Information Security

Information security training course: protecting data and systems, managing risk, and responding to new threats. Learn more!

Course description

Information security aims to identify threats, vulnerabilities, and cyber risks and be able to protect data from possible attacks and avert possible breaches to the network or computer systems: focused primarily on protecting computer systems and information in digital format from internal and, more importantly, external attacks.

Thus, enterprise security management includes proper behaviors, tools and procedures, which are, for example, collected in the ISO/ IEC 27001 standard and the other ISO 27000 family documents that complement it.

This and other standards start with an analysis of risks to an organization, resulting in an information security management system (ISMS) that, when properly implemented, enables the company to adequately mitigate risks to its information.

In addition, the recent wave of forced smart working should be a good opportunity to highlight an issue that is still "in power" as the cyber security of agile work, especially when the smart worker uses IoT devices at home.

Main topics:

  • Information security key concepts
  • Information Security application scenarios
  • Defense systems and organizations
  • What can we as users do
  • International bodies, regulations and laws
  • Deployment models: public cloud, private cloud, hybrid

Who is the course for?

Job opportunities and roles that benefit from this course

After-sales

  • After sales inspector

Design

  • Electrical sw designer
  • Electrical hm designer

Staff

  • Management personnel responsible

Course goals

Basic Concepts

Transferring the main concepts related to Information Security

Cyber Risks

Raising awareness of issues related to potential risks and impacts from cyber attacks

Today Scenario

Understanding how new technologies (IoT, Industrial Control System, Building Management Systems) have changed these risks and introduced the need for a different approach to the issue

Data protection regulations

Awareness of the main regulations governing and protecting the data security of persons and organisations

This course includes

  • Examples of real business cases

  • Course completion certificate

  • Downloadable in-depth content

  • Help desk support

  • Access from mobile and tablet

  • Comprehensive monitoring of educational progress

  • Skills assessment test (mandatory)

  • Intermediate assessment tests (optional)

Course completion certificate

After completing the course it is possible to obtain a downloadable certificate to display as evidence of the skills achieved. The certification can be combined according to company needs.

Course's lecturer

Maurizio Dal Re

  • Cyber Security Consultant
  • CISSP | ISO 27001
  • Years of consolidated experience in ICT Projects

Course's contents

  1. Definitions
  2. New scenarios
  3. Data Analytics
  4. Personal data and special data
  5. Protecting personal data

  1. The fundamentals of information security, from human behavior toward technology to common cyber attacks
  2. The fundamentals: information security
  3. Main principles: risk, vulnerability, threats
  4. Risk calculation and management
  5. The human factor and risky behaviors
  6. Dark web and deep web
  7. Social engineering
  8. Types of Malware
  9. Email, spam (BEC) and phishing
  10. Password
  11. Social network
  12. Internet of things (IOT)
  13. Industrial cyber security (IIOT)
  14. Cloud and AI
  15. Security by design e security by default

  1. Scenarios: What can happen
  2. Scenarios: critical infrastructure and complexity
  3. Scenarios: attack surface
  4. Scenarios: COVID-19 and teleworking (not smart-working)
  5. Scenarios: telco
  6. Scenarios: multi-utility
  7. Scenarios: healthcare
  8. Scenarios: finance
  9. Scenarios: transport
  10. Scenarios: defence
  11. Scenarios: manufacturing

  1. CERT® e CSIRT
  2. Security operations center (soc)
  3. Postal Police

  1. What can we as users do

  1. International bodies, regulations and laws
  2. ENISA
  3. ISO - International Organization For Standardization
  4. NIST - National Institute Of Standards And Technology
  5. CIS - Center for Internet Security
  6. Sans
  7. Mitre
  8. Data protection

Entry requirements

Access to any browser

PC / Tablet / Smartphone device

Internet connection

Connected Machine Area

Discover the training courses designed specifically for the roles involved in the management of projects based on Connected Machines for the improvement of production plants and processes.

After-sales AI & Machine Learning Cloud Computing Business intelligence & OEE Big Data & Data Governance Information Security Internet of Things (IoT) Service Management
After sales inspector
Design AI & Machine Learning Cloud Computing Business intelligence & OEE Big Data & Data Governance Information Security Internet of Things (IoT) Service Management
Electrical sw designer
Electrical hm designer
Mechanical designer
Sales AI & Machine Learning Cloud Computing Business intelligence & OEE Big Data & Data Governance Information Security Internet of Things (IoT) Service Management
Project manager
Area manager
Marketing officer
After sales assistant
Staff AI & Machine Learning Cloud Computing Business intelligence & OEE Big Data & Data Governance Information Security Internet of Things (IoT) Service Management
Technical assistant
Management personnel responsible

Get in touch!

Follow us on LinkedIn

Do you want to develop your training project?