Search

Seminars

Information Security Management Systems (ISMS)



Introduction:


This course starts out with a detailed introduction to the various delivery models of cloud computing, ranging from Software as a Service (SaaS) to Infrastructure as a Service (IaaS) and everything in between. Each of these delivery models represent an entirely separate set of security conditions to consider, especially when coupled with various cloud types, including public, private and hybrid. An overview of security issues within each of these models will be covered with an in-depth discussion of the risks involved. This cloud security training course will go in-depth on architecture and infrastructure fundamentals for private, public and hybrid clouds, including a wide range of topics such as patch and configuration management, virtualization security, application security and change management. Policy, risk assessment and governance within cloud environments will also be covered, with recommendations for both internal policies and contract provisions. This path leads to a discussion of compliance and legal concerns. The first day will wrap up with disaster recovery and business continuity planning using cloud models and architecture. Essential security topics covered in this management track include: network fundamentals and applications, power, cooling and safety, architectural approaches to defense in depth, cyber-attacks, vulnerability assessment and management, security policies, contingency and continuity planning, awareness management, risk management analysis, incident handling, Web application security, offensive and defensive information warfare, culminating with our management practicum. The course will address:

 

  • What is information security management (ISM)
  • Why ISM is important to an organization
  • What are the benefits of ISM
  • What is the background of ISM
  • What are the key concepts and principles in ISO/IEC 27001:2013
  • The terms and definitions used
  • The main requirements of ISO/IEC 27001:2013

Course Objectives:


By the end of this course, delegates will be able to:

 

  • Build a risk-based assessment program for cloud providers’ controls
  • Understand the key areas to focus on in cloud contracts
  • Evaluate the various layers of cloud infrastructure
  • Develop a cloud disaster recovery and business continuity plan
  • Perform vulnerability assessments in a cloud environment
  • Integrate encryption and identity management services in a cloud environment
  • Improve your incident response and monitoring capabilities in the cloud

Who Should Attend?


IT Engineers, IT Professionals, IT Directors, Engineers, IT Project Managers, IT Auditors, IT Compliance Managers, IT Coordinators, IT Support Managers, IT Officers, IT Support Specialists, IT System Administration, Technical Support Professionals, Chief Information Officers, Chief Risk Officers, Information Assurance Officers, Program Managers, Network Systems Analysts, Government Program Managers, R&D Project Managers, Software and System Developers, Chief Security Officers, Security Specialists, Chief Information Security Officers, Directors of Security, Security Architects, Security Operation Center Managers, Security Consultants, Security Managers, Security Auditors, Security Directors, Systems Administrators, Incident Response Analysts, Business Owners, Security Analysts, Security Systems Engineer, Network Architect, Operations Managers, Risk Management Professionals, Network Administration Professionals, Application Developers, Application Support Analysts, Application Engineers, Associate Developers, Technology Officers, Information Officers, Help Desk Specialist, Help Desk Technician, Database Administrators, Network Architects, Network Engineers, Network System Administrators, System Analysts, System Architects, System Designers

Course Outline:


 Information Security Governance

  • Key information security concepts and components
  • Defining governance
  • Outcomes, objectives, & goals
  • Basic concepts
  • Key drivers affecting the enterprise and the impact they have on security
  • Implementation metrics
  • Information security strategy development
  • Relevant information security policies, standards, frameworks, & issuing bodies

 

Risk, Audit and Assessment for the Cloud

  • Risk management
  • Auditing the cloud
  • Remote
  • Onsite

 

Information Risk Management

  • Risk management concepts and frameworks
  • Threat & vulnerability identification
  • Risk assessment analysis, methodologies, & risk treatment options
  • Systematic & structured information risk assessment processes
  • Information security controls & countermeasures
  • Risk, threat, & vulnerability identification & management life cycle

 

Data Security in the Cloud

  • Encryption types and availability
  • Key management and encryption architectures
  • Data/information lifecycle
  • Retention
  • Disposal
  • Classification

 

Identity and Access Management (IAM)

  • IAM architecture and relevance to the cloud
  • Authentication and authorization standards
  • Account management and provisioning
  • Federation

 

Intrusion Detection and Incident Response

  • Incident detection for different cloud models
  • Managing intrusion detection system/intrusion prevention system (IDS/IPS) and alerting
  • The event management feedback loop

 

