Course Provider
What will you learn in this course?
- This course prepares a graduate student to employ the theoretical and conceptual underpinnings to improve information security behavior and develop skills in a work-related context in private, public or government enterprises.
- The course is designed to assess decisions and policies to improve information security management.
- The academic engagement will cover the following topics:
- policy development.
- risk analysis and management.
- security information dissemination, education and awareness training.
- legal compliance, and
- ethical and legal conduct.
- Students will be prepared to reflectively respond to the human factors of information security management.
InfoSec Management
-
Skill Type
Emerging Tech
- Domain
Cybersecurity
- Course Category
Deepskilling Course
- Certificate Earned Joint Co-Branded Participation Certificate
- Course Covered under GoI Incentive
Yes
-
- Course Price
INR 5,000
- Course Duration
52 Hours
- Course Price
Why should you take this course?
After completing this course, you will:
- Understand fundamentals of information security
- Understand management systems
- Gain familiarity with the ISO 27000 family of standards
- Understand requirements of ISO 27001:2013
- Understand plan-do-check-act (PDCA) as it relates to an ISMS
- Support cyber security staff
- Conduct annual staff awareness training
- Prioritize risk assessments
- Regularly review policies and procedures
- Assess and improve
- Describe threats to information security
- Identify methods, tools and techniques for combating these threats
- Identify types of attacks and problems that occur when systems are not properly protected
- Explain integral parts of overall good information security practices
- Identify and discuss issues related to access control
- Describe the need for and development of information security policies, and identify guidelines and models for writing policies
- Define risk management and explain why it is an important component of an information security strategy and practice
- Describe the types of contingency plan and the steps involved in developing each
- Identify security issues related to personnel decisions, and qualifications of security personnel
Who should take this course?
- Working Professional with Experience
- Entry Level Working Professional
- Graduate student
Curriculum
- An Information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data.
- The goal of ISMS is to minimize risk and ensure business continuity by pro-actively limiting the impact of a security breach.
- Information security management describes controls that an organization needs to implement to ensure that it is sensibly protecting the confidentiality, availability, and integrity of assets from threats and vulnerabilities.
Tools you will learn in this course
- Security assessments using automated tools on VM (Wireshark, Burp suite, Nmap)
- Configuration assessment using automated tools like (Nipper, rConfig, Batfish, Auditpol, LSAT)
- Backup of security devices: SANS, RAID, Bvckup2, AOMEI Back upper etc.)
- Maintain Records/Logs SIEM tools like AlienVault, Splunk