Training: Informatiebeveiliging voor Besluitvormers en Leiders
Business Analist
24 uur
Engels (US)

Training: Informatiebeveiliging voor Besluitvormers en Leiders

Snel navigeren naar:

  • Informatie
  • Inhoud
  • Kenmerken
  • Meer informatie
  • Reviews
  • FAQ

Productinformatie

In deze training verwerf je essentiële digitale vaardigheden voor je leiderschap, met focus op visie, integriteit en besluitvorming binnen InfoSec. Je leert om te gaan met cybersecurity-uitdagingen, zoals ransomware en cybercrime, en ontdekt strategieën om deze dreigingen te counteren. Daarnaast verdiep je je in strategische leveranciersselectie en risicobeheer, waarbij je efficiëntie afweegt tegen veiligheid. Je ontwikkelt robuuste informatiebeveiligingsplannen met nadruk op risico-evaluatie en regelgevingsnaleving. Ook scherp je je vaardigheden aan op het gebied van crisismanagement en verken je belangrijke InfoSec-rollen zoals Chief Information Security Officer en netwerkbeveiligingsingenieurs. Daarbij verken je de CIA-driehoek – vertrouwelijkheid, integriteit en beschikbaarheid – en verdiep je je in verdedigingsmechanismen zoals cryptografie en toegangsbeheer, ondersteund door een sterke incidentresponsstrategieën.

Inhoud van de training

Informatiebeveiliging voor Besluitvormers en Leiders

24 uur

Information Security for Leaders: An Introduction to InfoSec

Information security, often called InfoSec, consists of tools and processes used to protect data and sensitive information from threats and attacks. In this course, explore the history of information security and discover how to differentiate between cybersecurity and information security. Discover common myths and misconceptions about information security and learn about types of information security, such as infrastructure, cloud, application, and incident response. Next, you will explore security threats, including social media attacks, social engineering, malware, and misconfigurations, and common information security and data protection laws. Finally, you will investigate the responsibilities of a Chief Information Security Officer (CISO), including developing sound security practices, identifying security objectives, conducting awareness and training programs, and ensuring regulatory compliance. Upon completion, you'll be able to recognize the importance of information security and the key roles and responsibilities required to protect an organization

Information Security for Leaders: Elements of InfoSec

Confidentiality, integrity, and availability, otherwise known as the CIA triad, is a common information security model used by organizations to design and implement their overall security policies and frameworks. In this course, you will learn the basics of confidentiality, integrity, and availability, and discover emerging challenges brought on by big data and the Internet of Things (IoT). Explore the stages of information security risk management (ISRM) and learn how to differentiate between various types of security controls. Discover techniques such as defense in depth, data classification, cryptography, access control, and governance, and the importance of having a sound incident response and management strategy in place. Lastly, learn about the role of investigations and forensics as well as the steps in a forensic investigation such as searching and seizing, acquisition, analysis, and reporting. After course completion, you'll be able to recognize common elements of information security.

Information Security for Leaders: Elements of an InfoSec Team

There are many elements to a successful InfoSec team, but its goal is always to protect the organization's electronic data and information technology systems. In this course, you will learn about the responsibilities of an IT security team and the many roles required for success. Explore the responsibilities of a chief information security officer and a chief information officer and discover the primary responsibilities of a network security engineer, which include ensuring hardware and software security and updating and patching resources. Next, you will differentiate between the roles of penetration tester, information owner, junior engineer, computer technician, forensic investigator, and digital forensic examiner. Then examine key stakeholder and decision-maker roles. Lastly, explore the role of DevSecOps and list ways it can have a positive impact on information security. Upon completion, you'll be able to recognize the elements of an InfoSec team.

Final Exam: Elements of InfoSec

Final Exam: Elements of InfoSec will test your knowledge and application of the topics presented throughout the Elements of InfoSec track.

Proactive InfoSec Leadership

A good information security leader will likely be responsible for many areas, including security operations, fraud prevention, program management, and investigations. Effective leaders should possess a clear vision, inspire others, and deliver results. In this course, you will explore the potential education requirements of an InfoSec leader and discover how experience working in security or business management can be a requirement for many senior-level executive roles. Examine the qualities that make good leaders, including interpersonal skills, honesty, integrity, business acumen, and ethical decision-making. Discover how successful leaders are often big picture thinkers who are capable of making quick decisions, and explore other qualities of a leader including loyalty, leadership, confidence, positivity, empathy, humility, creativity, and accountability. After completion of this course, you'll be able to recognize the qualities of a good security leader.

Managing Enterprise InfoSec Risks & Risk Tolerance

IT security risks can be defined as a combination of the consequences of an event and the associated likelihood of occurrence. They can be managed by an organization through asset-safeguarding strategies. Through this course, learn about managing enterprise information security (InfoSec) risk and risk tolerance. Explore the definition of risk, how it differs from threats and vulnerabilities, and the history of information security. Next, discover common threats to IT systems and data, how to identify and manage security risks, and the key differences between quantitative and qualitative risk analysis. Finally, learn about common risk assessment tools and the differences between penetration testing and vulnerability assessments. Upon completion, you'll be able to outline and manage IT security risks.

