(314) 504-0530 info@bac-mail.com

The Information Security Manager: Fundamentals of Managing Information Security

  • CPE Credits: 8
  • Prerequisites: None
  • Learning Level: Basic
  • Instructional Method: Group-live
  • Field of Study: Information Technology – Technical
Course Revision Date: March 1, 2023

Back to Training Catalog >

Course Description
This five day seminar is an introduction to the various technical and administrative aspects of Information Security and Assurance. This seminar provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features.

The purpose of the seminar is to provide the attendee with an overview of the field of Information Security and Assurance. Attendees will be exposed to the spectrum of security activities, methods, methodologies, and procedures. Coverage will include inspection and protection of information assets, detection of and reaction to threats to information assets, and examination of pre- and post-incident procedures, technical and managerial responses and an overview of the information security planning and staffing functions.

Audience
System administrators, managers of telecommunications, directors of corporate security, safety and continuity planning, and IT professionals who through their involvement in managing or directing their organization’s IT infrastructure are responsible for establishing and maintaining information security policies, practices and procedures. This seminar would also be of value to financial and operational audit professionals as well as non-IT professionals tasked with the responsibility for assessing their organization’s IT operations, infrastructure, and security.
Objectives
After completing this seminar, attendees will be able to:

  • Understand what information security is and how it came to mean what it does today
  • Comprehend the history of computer security and how it evolved into information security
  • Understand the key terms and critical concepts of information security as presented in the chapter
  • Outline the phases of the security systems development life cycle
  • Understand the role professionals involved in information security in an organizational structure. Identify and prioritize information assets
  • Identify and prioritize threats to information assets
  • Define an information security strategy and architecture
  • Plan for and respond to intruders in an information system
  • Describe legal, ethical and public relations implications of security and privacy issues
  • Present a disaster recovery plan for recovery of information assets after an incident
Course Outline

Please contact Al with a request for a detailed course outline…

albert@bac-mail.com

Need more information?

If have questions or would like more information about any of our courses please contact us using the form below. We look forward to hearing from you.

15 + 12 =

Request a Consultation Today

We provide a variety of consultation services and training options to fit the demanding and changing needs of our clients. Contact us today and we will help you determine the best way to meet your goals.

cybersecurity and infrastructure security angency

BAC is a vetted, current provider of training courses through the NICCS Education and Training Catalog. BAC’s courses are aligned to the specialty areas of the National Cybersecurity Workforce Framework.