Managing Security in an IT (Enabled) Environment
Course Overview
• Understand the fundamentals of information security in an IT-enabled environment
• Learn how to assess and mitigate security risks in various IT systems and applications
• Develop strategies for implementing and maintaining effective security controls
• Gain knowledge of relevant laws, regulations, and industry standards related to information security
Training Format:In-class, Virtual, In-house
Location:Lagos, Accra, Nairobi, Kigali
Language:English, French
Nigeria Price:
₦350000
Int'l., (Nigeria) Price:
$1000
Ghana Price:
$4000
Kenya Price:
$5500
Rwanda Price:
$6000
Nigeria Price:₦350000
Int'l., (Nigeria) Price:
$1000
Ghana Price:
$4000
Kenya Price:
$4000
Rwanda Price:
$4000
Nigeria Price: ₦350000
Int'l., (Nigeria) Price:
$1000
Ghana Price: $4000
Kenya Price: $4000
Rwanda Price: $4000
Information Security Fundamentals
• Confidentiality, integrity, and availability (CIA) triad
• Security threats, vulnerabilities, and risks
• Security principles and best practices
Risk Assessment and Management
• Risk identification and analysis
• Risk assessment methodologies
• Risk mitigation strategies
Access Control and Identity Management
• Authentication and authorization mechanisms
• Identity and access management (IAM) concepts
• Single sign-on (SSO) and multi-factor authentication
Network Security
• Network security protocols and architectures
• Firewalls, intrusion detection/prevention systems (IDS/IPS)
• Virtual private networks (VPNs) and secure remote access
Application Security
• Secure software development lifecycle (SDLC)
• Common web application vulnerabilities and countermeasures
• Input validation and output encoding
Cryptography and Data Security
• Cryptographic algorithms and protocols
• Public key infrastructure (PKI)
• Data encryption and hashing techniques
Physical Security and Environmental Controls
• Physical access control mechanisms
• Environmental controls (e.g., power, HVAC, fire suppression)
• Facility security and disaster recovery planning
Security Policies and Procedures
• Security policy development and implementation
• Security awareness and training programs
• Incident response and disaster recovery planning
Compliance and Legal Issues
• Information security laws and regulations (e.g., GDPR, HIPAA, PCI DSS)
• Industry standards and best practices (e.g., ISO 27001, NIST SP 800-171)
• Contractual obligations and third-party risk management
Emerging Technologies and Security Considerations
• Cloud computing security
• Internet of Things (IoT) security
• Mobile device security
Who Can Attend:
• IT professionals responsible for managing security in an IT-enabled environment
• Information security analysts and managers
• IT project managers and business analysts
• Compliance and risk management professionals
1ST BATCH: Tuesday, January 13, 2026 — Friday, January 16, 2026.
2ND BATCH: Tuesday, May 5, 2026 — Friday, May 8, 2026.
3RD BATCH: Tuesday, September 1, 2026 — Friday, September 4, 2026.
The training methodology integrates lectures, interactive discussions, collaborative group exercises, and
illustrative examples. Participants will acquire a blend of theoretical insights and hands-on practical
experience, emphasizing the application of learned techniques. This approach ensures that attendees return
to their professional environments equipped with both the competence and self-assurance to effectively
implement the acquired skills in their responsibilities.
