Information Security Foundation
Our Ration for the course : 4.7 Start Based on 28 users
Learning about the various security measures
You will get knowledge about the concept, importance and the reliability of information.
Provide understanding of the measures that need to be taken.
Create awareness among the employees
You will get aware of the most important legislation and regulations
Name of Course | Scheduled Dates | Vanue | Registration Link |
---|---|---|---|
Information Security Foundation | To be determined | Beirut, Lebanon | Registration Now |
Information Security Foundation | To be determined | Abu Dhabi, UAE | Registration Now |
Information Security Foundation | To be determined | Chennai, India | Registration Now |
Information Security Foundation | To be determined | Muscat, Oman | Registration Now |
Information Security Foundation | To be determined | Riyadh, Saudi Arabia | Registration Now |
Information Security Foundation | To be determined | Kuwait City, Kuwait | Registration Now |
Information Security Foundation | To be determined | Baghdad, Iraq | Registration Now |
Information Security Foundation | To be determined | Jeddah, Suadi Arabia | Registration Now |
Information Security Foundation | To be determined | Tehran, Iran | Registration Now |
Information Security Foundation | To be determined | Cairo, Egypt | Registration Now |
Information Security Foundation | To be determined | Manama, Bahrain | Registration Now |
Information Security Foundation | To be determined | Abu Dhabi, UAE | Registration Now |
Information Security Foundation | To be determined | Chennai, India | Registration Now |
Information Security Foundation | To be determined | Dubai, UAE | Registration Now |
Information Security Foundation | To be determined | Chennai, India | Registration Now |
Information Security Foundation | To be determined | Dubai, UAE | Registration Now |
Information Security Foundation | To be determined | Abu Dhabi, UAE | Registration Now |
Information Security Foundation | To be determined | Abu Dhabi, UAE | Registration Now |
Information Security is gaining importance in Information Technology (IT). Globalization of the economy leads to a growing exchange of information between organizations (their employees, customers, and suppliers) and growing use of networks, such as the internal company network, connection with the networks of other companies, and the Internet. Furthermore, the activities of many companies now rely on IT, and information has become a valuable asset. Protection of information is crucial for the continuity and proper functioning of the organization: information must be reliable. In the Information Security Foundation, the basic concepts of information security and their coherence are tested. EXIN Information Security Foundation is part of the Certified Integrator program and is one of the prerequisites to attain the title: EXIN Certified Integrator Secure Cloud Services.
Delegates will specifically learn:
- Information and security: the concept, the value, the importance, and the reliability of information;
- Threats and risks: the concepts of threat and risk and the relationship with the reliability of information;
- Approach and organization: the security policy and security organization including the components of the security organization and management of (security) incidents;
- Measures: the importance of security measures including physical, technical, and organizational measures and;
- Legislation and regulations: the importance and impact of legislation and regulations
Information, security and architecture
- Fundamental principles of security
- Due care and due diligence
- Information
- Information management
- Secure information systems design
- Operational processes and information
- Information architecture
Security management
- Security definitions
- Assessing security risks
- Mitigating security risks
- Risk management
- Risk analysis
- Countermeasures to mitigate the risk
- Types of threats
- Types of damage
- Types of risk strategies
- Guidelines for implementing security measures
Business assets and information security incidents
- Introduction
- What are business assets?
- Managing business assets
- Classification of information
- Managing information security incidents
- Roles
Physical measures
- Introduction
- Physical security
- Protection rings
- The outer ring
- The building
- The working space
- The object
- Alarms
- Fire protection
Technical measures (IT security)
- Introduction
- Computerized information systems
- Logical access control
- Security requirements for information systems
- Cryptography
- Types of cryptographic systems
- Security of system files
- Information leaks
- Cryptography policy
- Organizational measures
- Introduction
- Security policy
- Personnel
- Business continuity management
Managing communication and operating processes
- Operating procedures and responsibilities
- Change management
- Segregation of duties
- Development, testing, acceptance and production
- Management of services by a third party
- Protection against malware, phishing and spam
- Some definitions
- Back-up and restore
- Managing network security
- Handling media
- Mobile equipment
- Exchanging information
- Services for e-commerce
- Publically available information
Law, regulations and standards
- Introduction
- Observance of statutory regulations
- Compliance
- Intellectual property rights (IPR)
- Protecting business documents
- Protecting data and the confidentiality of personal data
- Preventing abuse of IT facilities
- Observing security policy and security standards
- Monitoring measures
- Information system audits
- Protecting tools used for auditing information systems
- Standards and standards organizations
Participants will be able to acquire EXIN Certificate for Information Security Foundation upon completion of the course and passing successfully of the examination.
Exam Details
Number of multiple-choice questions: 40
Pass mark: 65% (26 out of 40)
Open book: no
Electronic equipment allowed: no
-
IT Administrator
-
IT Network Engineer
-
IT Technical Staff
-
IT Network Security officers
-
End User Support Staff
To enroll or register to any training course, you can use the registration page from training page or fill the request a call back form from each course pages.
The following page will provide you a list of course and training that we are providing based on the category and from each course item you can see the course details.
URL: https://nbizinfosol.twtests.co.in/training.aspx
Another method is to fill a Request a call back form provided in each Training/Course pages.
We are providing course materials during training and completion certificate after succesful training.
Yes. you can fill the registration form avaialble in the website or you can directly call us to enroll the course.Our executives will guide you to do further steps.
Based upon the course you are enrolling, we will charge the exam fee . We will give you the details of course fee and exam fee anytime to clear it.
Yes. We are providing the Course completion certificate for all courses we are providing.
Yes. We will provide assistance and support to apply for any exam.
Two types of payment available:
1. Visit our office and pay direct,You are always welcome to Nbizinfosol.
2. We are providing online payment via paypal payment gateway.Based upon your request we will provide the link to access the payment page.