Euro-training Center
 Implementing IT Security in Your Organization Risk Analysis amp Methodology B9213 QR Code
Share (14) Like Download Brochure (PDF) Dates and locations

Implementing IT Security in Your Organization Risk Analysis & Methodology

Overview:

Introduction:

This program provides the necessary step by step approach and methodology for systematically evaluating an information system's security.

Course Objectives:

At the end of this course the participants will be able to:

  • Know the information as a source of competitive advantage
  • Know the needs for Decision Making
  • Limit Information Access
  • Make a Systematic evaluation of information system security.

Targeted Audience:

  • IT Practitioners
  • Cybersecurity Staff

Course Outlines:

Unit 1:

  • Practical Issues - The Security Situation
  • Security Strategic Issues
  • Industry Methodologies, Standards & Best Practices

Unit 2:

  • Business Mapping of Operations to Identify Security Risks - Flow Charts
  • How Secure are Your Computer Security Fraud Prevention Practices?
  • How safe is your computer system from  Viruses, hacking, and fraud?

Unit 3: Analyzing:

  • Do you have a problem?
  • How serious is it?
  • What should you do?
  • How to evaluate the risk?
  • How to implement controls?

Unit 4:

  • Methodology for:
    • How to identify information assets and controls?
    • How to quantify risks, likely damage causes for concern?
    • To Understand the responses to any threat know which to use.
    • Check your IT infrastructure - Identify weak links
    • Review the success of key staff members in implementing controls

Unit 5:

  • Clarify your vulnerability to outsiders and staff - including providing them an Action Plan to Preserve Data Security on their Systems and Work Methods
  • Planning the Security System
  • Information Technology Security Standards Adoption
  • Implementing Computer Security Improvements

Select training course venue