Certified Security Management Professional Training Course
Date | Format | Duration | Fees (GBP) | Register |
---|---|---|---|---|
07 Oct - 11 Oct, 2024 | Live Online | 5 Days | £1875 | Register → |
12 Nov - 14 Nov, 2024 | Live Online | 3 Days | £1455 | Register → |
09 Dec - 13 Dec, 2024 | Live Online | 5 Days | £1875 | Register → |
Date | Venue | Duration | Fees (GBP) | Register |
---|---|---|---|---|
14 Oct - 18 Oct, 2024 | Madrid | 5 Days | £4750 | Register → |
11 Nov - 15 Nov, 2024 | Kigali | 5 Days | £4150 | Register → |
09 Dec - 13 Dec, 2024 | New Delhi | 5 Days | £3950 | Register → |
Why Select this Training Course?
Security Management involves safeguarding an organisation’s assets, such as its people, information, technology, and infrastructure, from various threats and risks. It entails identifying vulnerabilities, implementing suitable controls, and continuously overseeing security measures to mitigate risks and prevent breaches. This encompasses activities like risk assessment, policy creation, access control, incident response planning, and security training, all aimed at preserving the confidentiality, integrity, and availability of resources while adhering to legal and industry standards.
This Rcademy Certified Security Management Professional Training Course will provide participants with a comprehensive guide to becoming successful security management professionals. The course covers the basic components of security management, thereby giving participants the relevant expertise and skills to undertake responsibilities in this area. Participants will acquire advanced skills in threat-risk assessments, security audits, identifying and prioritising security threats, threat mitigation, security mechanisms to reduce vulnerabilities, and a clear comprehension of security policies and organisational cybersecurity strategies.
What is the work of security management?
Security management encompasses the comprehensive protection of an organisation’s assets, including physical assets, intellectual property, reputation, and customer trust. It involves identifying and understanding potential risks, whether they originate from internal or external sources, and implementing strategies to mitigate them effectively. This includes developing and enforcing security policies and procedures, deploying technological solutions such as firewalls, encryption, and access controls, and establishing robust incident response plans to promptly and effectively address security breaches.
Security management also plays a crucial role in ensuring compliance with regulatory requirements and industry standards, such as GDPR, HIPAA, or ISO 27001, to protect sensitive data and maintain the trust of customers and stakeholders.
What are the levels of security?
Security levels represent the diverse layers of defence utilised to shield information and resources from unauthorised intrusion or harm. These levels serve as a multi-layered security framework, guaranteeing meticulous attention to various security aspects. These layers include physical, network, application, and data security.
Who should attend?
This Rcademy Certified Security Management Professional Training Course is suitable for:
- Security professionals who are tasked with the security of data, assets, and individuals.
- IT professionals who are tasked with security measures implementation.
- Managers and executives charged with security operations supervision.
- Compliance officers who are tasked with driving compliance to set regulations.
- Risk management professionals who are tasked with vulnerabilities and security risk
- Other Employees who are tasked with handling any information or assets that are sensitive in an organisation.
- Security consultants who are tasked with designing security strategies for organisations.
- Government officials who are tasked with handling security initiatives of the nation.
What are the course Objectives?
This Rcademy Certified Security Management Professional Training Course is designed to empower professionals to:
- Understand security basics and principles such as integrity and confidentiality.
- Recognise effective and efficient security advantages and impacts for organisational compliance and objectives.
- Understand how to identify, examine, and mitigate security risks.
- Learn how to comply with industry standards, relevant laws and regulations.
- Establish, drive, and enforce policies and procedures for security impacts.
- Design and implement plans to address security breaches and respond to emergencies.
- Develop acquaintance with technical security measures for protecting information and networks.
- Drive sensitisation for security programs to promote a culture of security consciousness.
How will this Course be Presented?
