Upcoming Sessions

12-16 Aug 2024Dubai - UAE$5,950
09-13 Dec 2024Dubai - UAE$5,950
12-16 May 2025London - UK$5,950
11-15 Aug 2025Dubai - UAE$5,950
08-12 Dec 2025Dubai - UAE$5,950

Training Course Overview

Has your organization's data seen a significant increase?

Are you concerned about the potential loss of business or personal information?

Do you worry about the security of your personal computer or mobile device?

If you answered yes to any of these questions, then this Anderson training course is tailored for you.

Both organizational and personal information are exposed to ongoing security risks, including unauthorized access, alteration, or misuse. This course by Anderson focuses on essential strategies and practices to safeguard your information from intruders. Participants will gain insights into maintaining secure information and learn from past incidents in the workplace. Through practical activities, attendees will enhance their foundational security skills.

Training Course Objectives

By attending this Anderson training course, delegates will be able to:

  • Know how to protect their personal information
  • Know how to be cautious when dealing with their business information
  • Grow skills in learning from past security incidents
  • Understand the different layers of protecting information
  • Understand the importance of policies related to their organization main vision

Designed for

This Anderson training course is suitable to a wide range of professionals but will greatly benefit:

  • IT Security
  • IT Security Auditing
  • Technical IT Management
  • Those with involvement of systems integration
  • Financial controllers with a technical interest
Download Course Brochure in Pdf format
Download Course Brochure

Training Course Overview

Has your organization's data seen a significant increase?

Are you concerned about the potential loss of business or personal information?

Do you worry about the security of your personal computer or mobile device?

If you answered yes to any of these questions, then this Anderson training course is tailored for you.

Both organizational and personal information are exposed to ongoing security risks, including unauthorized access, alteration, or misuse. This course by Anderson focuses on essential strategies and practices to safeguard your information from intruders. Participants will gain insights into maintaining secure information and learn from past incidents in the workplace. Through practical activities, attendees will enhance their foundational security skills.

Training Course Objectives

By attending this Anderson training course, delegates will be able to:

  • Know how to protect their personal information
  • Know how to be cautious when dealing with their business information
  • Grow skills in learning from past security incidents
  • Understand the different layers of protecting information
  • Understand the importance of policies related to their organization main vision

Designed for

This Anderson training course is suitable to a wide range of professionals but will greatly benefit:

  • IT Security
  • IT Security Auditing
  • Technical IT Management
  • Those with involvement of systems integration
  • Financial controllers with a technical interest

Day One:  Overview of Information Security

  • What is Information Security?
  • Examples of Information Security Incidents
  • What is Information Security Management?
  • Human Aspect of Information Security
  • Social Engineering

Day Two:  Information Security for Server Systems

  • Attacks for Personal Computers and Smart phones and counter measure
  • Information Security Risk Management
  • What is Risk Management process?
  • Identifying Information Assets
  • Identifying Security Risk and evaluation
  • Risk Treatment

Day Three: Security Risk management as an Organization

  • Information Security Governance
  • Information Security Management System (ISMS)
  • Information Security Policy, Standards and Procedures
  • Information Security Evaluation
  • Security Incident Response

Day Four: Information Security and Cryptography

  • Requirements for Secure Communication
  • What is Cryptography?
  • Classic and Modern Cryptography
  • Common Key Cryptography algorithms: DES, Triple DES, AES
  • Problems of Key distribution for Common Key Cryptography

Day Five: Data Integrity and Digital Signature

  • Integrity of Data
  • Hash Function
  • Digital Signature
  • Public Key Certificate and Public Key Infrastructure (PKI)
  • Certificate Authority

The Certificate

    Anderson Certificate of Completion will be provided to delegates who attend and complete the course

Info & In-house Solution

For more information about this course, call or email us at:

Call us: +971 4 365 8363

Email: info@anderson.ae

Request for a Tailor-made training and educational experience for your organization now:

Request for In-house

Callback Request

    Related Courses

    Callback Request

      Category/venue filter

      Share