Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Security & Risk Management Training

Similar presentations


Presentation on theme: "Information Security & Risk Management Training"— Presentation transcript:

1 Cybersecurity Seminars Information Security & Risk Management Training Call Us Today: +1-972-665-9786 https://www.tonex.com/training-courses/information-security-and-risk-management-training/ TAKE THIS COURSE Since 1993, Tonex has specialized in providing industry-leading training, courses, seminars, workshops, and consulting services. Fortune 500 companies certified.

2 Since 1993, Tonex has specialized in providing industry-leading training, courses, seminars, workshops, and consulting services. Why Tonex ? --Presenting highly customized learning solutions is what we do. For over 30 years TONEX has worked with organizations in improving their understanding and capabilities in topics often with new development, design, optimization, regulations and compliances that, frankly, can be difficult to comprehend. --Ratings tabulated from student feedback post-course evaluations show an amazing 98 percent satisfaction score. --Reasonably priced classes taught by the best trainers is the reason all kinds of organizations from Fortune 500 companies to government’s most important agencies return for updates in courses and hands-on workshops

3 TAKE THIS COURSE Audience: 2-day course designed for: All individuals who need to understand the concept of information security and risk management. IT professionals Cyber security professionals, network engineers, security analysts, policy analysts Security operation personnel, network administrators, system integrators Security traders Investors and contractors Technicians, operators, and maintenance personnel Managers, accountants, and executives of cyber security industry. Price: $1,699.00 Length: 2 Days Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

4 TAKE THIS COURSE Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

5 Information Security and Risk Management Training course encourages you to understand an assortment of themes in information security and risk management, for example, prologue to information security, layers of security, dangers and vulnerabilities in information security, idea of information and information security, risk displaying, risk management procedures, risk management parts, and risk evaluation strategies. Information security is to safeguard and ensure the fundamental information utilizing the most recent innovation and guard systems. Understanding risks, ensuring the framework security against risk and dealing with the risk if there should arise an occurrence of dangers is a standout amongst the most essential themes in digital security. TAKE THIS COURSE Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

6 TAKE THIS COURSE By taking the TONEX information security and risk management training, you will understand the fundamental idea of information security, organize security and realness of the information and how to anchor the parts of the information framework. Find out about dangers and vulnerabilities in information framework, for example, natural calamities, psychological militant assaults, digital vulnerabilities, cybercrimes, cryptographic assaults, code infusion assaults, or refusal of administration assaults. Find out about the information, information sharing strategies, significance of information, and recurrence of security occurrences on essential information and how to configuration shields for indispensable information. Take in the standards of risk displaying, attributes of risks, misfortunes caused by risks, dynamic and proactive risk models, and PC risk models. Through this course, you will likewise find out about the fundamental strategies to deal with the risks, how to stay away from risks, how to exchange the risk, controlling the risks, techniques for calamity recuperation designs (DRP), episode reaction plan, and money saving advantage examination (CBA). Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

7 TAKE THIS COURSE The TONEX information security and risk management training likewise causes you find the principle part of risk management from recognizing the risk, dissecting the risks, probability of the risk to controlling and building up the risk management systems. TONEX information security and risk management training incorporates numerous in-class exercises including hands on works out, contextual investigations and workshops. Amid the information security and risk management training, understudies get their own particular example work and extends and through our instructing, build up their own information security and risk management framework. At last, the information security and risk management training will acquaint you with the risk evaluation strategies through which you can recognize the risks, measure them, investigate and appraise the risks in information framework. Toward the finish of the training session, risk management systems and devices are examined in detail. Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

8 TAKE THIS COURSE Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

9 TAKE THIS COURSE Audience: The information security and risk management training is a 2-day course designed for: All individuals who need to understand the concept of information security and risk management. IT professionals in the areas of information security and risk management Cyber security professionals, network engineers, security analysts, policy analysts Security operation personnel, network administrators, system integrators and security consultants Security traders to understand the software security of web system, mobile devices, or other devices. Investors and contractors who plan to make investments in security system industry. Technicians, operators, and maintenance personnel who are or will be working on cyber security projects Managers, accountants, and executives of cyber security industry. Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

10 TAKE THIS COURSE Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

11 TAKE THIS COURSE Training Objectives: Upon completion of the information security and risk management training course, the attendees are able to: Learn the main concept of information security Understand the threats and vulnerabilities in information security network Recognize the vital data and be able to preserve the security of the data Understand the concept of risk, modeling techniques and analysis approaches Be able to understand the concept of risk management, classification of the risks and recovery plans Explain the main components of risk management in cyber security Understand the risk assessment techniques and their application to information security Describe the risk management tools and techniques in cyber security Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

12 TAKE THIS COURSE Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

13 TAKE THIS COURSE Training Outline: The information security and risk management training course consists of the following lessons, which can be revised and tailored to the client’s need: Introduction to Information Security Threats and Vulnerabilities Data Risk Modeling Introduction to Risk Management Components of Risk Management Risk Assessment Techniques Risk Management Techniques Risk Management Tools Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

