YuTru

Blog

Training Course #5

Course Name
Introduction to Cybersecurity: Protecting Digital Assets

Course Overview
The ability to secure digital information within a modern enterprise is a challenge. The threats to information security are global, relentless, and are increasingly complex in nature.

Effective cyber security to protect digital assets requires participation, planning, and good practice. It’s an ongoing program of work that requires both high-level management and operational staff to work together for the same objectives.

Applying cyber security skills and tools requires a high degree of commitment to learning, a deep understanding of the inner workings of information technology, and honed skills – and these must be sustained with constant training.

Noteworthy is that an effective cyber security stance is not achieved by teams across the enterprise working in silos. Ineffective physical security, for example, can undermine otherwise effective logical security, and vice versa.

Effective cyber security at the institutional level requires the regular interaction of all security practices (information, networking, human resource, physical) in order to achieve overall information system security.

This training course is aimed at entry-level cyber security practitioners. The course is designed to engage both operational and strategic skills to contribute to a holistic view of the cyber security landscape in a modern digitally-connected enterprise.

Status
This course is full.

Certification
Certificates of participation will be issued to all attendees who are present for the entire duration of the course.

Non-Attendance Policy
Registrants who fail to attend will be refused participation in future free training events. In the case a registrant cannot attend they may assign their registration to someone else up to 24 hours before the training event. The training event is paid for the PNG Digital Commerce Association, the Digital Identification Bureau, and the Australian Government. Free means free to you! 🙂

Provided
Morning tea: cake, coffee, tea, water
Lunch: assorted sandwiches, soft drinks, cake
Cost
No charge

Duration & Date
2 days, 18th & 19th November 2019
Schedule
Arrive: 8:45am, Start: 9:00am, Finish: 3:00pm

ProgramTimeDuration
Arrive08:45 
Session 109:00-10:301.5h
Morning Tea10:30-11:0030m
Session 211:00-12:301.5h
Lunch12:30-13:301h
Session 313:30-14:301h
Quiz14:30-14:4515m
Q&A14:45-15:0015m

Location
Abt Associates, Level 1, Markham Room, 
Ravalian Haus, Harbour City, NCD
Port Moresby, NCD

Map
Click here to view Ravalian Haus on Google Maps

Course Outline

#TopicDay # (of 2)
1.1How to assess a security context1
1.2Risk management
1.3Survey of common vulnerabilities
1.4The CIA triad and other security models
1.5Elements of a modern security system
2.1Secure software development practices2
2.2Information system security metrics
2.3International security standards
2.4Security controls
2.5Good and best practices

CONTACT:

TONY WILLENBERG | CONSULTANT

Key ID: FA690BD6, Fingerprint: B5CF F09F 7114 ACA4 A23C 8CF0 555E 1FBB FA69 0BD6
Signal: +675 7993 7369 (PG), WhatsApp: +43 678 121 4974 (AT)
Mobile: +675 7993 7369 (PG), +43 678 121 4974 (AT), +61 491 350 135 (AU)

 

Subscribe
Archives