Information Security and Risk Management Training - PowerPoint PPT Presentation

About This Presentation
Title:

Information Security and Risk Management Training

Description:

Information Security and Risk Management Training course encourages you to understand an assortment of themes in information security and risk management, for example, prologue to information security, layers of security, dangers and vulnerabilities in information security, idea of information and information security, risk displaying, risk management procedures, risk management parts, and risk evaluation strategies. Learn more about this information security and risk management training. Call us today at +1-972-665-9786. Visit our website www.tonex.com Information Security and Risk Management Training – PowerPoint PPT presentation

Number of Views:413
Slides: 32
Provided by: wesley.comal
Tags:

less

Transcript and Presenter's Notes

Title: Information Security and Risk Management Training


1
Cybersecurity Seminars Information Security
Risk Management Training
Call Us Today 1-972-665-9786 https//www.tonex.c
om/training-courses/information-security-and-risk-
management-training/
TAKE THIS COURSE
Since 1993, Tonex has specialized in providing
industry-leading training, courses, seminars,
workshops, and consulting services. Fortune 500
companies certified.
2
(No Transcript)
3
  • Audience
  •  2-day course designed for
  • All individuals who need to understand the
    concept of information security and risk
    management.
  • IT professionals
  • Cyber security professionals, network engineers,
    security analysts, policy analysts
  • Security operation personnel, network
    administrators, system integrators
  • Security traders
  • Investors and contractors
  • Technicians, operators, and maintenance personnel
  • Managers, accountants, and executives of cyber
    security industry.
  • Price 1,699.00 Length 2 Days

Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
4
Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
5
Information Security and Risk Management Training
course encourages you to understand an assortment
of themes in information security and risk
management, for example, prologue to information
security, layers of security, dangers and
vulnerabilities in information security, idea of
information and information security, risk
displaying, risk management procedures, risk
management parts, and risk evaluation
strategies. Information security is to safeguard
and ensure the fundamental information utilizing
the most recent innovation and guard systems.
Understanding risks, ensuring the framework
security against risk and dealing with the risk
if there should arise an occurrence of dangers is
a standout amongst the most essential themes in
digital security.
Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
6
By taking the TONEX information security and risk
management training, you will understand the
fundamental idea of information security,
organize security and realness of the information
and how to anchor the parts of the information
framework. Find out about dangers and
vulnerabilities in information framework, for
example, natural calamities, psychological
militant assaults, digital vulnerabilities,
cybercrimes, cryptographic assaults, code
infusion assaults, or refusal of administration
assaults. Find out about the information,
information sharing strategies, significance of
information, and recurrence of security
occurrences on essential information and how to
configuration shields for indispensable
information. Take in the standards of risk
displaying, attributes of risks, misfortunes
caused by risks, dynamic and proactive risk
models, and PC risk models. Through this
course, you will likewise find out about the
fundamental strategies to deal with the risks,
how to stay away from risks, how to exchange the
risk, controlling the risks, techniques for
calamity recuperation designs (DRP), episode
reaction plan, and money saving advantage
examination (CBA).
Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
7
The TONEX information security and risk
management training likewise causes you find the
principle part of risk management from
recognizing the risk, dissecting the risks,
probability of the risk to controlling and
building up the risk management systems. TONEX
information security and risk management training
incorporates numerous in-class exercises
including hands on works out, contextual
investigations and workshops. Amid the
information security and risk management
training, understudies get their own particular
example work and extends and through our
instructing, build up their own information
security and risk management framework. At
last, the information security and risk
management training will acquaint you with the
risk evaluation strategies through which you can
recognize the risks, measure them, investigate
and appraise the risks in information framework.
Toward the finish of the training session, risk
management systems and devices are examined in
detail.
Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
8
Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
9
  • Audience
  • The information security and risk management
    training is a 2-day course designed for
  • All individuals who need to understand the
    concept of information security and risk
    management.
  • IT professionals in the areas of information
    security and risk management
  • Cyber security professionals, network engineers,
    security analysts, policy analysts
  • Security operation personnel, network
    administrators, system integrators and security
    consultants
  • Security traders to understand the software
    security of web system, mobile devices, or other
    devices.
  • Investors and contractors who plan to make
    investments in security system industry.
  • Technicians, operators, and maintenance personnel
    who are or will be working on cyber security
    projects
  • Managers, accountants, and executives of cyber
    security industry.

Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
10
Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
11
  • Training Objectives
  • Upon completion of the information security and
    risk management training course, the attendees
    are able to
  • Learn the main concept of information security
  • Understand the threats and vulnerabilities in
    information security network
  • Recognize the vital data and be able to preserve
    the security of the data
  • Understand the concept of risk, modeling
    techniques and analysis approaches
  • Be able to understand the concept of risk
    management, classification of the risks and
    recovery plans
  • Explain the main components of risk management in
    cyber security
  • Understand the risk assessment techniques and
    their application to information security
  • Describe the risk management tools and techniques
    in cyber security

Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
12
Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
13
  • Training Outline
  • The information security and risk management
    training course consists of the following
    lessons, which can be revised and tailored to the
    clients need
  • Introduction to Information Security
  • Threats and Vulnerabilities
  • Data
  • Risk Modeling
  • Introduction to Risk Management
  • Components of Risk Management
  • Risk Assessment Techniques
  •  Risk Management Techniques
  • Risk Management Tools

Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
14
  • Introduction to Information Security
  • History of information security
  • Meaning of security
  • Quality of being secured
  • Layers of security
  • Physical security
  • Personal security
  • Operational security
  • Communication security
  • Network security
  • Information security
  • Availability of information
  • Integrity of information
  • Authenticity of information
  • Accuracy of information
  • Confidentiality of information
  • Components of an information system
  • Securing the components of information system

Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
15
Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
16
  • Threats and Vulnerabilities
  • Natural disasters
  • Environmental disasters
  • Widespread technical disruptions
  • Conventional warfare
  • Terrorist attacks
  • Civil unrest violence
  • Economic threats
  • National depression
  • Global depression
  • Sudden global shortage
  • Cyber vulnerabilities
  • Cyber activism
  • Cyber crime
  • Cyber espionage
  • Cyber terrorism
  • Cyber warfare
  • Hacker war
  • Network attack
  • Electronic attack
  • Computer network attack
  • Computer network defense
  • Computer network exploitation
  • Cryptographic attack
  • Obfuscating attack
  • Resource deception attack
  • Cyber weaponry
  • Abuse of information leakage
  • Code injection attack
  • Compromising confidential information
  • Botnets
  • Denial of service attacks
  • Distributed denial of service attack
  • IP address spoofing, Password cracking
  • Phishing Search engine poisoning
  • Spamming Targeted attacks

Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
17
  • Data
  • Difficulty with the Data
  • Differences of data sharing
  • Relevance of data
  • Data finding
  • Annual frequency of security incidents
  • Consequences of security incidents
  • Safeguards

Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
18
Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
19
  • Risk Modeling
  • Risk model as a decision driven activity
  • Conceptual definition of risk
  • Characteristics of risk
  • Uncertainty of risk
  • Loss caused by risk
  • Project risks
  • Technical risks
  • Business risks
  • Market risk
  • Sales risk
  • Strategic risk
  • Management risk
  • Budget risk
  • Known risk , Predictable risk Unpredictable
    risk
  • Reactive risk strategies Proactive risk
    strategies
  • Decision modeling
  • Computer security risk model

Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
20
  • Introduction to Risk Management
  • History of risk management
  • Maintaining confidentiality of data
  • Assurance of the integrity of data
  • Avoidance of risks Transferring risks
  • Mitigation of risks Acceptance of risks
  • Controlling the risk
  • Revising the deployment organization to manage
    the risk
  • Insurances to cover the risks
  • Disaster recovery plan (DRP)
  • Incident response plans (IRP)
  • Business continuity plan (BCP)
  • Handling the action points
  • Evaluation, assessment, and maintenance of risk
    control
  • Risk control cycle Risk Control layers
  • Preventive and detective controls
  • Cost Benefit Analysis (CBA) Asset valuation
    components
  • Risk management discussion points

Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
21
Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
22
  • Components of Risk Management
  • Risk identification
  • Analyzing the source of the risk
  • Risk assessment
  • Severity of risk impact
  • Likelihood of risk occurring
  • Controllability of risks
  • Risk response development
  • Developing the risk management strategy
  • Contingency plan development
  • Risk response control
  • Implementing risk strategy
  • Monitoring plan for new risks
  • Risk management modification

Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
23
  • Risk Assessment Techniques
  • Scenario analysis
  • Identifying hazards
  • Quantifying risks
  • Component determination for safety plan
  • Estimation of accident frequency
  • Consequence analysis and modeling
  • Risk estimation
  • Risk event impact analysis
  • Identifying the risk type and time
  • Identifying the probability of the risk
    occurrence
  • Identifying the difficulty of risk occurrence
  • Ranking the importance of the risk
  • Risk severity matrix
  • Main steps in risk analysis , Fault tree analysis
    Event tree analysis
  • Bowties Barrier diagrams
  • Reliability data Human reliability
  • Consequence models Qualitative analysis

Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
24
Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
25
  • Risk Management Techniques
  • Mitigating the risk
  • Retaining the risk
  • Sharing the risk
  • Transferring the risk
  • Contingency planning
  • Risk management plan
  • Estimating the potential loss
  • Threat likelihood analysis
  • Annual loss expectancy (ALE)
  • Non-existent maturity risk
  • Ad hoc risks
  • Repeatable risks
  • Managed risks
  • Optimized risks
  • Mitigation owner
  • Security steering committee
  • Security risk management team
  • Physical attacks managements
  • Network attacks management
  • Host attack management
  • Application attack management
  • Data attack management
  • Direct testing
  • Periodic compliance report
  • Widespread security incidents

Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
26
  • Risk Management Tools
  • Tables
  • Questionnaires
  • Standard report formats
  • Software
  • List of threats
  • List of control

Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
27
Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
28
  • Hands-on and In-Class Activities
  • Labs
  • Workshops
  • Group Activities
  • Sample Workshops Labs for Information Security
    and Risk Management Training
  • Hands on training on virtual information security
    laboratories
  • Training- Effects of threats on information case
    study
  • Data importance in information security
  • Performing a Simple Risk Assessment
  • Risk Assessment Case Studies
  • Experimental application of Risk Assessment Tools
  • Experimental studies of Risk Management Tools
  • Introduction to risk identification
  • Using Risk Management Tools and software

Information Security and Risk Management Training
TAKE THIS COURSE
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
29
Information Security and Risk Management Training
https//www.tonex.com/training-courses/information
-security-and-risk-management-training/
TAKE THIS COURSE
30
(No Transcript)
31
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com