responsibilities.

Facebook
WhatsApp
X
Threads
Telegram
Print