2EB0F829-FB0C-4810-8ED8-477A62C0090A
 

Live Onsite Classroom - Certified Professional in Enterprise CyberSecurity

Office Address - IEMA Training Center, No. 3B Abimbola Awoniyi Close, Victoria Island. Lagos.
Date - 17-19/12/2020
Time - 9:00 PM - 4:00PM
Cost - N 159,000.

In these 3 days, you will be introduced to strategies, frameworks, methodologies, and tools to manage cybersecurity risks, identify various types of common threats, design and operate secure computing and networking environments, assess and audit the organization’s security, collect, and analyze cybersecurity intelligence, and handle incidents as they occur. The course also covers closely related information assurance topics such as auditing and forensics to provide a sound basis for a comprehensive approach to security aimed toward those on the front lines of defense.

What You Will Learn

▪ Assess information security risk in computing and network environments
▪ Create an information assurance lifecycle process
▪ Analyze threats to computing and network environments
▪ Design secure computing and network environments
▪ Operate secure computing and network environments
▪ Assess the security posture within a risk management framework
▪ Collect cybersecurity intelligence information
▪ Analyze collected intelligence to define actionable response
▪ Respond to cybersecurity incidents
▪ Investigate cybersecurity incidents
▪ Audit secure computing and network environments
.
Who Should Attend
▪ Anyone needing a robust introduction to Cyber Security
▪ Anyone planning to work in a position that requires cybersecurity knowledge
▪ Anyone starting a career in Information / Cybersecurity
▪ IT professionals wanting to transition their career into Cyber Security
▪ Anyone with information/cybersecurity responsibilities
▪ Anyone who has learned “on the job” but who would benefit from a formal presentation to consolidate their knowledge
▪ Professionals familiar with basic IT and information security concepts and who need to round out their knowledge
Assess information security risk in computing and network environments
Create an information assurance lifecycle process
Analyze threats to computing and network environments
Design secure computing and network environments
Operate secure computing and network environments
Assess the security posture within a risk management framework
Collect cybersecurity intelligence information
Analyze collected intelligence to define actionable response
Respond to cybersecurity incidents
Investigate cybersecurity incidents
Audit secure computing and network environments
.
Who Should Attend
Anyone needing a robust introduction to Cyber Security
Anyone planning to work in a position that requires cybersecurity knowledge
Anyone starting a career in Information / Cybersecurity
IT professionals wanting to transition their career into Cyber Security
Anyone with information/cybersecurity responsibilities
Anyone who has learned “on the job” but who would benefit from a formal presentation to consolidate their knowledge
Professionals familiar with basic IT and information security concepts and who need to round out their knowledge

Course Content

Module 1
* Concepts and Definitions
* Difference between IT Security, Information Security, and Cyber Security
* Assets, Threats & Vulnerabilities
* Cyber Security Strategy
* Supporting Business Goals and Objectives
* Cyber Security Policy Framework
* Risk Management Concept Definitions
* Risk Avoidance, Mitigation, Transfer, and Acceptance
* Threats and Opportunities
* Assessing the current threat landscape
* The Internet of Things
* Insourcing and Outsourcing

Module 2
* The key role of security architecture
* Security Architecture Frameworks
* Security Architecture Design Principle
* Service Models
* Cryptography
* Implementing Security
* Network Security
– Routers, switches, firewalls, intrusion detection and prevention
* Endpoint Security
– Servers, desktop systems, laptops, tablets, and mobile devices
* Application Security
* Data Security

Module 3
* Business Continuity Planning
* Disaster Recovery Planning
* Testing and Maintenance of the BCP/DRP
* Security Assurance
* Vulnerability Assessments and Penetration Testing
* Minimum Security Baseline

Module 4
– Auditing, logging and security technologies
– Security Information and Event Management System (SIEM)
– Authorization, encryption, firewalls, intrusion prevention, anti-malware
– Security events and incidents
– Legal aspects
– Incident Response Process
– Incident Management Team
– Computer Forensics

Pre-requisite – Computer knowledge is required

Statement From Our Board

Our Institute is approved by the government and certifications administered by the board of IEMA and identifies those individuals and organizations who have been authorized to use the CPCA designation mark, and have met the rigorous professional standards, competency test and have agreed to the principles of integrity, objectivity, competence, accountability, fairness, confidentiality, professionalism and diligence in dealing with clients.

Note -

At the end of the training Interested participants are advised to take the Professional exams and will be conferred with the certified professional in CPCA upon obtaining the passing score. A designation awarded only by our institute and acceptable worldwide as qualification representing expertise in Contract Bidding, Tender and Proposal Administration. The 2hrs exam cost N25,000 and only for interested participants.

So dont wait click below to register

For More information please call 07034600322 or contact our office @ 3B Abimbola Awoniyi Close, Victoria Island, Lagos Nigeria

 
         
 
Powered by Mad Mimi®A GoDaddy® company