Upcoming Sessions

13-17 May 2024London - UK$5,950
12-16 Aug 2024Dubai - UAE$5,950
09-13 Dec 2024Dubai - UAE$5,950

Training Course Overview

Has your organization data increased dramatically?

Are you scared of losing your business or personal information?

Do you fear someone will mess with your personal computer or mobile?

One yes-answer for any of the above questions means this Anderson training course is for you.

Both Organizational and Personal Information face many constant security risks such as being revealed, altered or even used by unauthorized personnel. In this Anderson course, special attention will be paid to explain the basic needs and strategies that can be followed in order to protect your information against intruders. In addition, the awareness of maintaining secure information and learning from the past incidents at the workplace. Many activities will be practiced during the course in order to empower the basic security skills

Training Course Objectives

By attending this Anderson training course, delegates will be able to:

  • Know how to protect their personal information
  • Know how to be cautious when dealing with their business information
  • Grow skills in learning from past security incidents
  • Understand the different layers of protecting information
  • Understand the importance of policies related to their organization main vision

Designed for

This Anderson training course is suitable to a wide range of professionals but will greatly benefit:

  • IT Security
  • IT Security Auditing
  • Technical IT Management
  • Those with involvement of systems integration
  • Financial controllers with a technical interest
Download Course Brochure in Pdf format
Download Course Brochure

Training Course Overview

Has your organization data increased dramatically?

Are you scared of losing your business or personal information?

Do you fear someone will mess with your personal computer or mobile?

One yes-answer for any of the above questions means this Anderson training course is for you.

Both Organizational and Personal Information face many constant security risks such as being revealed, altered or even used by unauthorized personnel. In this Anderson course, special attention will be paid to explain the basic needs and strategies that can be followed in order to protect your information against intruders. In addition, the awareness of maintaining secure information and learning from the past incidents at the workplace. Many activities will be practiced during the course in order to empower the basic security skills

Training Course Objectives

By attending this Anderson training course, delegates will be able to:

  • Know how to protect their personal information
  • Know how to be cautious when dealing with their business information
  • Grow skills in learning from past security incidents
  • Understand the different layers of protecting information
  • Understand the importance of policies related to their organization main vision

Designed for

This Anderson training course is suitable to a wide range of professionals but will greatly benefit:

  • IT Security
  • IT Security Auditing
  • Technical IT Management
  • Those with involvement of systems integration
  • Financial controllers with a technical interest

Day One:  Overview of Information Security

  • What is Information Security?
  • Examples of Information Security Incidents
  • What is Information Security Management?
  • Human Aspect of Information Security
  • Social Engineering

Day Two:  Information Security for Server Systems

  • Attacks for Personal Computers and Smart phones and counter measure
  • Information Security Risk Management
  • What is Risk Management process?
  • Identifying Information Assets
  • Identifying Security Risk and evaluation
  • Risk Treatment

Day Three: Security Risk management as an Organization

  • Information Security Governance
  • Information Security Management System (ISMS)
  • Information Security Policy, Standards and Procedures
  • Information Security Evaluation
  • Security Incident Response

Day Four: Information Security and Cryptography

  • Requirements for Secure Communication
  • What is Cryptography?
  • Classic and Modern Cryptography
  • Common Key Cryptography algorithms: DES, Triple DES, AES
  • Problems of Key distribution for Common Key Cryptography

Day Five: Data Integrity and Digital Signature

  • Integrity of Data
  • Hash Function
  • Digital Signature
  • Public Key Certificate and Public Key Infrastructure (PKI)
  • Certificate Authority

The Certificate

    Anderson Certificate of Completion will be provided to delegates who attend and complete the course

Info & In-house Solution

For more information about this course, call or email us at:

Call us: +971 4 365 8363

Email: info@anderson.ae

Request for a Tailor-made training and educational experience for your organization now:

Request for In-house

Callback Request

    Related Courses

    Callback Request

      Category/venue filter

      Share