Information Security
Information security training course: protecting data and systems, managing risk, and responding to new threats. Learn more!
Course description
Information security aims to identify threats, vulnerabilities, and cyber risks and be able to protect data from possible attacks and avert possible breaches to the network or computer systems: focused primarily on protecting computer systems and information in digital format from internal and, more importantly, external attacks.
Thus, enterprise security management includes proper behaviors, tools and procedures, which are, for example, collected in the ISO/ IEC 27001 standard and the other ISO 27000 family documents that complement it.
This and other standards start with an analysis of risks to an organization, resulting in an information security management system (ISMS) that, when properly implemented, enables the company to adequately mitigate risks to its information.
In addition, the recent wave of forced smart working should be a good opportunity to highlight an issue that is still "in power" as the cyber security of agile work, especially when the smart worker uses IoT devices at home.
Main topics:
- Information security key concepts
- Information Security application scenarios
- Defense systems and organizations
- What can we as users do
- International bodies, regulations and laws
- Deployment models: public cloud, private cloud, hybrid
Who is the course for?
Job opportunities and roles that benefit from this course
After-sales
- After sales inspector
Design
- Electrical sw designer
- Electrical hm designer
Staff
- Management personnel responsible
Course goals
Basic Concepts
Transferring the main concepts related to Information Security
Cyber Risks
Raising awareness of issues related to potential risks and impacts from cyber attacks
Today Scenario
Understanding how new technologies (IoT, Industrial Control System, Building Management Systems) have changed these risks and introduced the need for a different approach to the issue
Data protection regulations
Awareness of the main regulations governing and protecting the data security of persons and organisations
This course includes
-
Examples of real business cases
-
Course completion certificate
-
Downloadable in-depth content
-
Help desk support
-
Access from mobile and tablet
-
Comprehensive monitoring of educational progress
-
Skills assessment test (mandatory)
-
Intermediate assessment tests (optional)
Course completion certificate
After completing the course it is possible to obtain a downloadable certificate to display as evidence of the skills achieved. The certification can be combined according to company needs.
Course's lecturer
Maurizio Dal Re
- Cyber Security Consultant
- CISSP | ISO 27001
- Years of consolidated experience in ICT Projects
Course's contents
- Definitions
- New scenarios
- Data Analytics
- Personal data and special data
- Protecting personal data
- The fundamentals of information security, from human behavior toward technology to common cyber attacks
- The fundamentals: information security
- Main principles: risk, vulnerability, threats
- Risk calculation and management
- The human factor and risky behaviors
- Dark web and deep web
- Social engineering
- Types of Malware
- Email, spam (BEC) and phishing
- Password
- Social network
- Internet of things (IOT)
- Industrial cyber security (IIOT)
- Cloud and AI
- Security by design e security by default
- Scenarios: What can happen
- Scenarios: critical infrastructure and complexity
- Scenarios: attack surface
- Scenarios: COVID-19 and teleworking (not smart-working)
- Scenarios: telco
- Scenarios: multi-utility
- Scenarios: healthcare
- Scenarios: finance
- Scenarios: transport
- Scenarios: defence
- Scenarios: manufacturing
- CERT® e CSIRT
- Security operations center (soc)
- Postal Police
- What can we as users do
- International bodies, regulations and laws
- ENISA
- ISO - International Organization For Standardization
- NIST - National Institute Of Standards And Technology
- CIS - Center for Internet Security
- Sans
- Mitre
- Data protection
Entry requirements
Access to any browser
PC / Tablet / Smartphone device
Internet connection
Connected Machine Area
Discover the training courses designed specifically for the roles involved in the management of projects based on Connected Machines for the improvement of production plants and processes.
After-sales | AI & Machine Learning | Cloud Computing | Business intelligence & OEE | Big Data & Data Governance | Information Security | Internet of Things (IoT) | Service Management |
After sales inspector | |||||||
Design | AI & Machine Learning | Cloud Computing | Business intelligence & OEE | Big Data & Data Governance | Information Security | Internet of Things (IoT) | Service Management |
Electrical sw designer | |||||||
Electrical hm designer | |||||||
Mechanical designer | |||||||
Sales | AI & Machine Learning | Cloud Computing | Business intelligence & OEE | Big Data & Data Governance | Information Security | Internet of Things (IoT) | Service Management |
Project manager | |||||||
Area manager | |||||||
Marketing officer | |||||||
After sales assistant | |||||||
Staff | AI & Machine Learning | Cloud Computing | Business intelligence & OEE | Big Data & Data Governance | Information Security | Internet of Things (IoT) | Service Management |
Technical assistant | |||||||
Management personnel responsible |