Categories

Information Systems (IS) Risk Management


Summary

The British Academy for Training and Development presents a training course on Information System Risks Management to whosoever aims for the most modern methods and means of Information Security Protection stored within companies' computers against potential risks and threats.

Information Systems (IS) is a group of software and computer programs designed to be the right-hand of each official in companies and institutions. Information Systems (IS) helps different companies and institutions greatly to save much time and effort. It also helps in executing multiple tasks within short time. However, management of these systems requires large expertise.

In light of the rapid technological progress, dealing with information electronically has largely increased. Consequently, companies aim to create databases and electronic management systems and use electronic communication technology. Although these methods have accelerated the tasks and jobs performance within shorter time and more accurately, they include problems and cautions pertaining to the electronic security level, large number of risks and penetration methods which may be faced by them. Therefore, companies need developed ideas and abilities in order to protect this information.

Information Systems is an academic study of systems with a specific reference to information and the complementary networks of hardware and software that people and organizations use to collect, filter, process, create and also distribute data. An emphasis is placed on an information system having a definitive boundary, users, processors, storage, inputs, outputs and the aforementioned communication networks.

Information System Managment is a specialization interested in computer science and information technologies. It has merged between all information technologies, and their related programs, and the activity provided by the employee in order to perform these operations which may expand to include databases, equipment, webs and softwares. As a result, such technologies will be applied on all the company works such as production management, human resources management, financial management, supply chains and other operations conducted in companies.

Objectives and target group

Target Category:

  • Managers and owners of companies.
  • Directors of management departments in companies.
  • Directors of accounting departments in companies.
  • Directors of Information and Documents Security Departments in companies.
  • Developers of Computers Protection Systems in companies.
  • Developers of Information Systems in companies.
  • All Information Security Projects management sector employees.
  • Computers specialized technicians.
  • Information systems analysts.
  • Web pages designers.
  • Databases officials in companies.

How participants will benefit from the Course:

At the end of this course, Participants will gain perception of the following:

  • Threats which may be faced by the information stored in the major computer of the company.
  • Methods of computers security using Security Systems performing the task of their protection securely.
  • The most modern programs of information protection against amendment, copying, theft or damage.
  • How to put restrictions on information using passwords and developed security systems allowing the authorized person only to access them.
  • Methods to provide corporate administrators with the necessary information for planning, organization, leadership and assistance in taking decisions.
  • Methods to control operations, as well as information processing and automation as required.
  • Processing production databases which are important for the company.
  • Method of data flow on the company activities.

Course Content

  • Potential risks which may face information.   
  • Developed and new software viruses, methods of protection against them and preventing them from attacking the major computers in the company.
  • Using cryptography for important data which only authorized persons are allowed to access.
  • Methods of electronic penetration of information and electronic correspondence and the methods of protection against this.
  • Designing Information Security System and addition of developed protection programs.  
  • Administrative support systems.
  • Operational support systems.
  • Processes control systems.
  • Executive information systems.
  • Information processing systems.
  • Office automation systems.
  • Business transactions processing.

Course Date

2019-10-28

2020-01-27

2020-04-27

2020-07-27

Course Cost

Note / Price varies according to the selected city

Members NO. : 1
£3600 / Member

Members NO. : 2 - 3
£2880 / Member

Members NO. : + 3
£2340 / Member

Related Course

Featured

Business Analysis Course

2019-10-21

2020-01-20

2020-04-20

2020-07-20

£3600 £3420