Security Management and Control (Deployment/Maintenance of Confidential Data)

Course:  SMAC
Duration:  5 Days
Level:  I
Course Summary

This 5-day course covers in detail aspects of the management and control of confidential data. The course covers relevant aspects of the deployment of confidential data, including business drivers, risk assessment, planning, establishing policies, as well as specific implementation, management, and continuous improvement activities.

« Hide The Details
Topics Covered In This Course

Introduction

Business Drivers for Information Security

  • Compliance
  • Reputation
  • Asset Protection
  • Confidentiality
  • Integrity
  • Availability
  • Risk Management

Defining Information Security

  • Access Control
  • Operations Management
  • Communications Management
  • Asset Classification and Control
  • Network/Infrastructure Security
  • Physical Security
  • Compliance and Regulations
  • Security Architecture

Risk Management

  • Assessing Threats and Vulnerabilities
  • Business Impact Analysis
  • Defining Risks
  • Risk Acceptance
  • Transferring Risk
  • Risk Mitigation
  • Controls
  • Risk Review

Information Security Management Systems

  • Planning the Security Architecture
  • Defining an Information Taxonomy
  • Measuring Information Security
  • Controlling Information
  • Demonstrating Proof
  • Continuous Improvement

Information Security Policies

  • Defining Effective Security Policies
  • Implementing Effective Security Policies
  • Data Retention
  • Definition of Controls
  • Proving Effective Security Policies

Information Security Assessments

  • Defining assessments and audits
  • Forward schedule of audits
  • Training and preparing for audits
  • Conducting internal audits
  • Audit Findings
  • Audit Review and Continuous Improvement

Information Security Standards

  • Overview of various information security standards

Information Security Processes

  • Configuration Management
  • Change Management
  • Security Incident Management
  • Availability Management
  • IT Service Continuity Management
  • Continuous Improvement
  • Service Level Management
  • Controls as Process Outputs

Information Security Communications and Awareness

  • Planning Communications and Awareness Programs
  • Executing Communications and Awareness Programs
  • Maintaining Interest Through Communications and Awareness

Access Controls

  • Authentication Methods
  • Authorization
  • Logging
  • Monitoring
  • Auditing
  • Accounting

Best Practices

  • Risk Management Best Practices
  • Control Best Practices
  • Management of Confidential Information Best Practices
  • Deployment Best Practices
  • Improvement Best Practices

Continuity and Confidential Information

Information Security Timeline

  • Planning Activities
  • Communications and Awareness Activities
  • Implementation Activities
  • Verification and Validation Activities
  • Continuous Improvement Activities

Implementation of Controls

  • Management of Controls
  • Auditing Options
What You Can Expect
  • Understand the need for deployment and maintenance of confidential data
  • Understand relevant regulatory and international standards
  • Demonstrate implementation of effective policies, processes, and controls
  • Show effective techniques for implementing an information security management system
  • Provide options for auditing activities and techniques
  • Introduce useful best practices for security management and control
Who Should Take This Course

Staff responsible for designing and implementing an effective means of controlling confidential information.

Training Style

Instructor-led participative lecture, with relevant group activities.

« Hide The Details
Related Courses
Code Course Title Duration Level
SECVE
Securing the Virtual Environment
3 Days
I
Details
NCSECA
Network and Computer Security Administration (CompTIA Security+)
5 Days
I
Details
FOREN1
Computer Forensics
3 Days
I
Details
INFSEC
Information Security Management
5 Days
I
Details
SECZOS
IP Security on z/OS
4 Days
II
Details

Every student attending a Verhoef Training class will receive a certificate good for $100 toward their next public class taken within a year.

You can also buy "Verhoef Vouchers" to get a discounted rate for a single student in any of our public or web-based classes. Contact your account manager or our sales office for details.

Schedule For This Course
There are currently no public sessions scheduled for this course. We can schedule a private class for your organization just a couple of weeks from now. Or we can let you know the next time we do schedule a public session.
Notify me the next time this course is confirmed!
Can't find the course you want?
Call us at 800.533.3893, or
email us at [email protected]