Information Systems: Security in the Workplace
Short course
In London, Amman (Jordan), Amsterdam (Netherlands) and 22 other venues
Description
-
Type
Short course
-
Location
-
Class hours
20h
-
Duration
5 Days
-
Start date
Different dates available
This course will cover general IT administrative/regulatory security policy, ethics, guidelines and practices. It will broaden one’s general knowledge of IT security, and address critical topics that are essential in today’s security conscious environment.
Facilities
Location
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Start date
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 6 years
Subjects
- Information Systems
- Systems
- Information Technology and IT Management (ITIM)
Course programme
- To evaluate the role of business and technical risk analysis within the context of Information Security.
- To identify and analyse prevalent threats and vulnerabilities facing businesses today.
- To identify and analyse business and technical threats to an organization.
- To analyze and evaluate Information Security methods used to address business threats and vulnerabilities.
- To identify and evaluate the controls necessary to address business and technical threats.
- To compare and contrast the mechanisms and procedures used by management to influence behavior, use, and content of an information system.
- To propose best practices which utilize the means and methods to protect confidentiality and integrity?
- To evaluate the impact of high level procedures, structures and standards used in defining, designing, and implementing information systems and technology.
- To assess best practices used in establishing controls, within business applications, that supports the security strategy of the enterprise.
Information Systems: Security in the Workplace