InfoSec Crisis Management & Incident Response

Not only do IT security teams need to be ready to identify security incidents, but they also need to be able to respond to and manage the environment during a crisis. In this course, you'll explore the term 'crisis' and identify crisis management practices. Discover the key components of an organizational crisis readiness program, including planning, training, technology, tools, and continuous improvement. Next, investigate the roles and responsibilities of a crisis management team, examine measures to minimize disruptions, and determine how incident response planning can help organizations better respond to critical incidents. Then, investigate how to best identify incidents and learn how early detection of incidents can be crucial to containing threats. Lastly, explore the various steps of a typical incident response plan, focusing on identification, containment, investigation, eradication, recovery, and lessons learned. After completing this course, you will be able to recognize what constitutes a crisis and respond to and manage security incidents.

Information Security Practices: Budgeting & Forecasting for InfoSec

Information security leaders must identify organizational goals and develop plans and strategies to attain them. In this course, you will explore information security planning, including how a good plan can offer economic benefits and provide a competitive advantage. Discover the importance of evaluating security risks, threats, and vulnerabilities, and learn how to conduct a security risk analysis. Then you will focus on data classification planning, various regulatory acts that apply to information security, and the importance of disaster recovery and incident management planning. Next, examine the value of properly training and evaluating employees in security awareness, and learn how to strengthen security culture through communications and awareness programs. Finally, you will investigate key considerations when planning for budgets and contingency.

Information Security Practices: InfoSec Vendor Management

Everything comes with pros and cons, and outsourced information security is no exception. Leaders contemplating outsourcing information security products and services will need to trade potential time and money savings for other potential gaps. In this course, explore information security outsourcing, security vendor relationships, and major considerations and challenges associated with outsourcing information security. Next, discover common downsides to outsourcing security services, key steps to consider when choosing a security vendor, and explore vendor risk management. Finally, learn about vendor contracts and the importance of having sound contract language when dealing with security vendors. Upon completion, you'll be able to identify common InfoSec vendors and providers and best practices for outsourcing InfoSec products or services.

Information Security Practices: Multi-year InfoSec Planning

There is no easy way to predict the future of information security. There are however strategies leaders can implement to better plan and prepare for future growth, security, and threats. In this course, examine potential information security threats, how complexity makes them challenging to predict and plan for, and the threats that ransomware, cybercrime, and the growing crime-as-a-service (CaaS) community pose. Next, discover how work shortages and voids created by skills gaps can cause major issues and the impact of recent global pandemics. Finally, explore operational technology, application container risks, and the evolving risks posed by artificial intelligence and machine learning. Upon completion, you'll be able to plan for the future as an InfoSec leader.

Final Exam: InfoSec Leadership

Final Exam: InfoSec Leadership will test your knowledge and application of the topics presented throughout the InfoSec Leadership track.

Kenmerken

Docent inbegrepen
Bereidt voor op officieel examen
Engels (US)
24 uur
Business Analist
180 dagen online toegang
HBO

Meer informatie

Doelgroep Projectmanager, Manager
Voorkennis

Geen formele vereisten. Enige ervaring in informatiebeveiliging is aangeraden.

Resultaat

Na het voltooien van deze training zul je essentiële kwaliteiten van effectief digitaal leiderschap hebben ontwikkeld en geavanceerde inzichten hebben opgedaan in het tegengaan van diverse cyberdreigingen.

Positieve reacties van cursisten

Training: Leidinggeven aan de AI transformatie

Nuttige training. Het bestelproces verliep vlot, ik kon direct beginnen.

- Mike van Manen

Onbeperkt Leren Abonnement

Onbeperkt Leren aangeschaft omdat je veel waar voor je geld krijgt. Ik gebruik het nog maar kort, maar eerste indruk is goed.

- Floor van Dijk

Training: Leidinggeven aan de AI transformatie

Al jaren is icttrainingen.nl onze trouwe partner op het gebied van kennisontwikkeling voor onze IT-ers. Wij zijn blij dat wij door het platform van icttrainingen.nl maatwerk en een groot aanbod aan opleidingen kunnen bieden aan ons personeel.

- Loranne, Teamlead bij Inwork

Hoe gaat het te werk?

1

Training bestellen

Nadat je de training hebt besteld krijg je bevestiging per e-mail.

2

Toegang leerplatform

In de e-mail staat een link waarmee je toegang krijgt tot ons leerplatform.

3

Direct beginnen

Je kunt direct van start. Studeer vanaf nu waar en wanneer jij wilt.

4

Training afronden

Rond de training succesvol af en ontvang van ons een certificaat!

Veelgestelde vragen

Veelgestelde vragen

Op welke manieren kan ik betalen?

Je kunt bij ons betalen met iDEAL, PayPal, Creditcard, Bancontact en op factuur. Betaal je op factuur, dan kun je met de training starten zodra de betaling binnen is.

Hoe lang heb ik toegang tot de training?

Dit verschilt per training, maar meestal 180 dagen. Je kunt dit vinden onder het kopje ‘Kenmerken’.

Waar kan ik terecht als ik vragen heb?

Je kunt onze Learning & Development collega’s tijdens kantoortijden altijd bereiken via support@icttrainingen.nl of telefonisch via 026-8402941.

Background Frame
Background Frame

Onbeperkt leren

Met ons Unlimited concept kun je onbeperkt gebruikmaken van de trainingen op de website voor een vast bedrag per maand.

Bekijk de voordelen

Heb je nog twijfels?

Of gewoon een vraag over de training? Blijf er vooral niet mee zitten. We helpen je graag verder. Daar zijn we voor!

Contactopties