Security Management and Control (Deployment/Maintenance of Confidential Data)
Course: SMAC
Duration: 5 Days
Level: I
Course Summary
This 5-day course covers in detail aspects of the management
and control of confidential data. The course covers relevant
aspects of the deployment of confidential data, including
business drivers, risk assessment, planning, establishing
policies, as well as specific implementation, management,
and continuous improvement activities.
« Hide The Details
Topics Covered In This Course
Introduction
Business Drivers for Information Security
- Compliance
- Reputation
- Asset Protection
- Confidentiality
- Integrity
- Availability
- Risk Management
Defining Information Security
- Access Control
- Operations Management
- Communications Management
- Asset Classification and Control
- Network/Infrastructure Security
- Physical Security
- Compliance and Regulations
- Security Architecture
Risk Management
- Assessing Threats and Vulnerabilities
- Business Impact Analysis
- Defining Risks
- Risk Acceptance
- Transferring Risk
- Risk Mitigation
- Controls
- Risk Review
Information Security Management Systems
- Planning the Security Architecture
- Defining an Information Taxonomy
- Measuring Information Security
- Controlling Information
- Demonstrating Proof
- Continuous Improvement
Information Security Policies
- Defining Effective Security Policies
- Implementing Effective Security Policies
- Data Retention
- Definition of Controls
- Proving Effective Security Policies
Information Security Assessments
- Defining assessments and audits
- Forward schedule of audits
- Training and preparing for audits
- Conducting internal audits
- Audit Findings
- Audit Review and Continuous Improvement
Information Security Standards
- Overview of various information security standards
Information Security Processes
- Configuration Management
- Change Management
- Security Incident Management
- Availability Management
- IT Service Continuity Management
- Continuous Improvement
- Service Level Management
- Controls as Process Outputs
Information Security Communications and Awareness
- Planning Communications and Awareness Programs
- Executing Communications and Awareness Programs
- Maintaining Interest Through Communications and Awareness
Access Controls
- Authentication Methods
- Authorization
- Logging
- Monitoring
- Auditing
- Accounting
Best Practices
- Risk Management Best Practices
- Control Best Practices
- Management of Confidential Information Best Practices
- Deployment Best Practices
- Improvement Best Practices
Continuity and Confidential Information
Information Security Timeline
- Planning Activities
- Communications and Awareness Activities
- Implementation Activities
- Verification and Validation Activities
- Continuous Improvement Activities
Implementation of Controls
- Management of Controls
- Auditing Options
What You Can Expect
- Understand the need for deployment and maintenance of confidential
data
- Understand relevant regulatory and international standards
- Demonstrate implementation of effective policies, processes,
and controls
- Show effective techniques for implementing an information
security management system
- Provide options for auditing activities and techniques
- Introduce useful best practices for security management
and control
Who Should Take This Course
Staff responsible for designing and implementing an effective
means of controlling confidential information.
Training Style
Instructor-led participative lecture, with relevant group
activities.
« Hide The Details
Related Courses
Code |
Course Title |
Duration |
Level |
|
SECVE |
Securing the Virtual Environment |
3 Days |
I |
Details |
NCSECA |
Network and Computer Security Administration (CompTIA Security+) |
5 Days |
I |
Details |
FOREN1 |
Computer Forensics |
3 Days |
I |
Details |
INFSEC |
Information Security Management |
5 Days |
I |
Details |
SECZOS |
IP Security on z/OS |
4 Days |
II |
Details |
Every student attending a Verhoef Training class will receive
a certificate good for $100 toward their next public class taken
within a year.
You can also buy "Verhoef Vouchers" to get a discounted rate for a
single student in any of our public or web-based classes.
Contact your account manager or our sales office for details.
|