IT, Telecommunication , Networking Training Courses

Information Security Management

Duration
2025-10-19 5 Days 2025-10-23
Attendance

Hotel Meeting Room

Hotel Meeting Room
Course code
IT-665
Copied !
City / venue
Kuwait

Classroom

Fees / hours
2750 $ | 25 Hours

Course registration form

Candidate Data

Candidate full name *
Email *
Private phone number *

Work phone number

Optional

Country & City *
Company / Employer *

Invoice Recipient Data

Recipient name *
Recipient phone number *
work phone number *

Recipient email

Optional

Recipient work address details

Optional



Sending course brochure to my e-mail

Please leave us your contacts, and we will call you back as soon as possible

Full name *
Email *

Private phone number

Optional



Call me back

Please leave us your contacts, and we will call you back as soon as possible

Full name *
Private phone number *
Company / Employer *


Course Inquiry

Please provide us with your contacts with your inquiry, and we will answer it as soon as possible

Full name *
Email *
Private phone number *
work phone number *
Country & City *
Company / Employer *

Your Inquiry



In-house proposal

Please provide us with your contacts and the details of the needed in-house proposal, and we will contact you as soon as possible

Full name *
Email *
Private phone number *
work phone number *
Country & City *
Company / Employer *

Your Inquiry



Course details

Overview ?

The Course

Information is the lifeblood to all organisations, without with it would be severally impacted and ultimately cease to function. Information is knowledge and knowledge is power. With an ever changing climate of technology and threats (both technical and human), the need for trained security personnel to protect our information becomes increasingly critical evolutionary task.

Information is at risk from many sources, legal, electronic, physical, internal and external to mention a few. It is paramount that security and related management personnel have an understanding of the risks, controls and countermeasures that are available to secure information and technology within an effective management framework. Furthermore utilising countermeasures, best practice and management techniques will mitigate electronic and physical risks and enhance protection to an organisation.

The Goals
On successful completion of the seminar, delegates will be able to have:
  • Knowledge of the concepts relating to information security management (confidentiality, integrity, availability, vulnerability, threats, risks, counter measures, etc).
  • Understanding of current legislation and regulations which impact upon information security management.
  • Awareness of current national and international standards such as ISO 27002, frameworks and organisations which facilitate the management of information security.
  • Understanding of the current business and common technical environments in which information security management has to operate.
  • Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.
The Delegates

The seminar has been designed for individuals responsible for Risk Management, IT Security and IT Security Auditing, Technical IT Management and those with involvement of systems integration and corporate IT development. Financial controllers with a technical interest may also benefit from the seminar.

The Process

Participants will gain detailed knowledge by active participation in seminars, group discussions and real life case studies.

Delivery will be by presentation, group syndicate investigations, training DVD and interactive seminars.

The Benefits

The seminar will provide delegates with an understanding of IT Security Management and the commercial challenges which are faced on a daily basis, and how these are exploited. Furthermore, delegates will be able to appreciate placement of security controls within IT Systems and Networks and how these can be effectively implemented and audited, to ensure full system reliability, scalability and security. At the conclusion of the seminar delegates will be able to appraise risk, recommend security controls and develop an appropriate IT Security Management Approach applicable to their organisation culture and ethos.

The Results

Organisations will be better educated in relation to risks and will be able to adopt justified procedures for the security of their systems, within an appropriate Information Security Management Framework. This in turn will allow executives to place good reliance on controls which safeguard information and business processes. Being able to adapt current best practice in accordance with International Standards will ensure that companies benefit from leading solutions.

The Course Content
Day One
Information Security Management - An Overview
  • IT Risk Management
    • Categorising Physical and Electronic Risk
  • IT and Networks
  • Computer Systems Design
  • Legal and Regulatory Considerations
  • Information, Business and Risk – Case Study
Day Two
Information Security Management
  • Ensuring Information Security
  • Confidentiality
  • Integrity
  • Availability
  • Authenticity
  • Non Repudiation of Data
  • Ethical hacking and Industrial Espionage
  • Where to design and place effective computer and management controls
  • Case Study
Day Three
Information Management – International Standards
  • Code or Practice for Information Security Management – ISO 17799 / ISO27002
  • Best Practice and Implementing Guidance and Controls For ISO27002
  • Information Security Management Overview
  • Risk Assessment and Controls
  • Security Policy Documentation
  • Organising Information Security Management
  • IT Asset Management
  • Personnel and Human Resources
Day Four
Information Management ISO27002
  • Best Practice and Implementing Guidance and Controls For ISO27002
  • Physical and Environmental Security
  • Operations Management and Communications
  • Access Control
  • Information Systems (Design, Development, Maintenance)
  • Incident Management
  • Business Continuity
  • Regulatory Compliance
  • Best Practice and Implementation Guidance for BS ISO/IEC 38500:2008 – IT Management
  • Case Study
Day Five
Implementing Effective Information Security Management Frameworks
  • Successful steps for IT Security Management
  • Audit and Compliance for IT Resources
  • Business Process Engineering
  • Case Study

Day 1

Asset Cost Management Introduction

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 2

Laying the Groundwork

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 3

Applying the Value based Process

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 4

Ensuring the Continuity of the Value-based Process

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 5

Supporting Process that Lower Life-cycle costs

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Training Methodology

Pathways Training and consulting adopts the newest techniques of human resources Training and consulting and, with the following:

  • Theoretical lectures are delivered via PowerPoint and visual displays (videos and short films)
  • Making scientific evaluation to the trainee (before and after)
  • Brainstorming and role-playing
  • Using case studies related to the scientific material being delivered and the trainees' work.
  • The participants get the scientific and practical material printed and on CDs and Flash memories.
  • Preparing records and reports of the participants' attendance and results, with a general evaluation of the training program.
  • A group of the best trainers and experts in all fields and specialties professionally prepares the scientific material.
  • After finishing the course, the participants get certificates of attendance signed, certified, and issued by pathways Training and consulting.
  • Our training programs start at 9:00 o'clock in the morning and end at 2:00 in the afternoon, with snack buffet during the lectures.
  • Providing a lunch buffet during the training program period, with organizing a lunch party on the training program final day for taking some photos and certificate awarding.
Different venues & timings for this course

Course name

Duration

City

Price

Information Security Management

17, Feb 2025 21, Feb 2025

Munich

4750$

Information Security Management

24, Feb 2025 28, Feb 2025

Prague

4750$

Information Security Management

03, Mar 2025 07, Mar 2025

Rome

4750$

Information Security Management

10, Mar 2025 14, Mar 2025

Jakarta

3500$

Information Security Management

16, Mar 2025 20, Mar 2025

Tunisia

3250$

Information Security Management

24, Mar 2025 28, Mar 2025

Marbella

4750$

Information Security Management

31, Mar 2025 04, Apr 2025

Paris

4750$

Information Security Management

07, Apr 2025 11, Apr 2025

Madrid

4750$

Information Security Management

13, Apr 2025 17, Apr 2025

DUBAI

2950$

Information Security Management

21, Apr 2025 25, Apr 2025

Kuala Lumpur

3250$

Information Security Management

27, Apr 2025 01, May 2025

Amman

2750$

Information Security Management

04, May 2025 08, May 2025

Marrakesh

2950$

Information Security Management

11, May 2025 15, May 2025

Sharm ElShaikh

2750$

Information Security Management

18, May 2025 22, May 2025

Doha

3500$

Information Security Management

25, May 2025 29, May 2025

Casablanca

2950$

Information Security Management

01, Jun 2025 05, Jun 2025

Riyadh

2750$

Information Security Management

09, Jun 2025 13, Jun 2025

Istanbul

2950$

Information Security Management

09, Jun 2025 13, Jun 2025

Milan

4750$

Information Security Management

15, Jun 2025 19, Jun 2025

Jeddah

2750$

Information Security Management

22, Jun 2025 26, Jun 2025

Manama

2750$

Information Security Management

29, Jun 2025 03, Jul 2025

Beirut

2750$

Information Security Management

07, Jul 2025 11, Jul 2025

Singapore

4950$

Information Security Management

13, Jul 2025 17, Jul 2025

Kuwait

2750$

Information Security Management

20, Jul 2025 24, Jul 2025

DUBAI

2950$

Information Security Management

20, Jul 2025 24, Jul 2025

Khobar

2750$

Information Security Management

28, Jul 2025 01, Aug 2025

Kuala Lumpur

3250$

Information Security Management

03, Aug 2025 07, Aug 2025

Amman

2750$

Information Security Management

10, Aug 2025 14, Aug 2025

Marrakesh

2950$

Information Security Management

17, Aug 2025 21, Aug 2025

Sharm ElShaikh

2750$

Information Security Management

24, Aug 2025 28, Aug 2025

Doha

3500$

Information Security Management

31, Aug 2025 04, Sep 2025

Casablanca

2950$

Information Security Management

07, Sep 2025 11, Sep 2025

Riyadh

2750$

Information Security Management

15, Sep 2025 19, Sep 2025

Istanbul

2950$

Information Security Management

21, Sep 2025 25, Sep 2025

Jeddah

2750$

Information Security Management

28, Sep 2025 02, Oct 2025

Manama

2750$

Information Security Management

05, Oct 2025 09, Oct 2025

Beirut

2750$

Information Security Management

13, Oct 2025 17, Oct 2025

Singapore

4950$

Information Security Management

19, Oct 2025 23, Oct 2025

Kuwait

2750$

Information Security Management

27, Oct 2025 31, Oct 2025

Berlin

4750$

Information Security Management

03, Nov 2025 07, Nov 2025

Brussels

4750$

Information Security Management

10, Nov 2025 14, Nov 2025

Zurich

4750$

Information Security Management

17, Nov 2025 21, Nov 2025

Trabzon

3500$

Information Security Management

24, Nov 2025 28, Nov 2025

Beijing

4950$

Information Security Management

01, Dec 2025 05, Dec 2025

Amsterdam

4750$

Information Security Management

01, Dec 2025 05, Dec 2025

Milan

4750$

Information Security Management

08, Dec 2025 12, Dec 2025

Bangkok

4950$

Information Security Management

14, Dec 2025 18, Dec 2025

Muscat

2750$

Information Security Management

22, Dec 2025 26, Dec 2025

Toronto

5500$

Information Security Management

28, Dec 2025 01, Jan 2026

Muscat

2750$

Have a look too on these courses