Objectives:
• Understand the fundamentals of information security in an IT-enabled environment
• Learn how to assess and mitigate security risks in various IT systems and applications
• Develop strategies for implementing and maintaining effective security controls
• Gain knowledge of relevant laws, regulations, and industry standards related to information security
Course Content:
Information Security Fundamentals
• Confidentiality, integrity, and availability (CIA) triad
• Security threats, vulnerabilities, and risks
• Security principles and best practices
Risk Assessment and Management
• Risk identification and analysis
• Risk assessment methodologies
• Risk mitigation strategies
Access Control and Identity Management
• Authentication and authorization mechanisms
• Identity and access management (IAM) concepts
• Single sign-on (SSO) and multi-factor authentication
Network Security
• Network security protocols and architectures
• Firewalls, intrusion detection/prevention systems (IDS/IPS)
• Virtual private networks (VPNs) and secure remote access
Application Security
• Secure software development lifecycle (SDLC)
• Common web application vulnerabilities and countermeasures
• Input validation and output encoding
Cryptography and Data Security
• Cryptographic algorithms and protocols
• Public key infrastructure (PKI)
• Data encryption and hashing techniques
Physical Security and Environmental Controls
• Physical access control mechanisms
• Environmental controls (e.g., power, HVAC, fire suppression)
• Facility security and disaster recovery planning
Security Policies and Procedures
• Security policy development and implementation
• Security awareness and training programs
• Incident response and disaster recovery planning
Compliance and Legal Issues
• Information security laws and regulations (e.g., GDPR, HIPAA, PCI DSS)
• Industry standards and best practices (e.g., ISO 27001, NIST SP 800-171)
• Contractual obligations and third-party risk management
Emerging Technologies and Security Considerations
• Cloud computing security
• Internet of Things (IoT) security
• Mobile device security
Who Can Attend:
• IT professionals responsible for managing security in an IT-enabled environment
• Information security analysts and managers
• IT project managers and business analysts
• Compliance and risk management professionals
Methodology
The training methodology integrates lectures, interactive discussions, collaborative group exercises, and illustrative examples. Participants will acquire a blend of theoretical insights and hands-on practical experience, emphasizing the application of learned techniques. This approach ensures that attendees return to their professional environments equipped with both the competence and self-assurance to effectively implement the acquired skills in their responsibilities
.
DATE:
1ST BATCH: 14th – 17th Jan, 2025
2ND BATCH: 9th – 11th June, 2025
25, Queen street, Alagomeji Bus Stop, Yaba, Lagos