1 / 12

University of Nairobi C4DLab in Conjuction with ICT Authority

University of Nairobi C4DLab in Conjuction with ICT Authority. CyberSecurity Training. On Wed. 5 th – 7 th November , 2014. Chiromo Campus. CyberSecurity Training.

Download Presentation

University of Nairobi C4DLab in Conjuction with ICT Authority

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. University of Nairobi C4DLab in Conjuction with ICT Authority CyberSecurity Training On Wed.5th – 7thNovember, 2014 Chiromo Campus

  2. CyberSecurity Training The ICT sector is linked to economic growth, with specific contributions to competitiveness, poverty reduction and productivity.

  3. CyberSecurity Training Information security  (InfoSec) is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.

  4. CyberSecurity Training Organizations through technology collect, process, store and transmit a lot of data, some of which is confidential information about employees, customers, products, research and financial status.  This information must be protected , otherwise governments, public and private institutions risk suffering widespread and irreparable financial & reputational damage.

  5. CyberSecurity Training County governments, Ministries, Departments and Agencies (MDAs) need to be equipped with skills and resources to address the issue of information security. In particular the Division of Performance Contracting at the Ministry of Devolution and Planning while providing the performance contracting guidelines requires that

  6. CyberSecurity Training “allMDAsare also required to put in place an Information Security Management System (ISMS) that ensures that access to information is appropriately authorized, safeguard the accuracy and completeness of information and processing methods and ensure that authorized users have access to information when they require it.”

  7. CyberSecurity Training The University of Nairobi, through C4DLab, backed by the ICT Authority (ICTA), is offering leadership in improving the capacity of Kenyans in the area of Information Security.

  8. B. Training Objectives This training will prove that the attendee has a good knowledge and understanding of the wide range of subject areas that make up information security and its management. Aspects in the training will include technical risks and corresponding management controls, risk and its management, security standards, people and physical security as well as business continuity.

  9. B. Training Objectives Upon successful completion of the course, attendees should expect to gain knowledge and understanding in the following areas: • Knowledge of the concepts relating to information security and its management (confidentiality, integrity, availability, vulnerability, threats, risks, countermeasures, etc) • Appreciation of the current national policy and legal structure that impact upon information security management; • Awareness of developments of the national and international standards, frameworks and organizations which facilitate the management of information security;

  10. B. Training Objectives • Understanding of the current business and common technical environments in which information security management has to operate; • A deep understanding of the relevant technical aspects of information security such as attacks, intrusion detection, mobile money security and Hacking USB devices • Knowledge of the categorization, operation and effectiveness of controls of different types and characteristics (examples will include computer forensics investigations

  11. C. Target Audience IT Professionals in government and private sector interested in learning more about Information Security. The following job titles fit very well in this course: • Information security professionals • IT Security Managers • Cloud Security Professionals • IT Architects  and Administrators • Risk Assessment Professionals

  12. C. Target Audience • Database and Web Developers • Security Auditors and Compliance Managers • Network and System Administrator • Government & Intelligence Agencies interested in real world IT attack and defense • Technology Risk Assessment Professionals • Digital Forensics Investigators • Individuals involved in implementation, testing, security hardening of mobile devices

More Related