120 likes | 237 Views
University of Nairobi C4DLab in Conjuction with ICT Authority. CyberSecurity Training. On Wed. 5 th – 7 th November , 2014. Chiromo Campus. CyberSecurity Training.
E N D
University of Nairobi C4DLab in Conjuction with ICT Authority CyberSecurity Training On Wed.5th – 7thNovember, 2014 Chiromo Campus
CyberSecurity Training The ICT sector is linked to economic growth, with specific contributions to competitiveness, poverty reduction and productivity.
CyberSecurity Training Information security (InfoSec) is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
CyberSecurity Training Organizations through technology collect, process, store and transmit a lot of data, some of which is confidential information about employees, customers, products, research and financial status. This information must be protected , otherwise governments, public and private institutions risk suffering widespread and irreparable financial & reputational damage.
CyberSecurity Training County governments, Ministries, Departments and Agencies (MDAs) need to be equipped with skills and resources to address the issue of information security. In particular the Division of Performance Contracting at the Ministry of Devolution and Planning while providing the performance contracting guidelines requires that
CyberSecurity Training “allMDAsare also required to put in place an Information Security Management System (ISMS) that ensures that access to information is appropriately authorized, safeguard the accuracy and completeness of information and processing methods and ensure that authorized users have access to information when they require it.”
CyberSecurity Training The University of Nairobi, through C4DLab, backed by the ICT Authority (ICTA), is offering leadership in improving the capacity of Kenyans in the area of Information Security.
B. Training Objectives This training will prove that the attendee has a good knowledge and understanding of the wide range of subject areas that make up information security and its management. Aspects in the training will include technical risks and corresponding management controls, risk and its management, security standards, people and physical security as well as business continuity.
B. Training Objectives Upon successful completion of the course, attendees should expect to gain knowledge and understanding in the following areas: • Knowledge of the concepts relating to information security and its management (confidentiality, integrity, availability, vulnerability, threats, risks, countermeasures, etc) • Appreciation of the current national policy and legal structure that impact upon information security management; • Awareness of developments of the national and international standards, frameworks and organizations which facilitate the management of information security;
B. Training Objectives • Understanding of the current business and common technical environments in which information security management has to operate; • A deep understanding of the relevant technical aspects of information security such as attacks, intrusion detection, mobile money security and Hacking USB devices • Knowledge of the categorization, operation and effectiveness of controls of different types and characteristics (examples will include computer forensics investigations
C. Target Audience IT Professionals in government and private sector interested in learning more about Information Security. The following job titles fit very well in this course: • Information security professionals • IT Security Managers • Cloud Security Professionals • IT Architects and Administrators • Risk Assessment Professionals
C. Target Audience • Database and Web Developers • Security Auditors and Compliance Managers • Network and System Administrator • Government & Intelligence Agencies interested in real world IT attack and defense • Technology Risk Assessment Professionals • Digital Forensics Investigators • Individuals involved in implementation, testing, security hardening of mobile devices