Refine Your Search
...
Explore Financial Academy
About the Academy
Discover our Rich, 60-Year Journey
Jadarat
A Comprehensive System for Skill and Knowledge Development
Governance
Meet our Inspiring Leadership
Success Stories
Check out our Clients’ Reviews and Testimonials
...
(4.0/ 5) 5 Reviews
Simply, Information security is the practice of keeping data secured from unauthorized access wherever it is stored or while it is transmitted from one place to another. In other words, protecting information by mitigating information risks. This program is built for non-IT professional to understand the basic concepts of information protection; what are the tools required for internal or external information protection; and how to apply the international standard related to information security.
(4.0/ 5)
5 Learner Rating
Simply, Information security is the practice of keeping data secured from unauthorized access wherever it is stored or while it is transmitted from one place to another. In other words, protecting information by mitigating information risks. This program is built for non-IT professional to understand the basic concepts of information protection; what are the tools required for internal or external information protection; and how to apply the international standard related to information security.
Banking
Capital Market
Insurance
Financing
+43
Cybersecurity
Not Exist
Lecture
Case Studies +1
Lecture
Case Studies
Exercises and assignments
Pre Assessment
Post Assessment
All job families in finan...
All job families in finan...
All job families in finan...
All job families in finan...
+41All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
All job families in financial Sector
This provides you with the opportunity to select the available times that suit you best for participation in our program. These times represent slots during which we are ready to welcome you and provide assistance and guidance.
In Class Training-Online Training
Defining information security
The need for information security
Cyber-attacks and the need to protect against them
In Class Training-Online Training
Authentication
Access Control
Confidentiality
Data Integrity
Availability
Non-Repudiation
Auditing
Types of Security Attacks
In Class Training-Online Training
The Hacker
phishing
In Class Training-Online Training
Encryption
Asymmetric encryption (encryption using the public key) a) Public Key Cryptography
Authentication (digital signature)
Digital Signature
Digital certificate
Document the electronic signature of the website (Digital Signature)
Understand the basics, functions and types of information security tools to understand the basis on which information protection approaches to be used for organizations and individuals’ information protection
Understand information security tools to use the appropriate ones in protecting enterprise information
Determine the level of risk associated with information in order to determine the appropriate framework for its protection