Information Security Risk Management

Performing Effective Information Security Risk Management as per ISO/iec 27005:2011 ISRM Standard Course Outline: Understanding of key risk management terminologies. What is countermeasure or control and its role in defending against the threat? What is CIA Triad from controls perspective? Different categories of controls (preventive, detective, deterrence etc.) Broader categories of controls (Administrative, Physical and Technical) Defense in depth concept Key information security risk management processes, including context establishment, risk assessment, risk treatment and monitoring/review. What is asset and how its value is determined? Different approaches of Risk Analysis – Qualitative vs. Quantitative Different types of risk responses Determining the…

Read More

Application Security Training

The Web Application Security Training is designed to equip you with the knowledge and tools needed to identify and defend against security vulnerabilities in software applications. You will put theory to practice by completing real world labs that include testing applications for software vulnerabilities, identifying weaknesses in design through architecture risks analysis and threat modeling, conducting secure code reviews and more. When programmers don’t understand the principles of secure coding, doors are open to those who do.This web application security training will broaden your knowledge of the web services architecture in order to help you identify and circumvent various protection mechanisms in use…

Read More

Information Security Awareness Training

Training Topics   Security Terminologies What is information? What is information system? What is information security? What is vulnerability? What is threat? What is risk? Need & Importance of Security Need of security Local threats Global threats Consequences of lack of security Security Awareness Goals & Employees Responsibilities Security awareness goals Employee responsibilities How to report an incident? Leading Threats What is Virus, worm, Trojan What is Phishing threat& how to deal with it What is Social engineering& how to deal with it Safe Practices and Guidelines Password creation tips Email security tips Internet usage tips Mobile security tips Social…

Read More