14 TAKE THIS COURSE Introduction to Information Security: History of information security Meaning of security Quality of being secured Layers of security Physical security Personal security Operational security Communication security Network security Information security Availability of information Integrity of information Authenticity of information Accuracy of information Confidentiality of information Components of an information system Securing the components of information system Bottom up and Top down approaches Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

15 TAKE THIS COURSE Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

16 TAKE THIS COURSE Threats and Vulnerabilities: Natural disasters Environmental disasters Widespread technical disruptions Conventional warfare Terrorist attacks Civil unrest violence Economic threats National depression Global depression Sudden global shortage Cyber vulnerabilities Cyber activism Cyber crime Cyber espionage Cyber terrorism Cyber warfare Hacker war Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/ Network attack Electronic attack Computer network attack Computer network defense Computer network exploitation Cryptographic attack Obfuscating attack Resource deception attack Cyber weaponry Abuse of information leakage Code injection attack Compromising confidential information Botnets Denial of service attacks Distributed denial of service attack IP address spoofing, Password cracking Phishing & Search engine poisoning Spamming & Targeted attacks

17 TAKE THIS COURSE Data: Difficulty with the Data Differences of data sharing Relevance of data Data finding Annual frequency of security incidents Consequences of security incidents Safeguards Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

18 TAKE THIS COURSE Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

19 TAKE THIS COURSE Risk Modeling: Risk model as a decision driven activity Conceptual definition of risk Characteristics of risk Uncertainty of risk Loss caused by risk Project risks Technical risks Business risks Market risk Sales risk Strategic risk Management risk Budget risk Known risk, Predictable risk & Unpredictable risk Reactive risk strategies & Proactive risk strategies Decision modeling Computer security risk model Analysis techniques Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

20 TAKE THIS COURSE Introduction to Risk Management: History of risk management Maintaining confidentiality of data Assurance of the integrity of data Avoidance of risks & Transferring risks Mitigation of risks & Acceptance of risks Controlling the risk Revising the deployment organization to manage the risk Insurances to cover the risks Disaster recovery plan (DRP) Incident response plans (IRP) Business continuity plan (BCP) Handling the action points Evaluation, assessment, and maintenance of risk control Risk control cycle & Risk Control layers Preventive and detective controls Cost Benefit Analysis (CBA) & Asset valuation components Risk management discussion points Risk management practices Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

21 TAKE THIS COURSE Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

22 TAKE THIS COURSE Components of Risk Management: Risk identification Analyzing the source of the risk Risk assessment Severity of risk impact Likelihood of risk occurring Controllability of risks Risk response development Developing the risk management strategy Contingency plan development Risk response control Implementing risk strategy Monitoring plan for new risks Risk management modification Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

23 TAKE THIS COURSE Risk Assessment Techniques: Scenario analysis Identifying hazards Quantifying risks Component determination for safety plan Estimation of accident frequency Consequence analysis and modeling Risk estimation Risk event impact analysis Identifying the risk type and time Identifying the probability of the risk occurrence Identifying the difficulty of risk occurrence Ranking the importance of the risk Risk severity matrix Main steps in risk analysis, Fault tree analysis & Event tree analysis Bowties & Barrier diagrams Reliability data & Human reliability Consequence models & Qualitative analysis Quantitative analysis Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

24 TAKE THIS COURSE Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

25 TAKE THIS COURSE Risk Management Techniques: Mitigating the risk Retaining the risk Sharing the risk Transferring the risk Contingency planning Risk management plan Estimating the potential loss Threat likelihood analysis Annual loss expectancy (ALE) Non-existent maturity risk Ad hoc risks Repeatable risks Managed risks Optimized risks Mitigation owner Security steering committee Security risk management team Organizing the solutions by defense in depth Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/ Physical attacks managements Network attacks management Host attack management Application attack management Data attack management Direct testing Periodic compliance report Widespread security incidents

26 TAKE THIS COURSE Risk Management Tools: Tables Questionnaires Standard report formats Software List of threats List of control Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

27 TAKE THIS COURSE Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

28 TAKE THIS COURSE Hands-on and In-Class Activities: Labs Workshops Group Activities Sample Workshops Labs for Information Security and Risk Management Training: Hands on training on virtual information security laboratories Training- Effects of threats on information case study Data importance in information security Performing a Simple Risk Assessment Risk Assessment Case Studies Experimental application of Risk Assessment Tools Experimental studies of Risk Management Tools Introduction to risk identification Using Risk Management Tools and software Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

29 TAKE THIS COURSE Information Security and Risk Management Training https://www.tonex.com/training-courses/information-security-and-risk-management-training/

30 Contact Tonex Training Expert Dallas, TX: 1400 Preston Rd., Suite 400 Plano, Texas 75093 Tel: +1-972-665-9786 Washington, DC: 1025 Connecticut Ave, NW Suite 1000 Washington, DC 20036 Tel: +1-202-327-5404 International: +1-214-762-6673 Fax: +1-972-692-7492 Visit Tonex website https://www.tonex.com/

31


Download ppt "Information Security & Risk Management Training"

Similar presentations


Ads by Google