INFORMATION SECURITY & ASSURANCE PROGRAM


Information Security and  Assurance (ISA) is a mandatory requirement for security personnel with privileged access to monitoring, system control and administration functions. ... In turn, ISA trained security personnel help bolster information integrity and availability through controls, risk assessment, and management.

What Is the Difference Between Information Assurance and Information Security?

In short, information assurance focuses on gathering data. Information security is about keeping that data safe. In most organizations, these two jobs are combined into one department or even one worker.

This course teaches the basic concepts and principles of information security and the fundamental approaches to secure computers and networks. Its main topics include: security basics; security management and risk assessment; software security; operating systems security; database security; cryptography algorithms and protocols; network authentication and secure network applications; malicious malware; network threats and defenses; web security; mobile security; legal and ethical issues; and privacy.

More so ,This course helps in the assessment of internal controls, also in assuring and reporting the validity, adequacy, reliability, and security of information systems.

Participants will gain the knowledge and confidence to plan and perform an effective audit, as well as reporting and recommending corrective actions where necessary.

You will also develop the necessary skills to audit controls, monitor and assess information technology and report on the conformance and implementation of processes based on management systems.

Finally, you will learn how to initiate an audit, prepare and conduct audit activities, compile and distribute audit reports and complete follow-up activities.

  • Course code:

    214-4-108

  • Duration

    12weeks

loading...

    Introduction to ISA Program - Deadline 07/19 11:59PM


    • 1.

      WELCOME TO GOTO-COURSE MANAGEMENT SYSTEM

      Introducing students to GOTO-COURSE learning system

    • 2.

      WHAT YOU NEED FOR CLASS

      Watch the video and prepare what you will need for the class

    • 3.

      GROUND RULES

      Watch the video to learn the rules of the class

    • 4.

      STUDENT INTRODUCTION

      Record a 1-minute video introducing yourself, tell us what you aim to achieve during the class and attach it as a file below

    • 5.

      QUIZ 1

      Based on the topics above, answer the questions in the quiz

    • 6.

      LETS TALK ABOUT DRESS CODE

      To inform the student of the training dress code

    • 7.

      News and Updates

      The student's news and updates

    Introduction to I.T


    • 1.

      What is Information Technology

    • 2.

      Quiz 2

    INTRODUCTION TO INFORMATION SECURITY


    • 1.

      INFOSEC SECTION 1

      Understand the components and the operations of an Information Security Management System based on ISO/IEC 27001 and its principal processes and Interpret the ISO/IEC 27001 requirements in the specific context of an organization.

    CIA


    • 1.

      Information security Objective

    • 2.

      confidentiality

      How to Protect information from being accessed by unauthorized parties. In other words, only the people who are authorized to do so can gain access to sensitive data

    • 3.

      Encryption

      The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted over the internet or any other computer network.

    • 4.

      Integrity

      Integrity models have three goals: Prevent unauthorized users from making modifications to data or programs. Prevent authorized users from making improper or unauthorized modifications. Maintain internal and external consistency of data and programs.

    • 5.

      Research paper on Positive Risk -Due 8/3 by 11:59pm

      Explain How to response to Positive Risk

    • 6.

      Assignment on TOM -495

    Risk Management


    • 1.

      vulnerability

    • 2.

      Assignment on ISO 27005 & NIST 800 SP-37- deadline 8/13 11:59 PM

    • 3.

      Group Work ON ACCOUNT MANAGEMENT & PROTOCOLS

    • 4.

      RISK REGISTER

    • 5.

      RISK ASSESSMENT TEMPLATE

    • 6.

      RISK REGISTER ASSIGNMENT

    INFORMATION SECURITY MANAGEMENT SYSTEM USING ISO 27001


    • 1.

      ISMS

    • 2.

      ISO27001

    • 3.

      SAMPLE ISMS POLICY

    • 4.

      ISO 27001 COMPLIANCE CHECKLIST

      COMPLIANCE AUDIT

    • 5.

      ISMS PPT

    • 6.

      SECURITY CONTROLS

    • 7.

      SECURITY CONTROL MAPPING

    • 8.

      ISO 27001 ANNEX A TABLE

    • 9.

      ISMS ROAD MAP

    • 10.

      ASSIGNMENT on SIEM

    • 11.

      Assignment on SOC

    • 12.

      Groupwork on Backup

    IT INFRASTRUCTURE


    • 1.

      IT INFRASTRUCTURE

    • 2.

      I.T INFRASTRUCTURE DIAGRAM

    IT AUDIT


    • 1.

      IINTRODUCTION TO IT AUDIT

    AUDIT WORKPAPERS


    • 1.

      COBIT RISK CONTROL MATRIX