This Rcademy Certified Security Professional Training Course is participant-based and curated specifically to meet their expectations and grow their skills and knowledge. The training will be delivered using different approaches and techniques that ensure learning efficiency for the participants. Experts in the field with years of practice and experience will deliver the course, ensuring proficiency, quality and consistency. The modules are designed based on extensive research on the subject.
This Rcademy Certified Security Professional Training Course provides theoretical and practical learning approaches by providing lecture notes, slides on the subject, real-life scenarios, and lecture notes. Participants will also engage in seminars and workshops, quizzes, presentations, and constant feedback on the lessons learned.
What are the Topics Covered in this Course?
Module 1: Introduction to Security Management Procedures and Policies
- Purpose, concept and significance
- Classification of information
- Threat assessment
- Risk analysis and assessment
- Intrusion detection and control
- Access control policies
- Physical security management
Module 2: Systems and Mechanisms for Access Control
- Fundamentals of Access Control
- Access control models (DAC, MAC, RBAC)
- Methods of authentication (passwords, biometrics, tokens)
- Process authorisation
- Access Control Lists (ACLs)
- Implementation of Role-Based Access Control (RBAC)
- Integration of access control system
- Monitoring and auditing for access control
Module 3: Security Management Architecture
- Importance of security management architecture
- Architecture for building a comprehensive security management structure
- Managing user control
- Monitoring and reporting in security management
- Device controls
- Vulnerability identification
Module 4: Security Procedures and Policies
- Types of security procedures
- Components of security policies
- Strategies for policy implementation
- Mechanisms for policy enforcement
- Documentation of procedures
- Training programs for security awareness
- Auditing for policy compliance
- Update processes and policy review
Module 5: Risk Management and Assessment
- Techniques for threat modelling
- Assessing vulnerabilities
- Methodologies for risk analysis
- Risk treatment strategies
- Planning risk mitigation
- Monitoring risk and review
- Communicating and reporting risk
Module 6: Physical and Information Security Management
- Concept, objectives and benefits
- Types of physical threats
- Physical security best practices
- Fostering the appropriate organisational security culture
- A risk-based approach to physical security
- Establishing a physical security plan
- Information security management
- Information security management system (ISMS)
Module 7: Network Security Management, Technologies and Tools
- Network Security Management best practices
- Firewall technologies and configurations
- Network segmentation and email security
- Intrusion detection and prevention systems (IDS/IPS)
- Security information and event management (SIEM)
- Data loss prevention (DLP) solutions
- Encryption technologies (symmetric, asymmetric)
- Endpoint security solutions
- Security assessment and penetration testing tools
- Security monitoring and surveillance systems
Module 8: Cyber Security Management
- Meaning, concepts and evolution
- Types of cyber threats
- Cross-site scripting
- Data breach
- Spyware, malware and ransomware
- Cybersecurity management best practices
- Managing cyber risk, audit, and compliance
- Digital forensic investigations
- Management of cryptosystems
- Penetration testing
- Strong cyber defence
Module 9: Security Management Failures
- Meaning and types of security management failures
- Denial of service and distributed denial of service attacks
- Eavesdrop attack
- Malware attacks
- Causes of security management failures
- Inadequate security audit
- Poor maintenance of hardware and software.
- Inadequate security safety measures.
- Case studies:
- Yahoo in 2013
- eBay in 2014
- Facebook in 2018
- Czech Company Avast in 2019
Module 10: Legal and Compliance Aspects of Security
- Laws and regulations on security and privacy
- Private Security and Investigative Services Act (PSISA)
- Personal Information Protection and Electronic Documents Act (PIPEDA)
- Fire code
- Security compliance
- Tools and benefits
Module 11: Emerging Trends
- AI and Machine Learning Integration in Security Management
- Cyber-Physical Security Convergence (CPSC)
- Threat intelligence and cyber threat hunting
- DevSecOps integration
- Cybersecurity governance and risk management
- Zero-trust architecture implementation
- Cloud security management
- Privacy and data protection regulations