Managing Security in an IT (Enabled) Environment

Date Format Fees  
12 Mar - 15 Mar, 2024 Classroom ₦300,000 Register
24 Sep - 27 Sep, 2024 Classroom ₦300,000 Register
12 Mar - 15 Mar, 2024 Classroom ₦300,000 Register

Event Details

The Managing Security in an IT (Enabled) Environment workshop is designed to provide participants with relevant skill and knowledge to manage security of modern IT-enabled business services. It will provide them with an understanding of the best practices, key concepts and to show them how they can improve their work and the work of their organization using latest security technologies. Furthermore, the workshop will provide participants with understanding of how technology risks translate business risk and how to mitigate them.

CONTENT

Security and Risk Management

  • Understand and apply concepts of confidentiality, integrity and availability
  • Evaluate and apply security governance principles
  • Determine compliance requirements
  • Understand legal and regulatory issues that pertain to information security in a global context
  • Understand, adhere to, and promote professional ethics
  • Develop, document, and implement security policy, standards, procedures, and guidelines
  • Identify, analyze, and prioritize Business Continuity (BC) requirements
  • Contribute to and enforce personnel security policies and procedures
  • Understand and apply risk management concepts
  • Understand and apply threat modeling concepts and methodologies
  • Apply risk-based management concepts to the supply chain
  • Establish and maintain a security awareness, education, and training program

Asset Security

  • Identify and classify information and assets
  • Determine and maintain information and asset ownership
  • Protect privacy
  • Ensure appropriate asset retention
  • Determine data security controls
  • Establish information and asset handling requirements

Security Architecture and Engineering

  • Implement and manage engineering processes using secure design principles
  • Understand the fundamental concepts of security models
  • Select controls based upon systems security requirements
  • Understand security capabilities of information systems (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)
  • Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
  • Assess and mitigate vulnerabilities in web-based systems
  • Assess and mitigate vulnerabilities in mobile systems
  • Assess and mitigate vulnerabilities in embedded devices
  • Apply cryptography
  • Apply security principles to site and facility design
  • Implement site and facility security controls

Communication and Network Security

  • Implement secure design principles in network architectures
  • Secure network components
  • Implement secure communication channels according to design

Identity and Access Management (IAM)

  • Control physical and logical access to assets
  • Manage identification and authentication of people, devices, and services
  • Integrate identity as a third-party service
  • Implement and manage authorization mechanisms
  • Manage the identity and access provisioning lifecycle

Security Assessment and Testing

  • Design and validate assessment, test, and audit strategies
  • Conduct security control testing
  • Collect security process data (e.g., technical and administrative)
  • Analyze test output and generate report
  • Conduct or facilitate security audits

Security Operations

  • Understand and support investigations
  • Understand requirements for investigation types
  • Conduct logging and monitoring activities
  • Securely provisioning resources
  • Understand and apply foundational security operations concepts
  • Apply resource protection techniques
  • Implement and support patch and vulnerability management
  • Implement and manage physical security
  • Address personnel safety and security concerns

 

FOR WHOM: CIOs, IT Development Managers, Heads of Department, System Administrators/Engineers, IT Professionals and others who want to sharpen their knowledge in IT world.

 

TRAINING METHODOLOGY

The training methodology combines lectures, discussions, group exercises and illustrations. Participants will gain both theoretical and practical knowledge of the topics. The emphasis is on the practical application of the topics and as a result participant will go back to the workplace with both the ability and the confidence to apply the techniques learned to their duties.

 

  • Venue

    Alpha Partners Professional Training Conference Centre. 200, Muritala Mohammed Way (3rd Floor), Yaba Lagos.

Share this course