Skip to main content

Information Security Foundation

Our Ration for the course : 4.7 Start Based on 28 users

Learning about the various security measures

You will get knowledge about the concept, importance and the reliability of information.

Provide understanding of the measures that need to be taken.

Create awareness among the employees

You will get aware of the most important legislation and regulations

Name of Course Scheduled Dates Vanue Registration Link
Information Security Foundation To be determined Beirut, Lebanon Registration Now
Information Security Foundation To be determined Abu Dhabi, UAE Registration Now
Information Security Foundation To be determined Chennai, India Registration Now
Information Security Foundation To be determined Muscat, Oman Registration Now
Information Security Foundation To be determined Riyadh, Saudi Arabia Registration Now
Information Security Foundation To be determined Kuwait City, Kuwait Registration Now
Information Security Foundation To be determined Baghdad, Iraq Registration Now
Information Security Foundation To be determined Jeddah, Suadi Arabia Registration Now
Information Security Foundation To be determined Tehran, Iran Registration Now
Information Security Foundation To be determined Cairo, Egypt Registration Now
Information Security Foundation To be determined Manama, Bahrain Registration Now
Information Security Foundation To be determined Abu Dhabi, UAE Registration Now
Information Security Foundation To be determined Chennai, India Registration Now
Information Security Foundation To be determined Dubai, UAE Registration Now
Information Security Foundation To be determined Chennai, India Registration Now
Information Security Foundation To be determined Dubai, UAE Registration Now
Information Security Foundation To be determined Abu Dhabi, UAE Registration Now
Information Security Foundation To be determined Abu Dhabi, UAE Registration Now

Information Security is gaining importance in Information Technology (IT). Globalization of the economy leads to a growing exchange of information between organizations (their employees, customers, and suppliers) and growing use of networks, such as the internal company network, connection with the networks of other companies, and the Internet. Furthermore, the activities of many companies now rely on IT, and information has become a valuable asset. Protection of information is crucial for the continuity and proper functioning of the organization: information must be reliable. In the Information Security Foundation, the basic concepts of information security and their coherence are tested. EXIN Information Security Foundation is part of the Certified Integrator program and is one of the prerequisites to attain the title: EXIN Certified Integrator Secure Cloud Services.

Delegates will specifically learn:

  • Information and security: the concept, the value, the importance, and the reliability of information;
  • Threats and risks: the concepts of threat and risk and the relationship with the reliability of information;
  • Approach and organization: the security policy and security organization including the components of the security organization and management of (security) incidents;
  • Measures: the importance of security measures including physical, technical, and organizational measures and;
  • Legislation and regulations: the importance and impact of legislation and regulations
Learning Level:  
Basic
Duration:  
1 day

Information, security and architecture

  • Fundamental principles of security
  • Due care and due diligence
  • Information
  • Information management
  • Secure information systems design
  • Operational processes and information
  • Information architecture

Security management

  • Security definitions
  • Assessing security risks
  • Mitigating security risks
  • Risk management
  • Risk analysis
  • Countermeasures to mitigate the risk
  • Types of threats
  • Types of damage
  • Types of risk strategies
  • Guidelines for implementing security measures

Business assets and information security incidents

  • Introduction
  • What are business assets?
  • Managing business assets
  • Classification of information
  • Managing information security incidents
  • Roles

Physical measures

  • Introduction
  • Physical security
  • Protection rings
  • The outer ring
  • The building
  • The working space
  • The object
  • Alarms
  • Fire protection

Technical measures (IT security)

  • Introduction
  • Computerized information systems
  • Logical access control
  • Security requirements for information systems
  • Cryptography
  • Types of cryptographic systems
  • Security of system files
  • Information leaks
  • Cryptography policy
  • Organizational measures
  • Introduction
  • Security policy
  • Personnel
  • Business continuity management

Managing communication and operating processes

  • Operating procedures and responsibilities
  • Change management
  • Segregation of duties
  • Development, testing, acceptance and production
  • Management of services by a third party
  • Protection against malware, phishing and spam
  • Some definitions
  • Back-up and restore
  • Managing network security
  • Handling media
  • Mobile equipment
  • Exchanging information
  • Services for e-commerce
  • Publically available information

Law, regulations and standards

  • Introduction
  • Observance of statutory regulations
  • Compliance
  • Intellectual property rights (IPR)
  • Protecting business documents
  • Protecting data and the confidentiality of personal data
  • Preventing abuse of IT facilities
  • Observing security policy and security standards
  • Monitoring measures
  • Information system audits
  • Protecting tools used for auditing information systems
  • Standards and standards organizations

 

Participants will be able to acquire EXIN Certificate for Information Security Foundation upon completion of the course and passing successfully of the examination.

Exam Details

Number of multiple-choice questions: 40
Pass mark: 65% (26 out of 40)
Open book: no
Electronic equipment allowed: no

  • doodles

    IT Administrator

  • doodles

    IT Network Engineer

  • doodles

    IT Technical Staff

  • doodles

    IT Network Security officers

  • doodles

    End User Support Staff

To enroll or register to any training course, you can use the registration page from training page or fill the request a call back form from each course pages. The following page will provide you a list of course and training that we are providing based on the category and from each course item you can see the course details.
URL: https://nbizinfosol.twtests.co.in/training.aspx
Another method is to fill a Request a call back form provided in each Training/Course pages.

We are providing course materials during training and completion certificate after succesful training.

Yes. you can fill the registration form avaialble in the website or you can directly call us to enroll the course.Our executives will guide you to do further steps.

Based upon the course you are enrolling, we will charge the exam fee . We will give you the details of course fee and exam fee anytime to clear it.

Yes. We are providing the Course completion certificate for all courses we are providing.

Yes. We will provide assistance and support to apply for any exam.

Two types of payment available:

1. Visit our office and pay direct,You are always welcome to Nbizinfosol.
2. We are providing online payment via paypal payment gateway.Based upon your request we will provide the link to access the payment page.