Best Practices in IT Management & Information Security

  • Start Date

    31 May, 2022

  • End Date

    03 Jun, 2022

  • Price

    ₦250,000

  • WiFi

    Free wifi

Event Details

This workshop offers security skills and knowledge used by organizations and security professionals around the globe. The workshop will provide the participants with the knowledge and skills required to install and configure systems to secure applications, networks and devices, perform threat analysis and respond with appropriate mitigation techniques, participate in risk mitigation activities and operate with an awareness of applicable policies, laws and regulations

CONTENT

 

Threats, Attacks and Vulnerabilities

  • Analyze indicators of compromise and determine the type of malware
  • Compare and contrast types of attacks
  • Explain threat actor types and attributes
  • Explain penetration testing concepts
  • Explain vulnerability scanning concepts
  • Explain the impact associated with types of vulnerabilities

Technologies and Tools

  • Install and configure network components, both hardware and software-based, to support organizational security
  • Use appropriate software tools to assess the security posture of an organization
  • Troubleshoot common security issues
  • Analyze and interpret output from security technologies
  • Deploy mobile devices securely
  • Implement secure protocols

Architecture and Design

  • Explain use cases and purpose for frameworks, best practices and secure configuration guides
  • Implement secure network architecture concepts
  • Implement secure systems design
  • Explain the importance of secure staging deployment concepts
  • Explain the security implications of embedded systems
  • Summarize secure application development and deployment concepts
  • Summarize cloud and virtualization concepts
  • Explain how resiliency and automation strategies reduce risk
  • Explain the importance of physical security controls
  • Identity and Access Management
  • Compare and contrast identity and access management concepts
  • Install and configure identity and access services
  • Implement identity and access management controls
  • Differentiate common account management practices

Risk Management

  • Explain the importance of policies, plans and procedures related to organizational security
  • Summarize business impact analysis concepts
  • Explain risk management processes and concepts
  • Follow incident response procedures
  • Summarize basic concepts of forensics
  • Explain disaster recovery and continuity of operations concepts
  • Compare and contrast various types of controls
  • Carry out data security and privacy practices

Cryptography and PKI

  • Compare and contrast basic concepts of cryptography
  • Explain cryptography algorithms and their basic characteristics
  • Install and configure wireless security settings.
  • Implement public key infrastructure

 

FOR WHOM: CIOs, IT Development Managers, Heads of Department, System Administrators/Engineers, IT Professionals and others who want to sharpen their knowledge in IT world.

 

TRAINING METHODOLOGY

The training methodology combines lectures, discussions, group exercises and illustrations. Participants will gain both theoretical and practical knowledge of the topics. The emphasis is on the practical application of the topics and as a result participant will go back to the workplace with both the ability and the confidence to apply the techniques learned to their duties.

 

DATE:

1ST BATCH: 31st May – 3rd June, 2022    

2ND BATCH: 22nd – 25th Nov, 2022

Other Dates

Start Date End Date
22 Nov, 2022 25 Nov, 2022
Start Date End Date
31 May, 2022 03 Jun, 2022
  • Venue

    Alpha Partners Professional Training Conference Centre. 200, Muritala Mohammed Way (3rd Floor), Yaba Lagos.

Share this course