Security Testing

  • Cloud Audit A6
  • Assessments for the cloud
  • Penetration testing the cloud
  • Internal assessments

COURSE LOCATIONS

Code From To City Fee
IT20 17 Feb 2020 21 Feb 2020 Kuala Lumpur US$ 4500 Book
IT20 26 Apr 2020 30 Apr 2020 Dubai US$ 4200 Book
IT20 01 Jun 2020 05 Jun 2020 London US$ 5000 Book
IT20 17 Aug 2020 21 Aug 2020 Bali US$ 5500 Book
IT20 26 Oct 2020 30 Oct 2020 Shanghai US$ 5500 Book
IT20 14 Dec 2020 18 Dec 2020 New Delhi US$ 6000 Book


DUBAI OFFICE

Ittihad Deira Building,
Al Ittihad Rd, Deira
Dubai,
UAE

info@petrogas-training.com

USA OFFICE

642 E14 Street,
10009-13 Manhattan,
New York (NY)
USA

info@petrogas-training.com

EGYPT OFFICE

52 General Kamal Hejab Street,
Suez Bridge,
Cairo,
Egypt

info@petrogas-training.com
 

COURSE CERTIFICATE

Certificate of Completion will be provided to the candidate(s) who successfully attend and complete the course. Training hours attendance percentage of 75% is required.


TRAINING HOURS

Standard course hours: 8:30 A.M. to 3:30 P.M. Informal discussions: 4:30 P.M. to 5:30 P.M.


TRAINING METHODOLOGY

We use a blend of interactive and hands-on methods, active participation, a variety of instructional techniques, dynamic presentations, individual and group exercises, in depth discussion, DVD’s, role-plays, case studies, examples. All of the information, competencies, knowledge and skills acquired within our training programs, are 100% transferrable to the participants’ workplace.


ASSESSMENT & EVALUATION

Pre-Test and Post-Test Assessment are applied on 5-day and 10-day programs. Also, post course evaluation and candidate’s evaluation are applied to add another level of quality measurement. Candidates’ feedback is highly appreciated to elevate the training service quality.


ORGANIZATIONAL IMPACT

A- Have staff trained in the latest training and development approaches

B- Support nationalization and talent management initiatives

C- Have properly trained and informed people who will be able to add value

D- Gain relevant technical knowledge, skills and competencies


PERSONAL IMPACT

A- Develop job related skills

B- Develop personal skills in subject matter

C- Have a record of your growth and learning results

D- Bring proof of your progress back to your organization

F- Become competent, effective and productive

G- Be more able to make sound decisions

H- Be more effective in day to day work by mastering job-related processes

I- Create and develop competency to perform job well


FREQUENT NOMINATIONS SCHEME

A- 10% discount after 05 candidates’ registration.

B- 15% discount after 10 candidates’ registration.    

C- 20% discount after 20 candidates’ registration.

D- 25% discount after 25 candidates’ registration.

E- 30% discount after 30 candidates’ registration

F- Higher discount rates will be offered based on work volume with different clients.  


SEVERAL NOMINATIONS ON THE SAME COURSE SCHEME

A- One extra free seat is offered on 4 candidates on the same course and dates.

B- Two extra free seats are offered on 6 candidates on the same course and dates.

C- Three extra free seats are offered on 8 candidates on the same course and dates.

D- Four extra free seats are offered on 10 candidates on the same course and dates.

E- Five extra free seats are offered on 12 candidates on the same course and dates.


REGISTRATION POLICY

Nominations to our public courses are to be processed by the client’s Training and/or HR departments. A refund will be issued back to the client in the event of course cancellation or seat unavailability. A confirmation will be issued to the relevant department official(s). 


CANCELLATION POLICY

If a confirmed registration is cancelled less than 5 working days prior to the course start date, a substitute participant may be nominated to attend the same course or a 20% cancellation charge is applied. In case of a no-show, a 100% fee will be charged.


PAYMENT POLICY

Payment is due upon receiving the course confirmation, invoice and/or proforma invoice. However; the fee due can be wire transferred to our bank account directly after course completion. Our bank details are illustrated on the confirmation, invoice and proforma invoice, as well. The above documents can be communicated electronically, i.e., in a soft copy or/and in hard copy based on customer’s request.


COPYRIGHT

© 2017. Material published by PETROGAS shown here is copyrighted. © 2017. All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing in any medium, transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.