IT Security Practices

    IT & Information Security Management Education

    The information and communication technology evolution, the increasing use of ICT systems and online services generate new risks for organisations at large. Regulations require information systems and process re-engineering in order to comply with governance principles and to manage operational risks.

     

    The knowledge requirements are covered during this module and presented by industry experts. The course material is based on the body of knowledge (CBK) required for CISSP certification (Certified Information Systems Security Professional).

    Interested in enrolling in the module?

    Submit your contact details

    and we will shortly get back to you!

    Practicalities

    English

    1 day/week (evening class)

    Every Monday, from April to June 2019.

    2500 €
    (VAT.excl.)

    Discounts apply for multiple registration

    What will you learn

    At the end of the module, you should be able to:

    To meet a growing demand in knowledge in the ever-expanding security field.

    To broaden your current knowledge of security concepts and practices.

    To demonstrate practical and working knowledge of information security.

    To offer a career differentiator with enhanced credibility and marketability.

    To be able to discuss security topics with expert lecturers and understand not only the theory but the practice as well.

    To allow you to communicate with security professionals specialised in one specific domain (eg. IAM) based on an industry recognised vocabulary.

    Understand the fundamentals of Cybersecurity

    Sessions

    Introduction to the module.
    Fundamentals - System & Network Security.
    Fundamentals - Cryptography.
    Fundamentals - Application-Level Security.
    Fundamentals - Identity Management & Access Control.
    Legal, Regulations, Compliance Aspects.
    Physical (Environmental) Security.
    Business Continuity & Disaster Recovery.
    Security Architecture & Design.
    Operations Security.
    The module is concluded by an assessment (multiple choice questionnaire, short assignment, workshop, report writing and/or presentation before a panel jury) to validate its completion.

    Topic Leader
    Erik R. van Zuuren

    Image

    As a Topic Leader, Erik's objective for this module is to ensure that all participants get practical sessions in which they receive an as broad as possible understanding on Information Security Technologies and Practices enabling them to interface with their peers, with CSOs or CIOs and understand the very broad picture and the many dimensions to keep an eye on and really grow in this field of expertise while giving correct advice to their respective organisations.

    Edit Page

    Connect with us

    Avenue Louise 479/58, 1050 Bruxelles.

    • dummy+32 2 340 32 00

    • dummy admin@atayapartners.com

    Search