A Highly Interactive Training Course On

Information Security Management

The Recipe for Insuring your Privacy

Information Security Management
Course Schedule

CLASSROOM

12-16 May 2025
London
$5,950
11-15 Aug 2025
Dubai
$5,950
08-12 Dec 2025
Dubai
$5,950
Certificate
  • Coventry Academy Certificate of Attendance will be provided to delegates who attend and complete the course.

Training Overview

Training Overview

Information is essential to the functioning of any organization—without it, operations would be significantly hindered and eventually come to a halt. Information equals knowledge, and knowledge equates to power. With the rapidly evolving landscape of technology and the growing number of both technical and human threats, the need for skilled security personnel to safeguard our information is becoming an increasingly critical responsibility.

Information is vulnerable to a variety of threats, including legal, electronic, physical, internal, and external risks. It is crucial that security and management professionals understand the risks, controls, and countermeasures available to protect information and technology within a strong management framework. Additionally, this Information Security Management training course will focus on utilizing countermeasures, best practices, and management strategies to mitigate electronic and physical risks, ultimately strengthening the protection of the organization.

What are the goals?

By the end of training course, participants will be able to:

  • Gain knowledge of the concepts relating to information security management (confidentiality, integrity, availability, vulnerability, threats, risks, counter measures, etc.)
  • Understand the current legislation and regulations which impact upon information security management
  • Be fully Aware of current national and international standards such as ISO 27002, frameworks and organisations which facilitate the management of information security
  • Understand the current business and common technical environments in which information security management has to operate
  • Gain knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics

Who is this Training Course for?

This training course is suitable for a wide range of professionals but will greatly benefit individuals responsible for:

  • Risk Management
  • IT Security and IT Security Auditing
  • Technical IT Management
  • Those with involvement of systems integration and corporate IT development
  • Financial controllers with a technical interest may also benefit from the seminar

How will this Training Course be Presented?

This Information Security Management training course will utilise a variety of proven adult learning techniques to ensure maximum understanding, comprehension and retention of the information presented. Participants will gain detailed knowledge by active participation in seminars, group discussions and real-life case studies. Delivery will be by presentation, group syndicate investigations, training videos and interactive seminars.

The Course Content

Day One:  Overview of Information Security
  • What is Information Security?
  • Examples of Information Security Incidents
  • What is Information Security Management?
  • Human Aspect of Information Security
  • Social Engineering
Day Two: Information Security for Server Systems
  • Attacks for Personal Computers and Smart phones and counter measure
  • Information Security Risk Management
  • What is Risk Management process?
  • Identifying Information Assets
  • Identifying Security Risk and evaluation
  • Risk Treatment
Day Three: Security Risk management as an Organization
  • Information Security Governance
  • Information Security Management System (ISMS)
  • Information Security Policy, Standards and Procedures
  • Information Security Evaluation
  • Security Incident Response
Day Four: Information Security and Cryptography
  • Requirements for Secure Communication
  • What is Cryptography?
  • Classic and Modern Cryptography
  • Common Key Cryptography algorithms: DES, Triple DES, AES
  • Problems of Key distribution for Common Key Cryptography
Day Five: Data Integrity and Digital Signature
  • Integrity of Data
  • Hash Function
  • Digital Signature
  • Public Key Certificate and Public Key Infrastructure (PKI)
  • Certificate Authority