IT manager

Training Course: Administrative best practices in information security


Register Now
Quick Inquiry
Discount Group Download Brochure (37)

IT235046

11 - 15 May 2025

Cairo (Egypt)

Hotel : Holiday Inn & Suites Cairo Maadi, an IHG Hotel

Cost : 3575 € Euro

Introduction:

An information security management system "ISMS" is a set of policies concerned with managing information security or it is related to risks related to information. own information, thus ensuring acceptable levels of information security risk.

This course equips participants with the in-depth knowledge and practical skills needed to plan, deliver, and monitor information technology and security for internal and external clients to encompass a full and comprehensive range of disciplines in the areas of IT policy, operational security management textbook, security/penetration testing, ethical hacking, and black hat hackers.

This course also covers WIFI security, website security, human factors, forensic security, management of security teams, the Secure Operations Center (SOC), and computer security incident response teams (CSIRT).

The course includes practical sessions, videos, and examples of viruses and black-and-white hacking tools. All participants are also provided with the latest research and articles.

As part of the course, participants conduct a risk assessment of two different publications based on ISO "27001" which identifies any direct or indirect threats, security exposures, or potential vulnerabilities, participants deal with an example in security and learn about best practices that can be applied to secure their organizations and assets. Associated.

 

Course objectives:

At the end of the course, participants will be able to:

  • Apply information security standards to their organization and its critical assets.

  • Learn about threats caused by viruses, malware, active tokens, and active persistent threats (APT) and consider various mitigation options.

  • Formulate and manage effective cyber security teams and apply the Computer Security Incident Response Team (CSIRT) framework, tools, and capabilities to accost-effective active and robust solutions to protect the organization.

  • Using NLP to deliver messages that change the way employees work and think safely.

  • Examine areas of wireless security protocols, their security characteristics, and potential insecurities within the organization and in public spaces.

  • Learn how to penetrate testing and ethical hacking to enhance organizational security.

  • Assessment of modern security: OSINT and the evolution of artificial intelligence.

 

Target Audience

  • Specialists in information technology, security, and auditing.

  • Those in charge of sites and general administration.

  • Any person entrusted with managing and protecting the integrity of the electronic network infrastructure.

  • Anyone familiar with IT/Internet/Digital Security.

  • Anyone who finds themselves in need of this course and wants to develop their skills and experience.

 

Course content:

Day 1

Information technology era:

  • Characteristics, elements, and directions of electronic management.

  • Electronic systems are necessary for electronic management.

  • Electronic management features, elements, and directions.

  • Characteristics of electronic management and the possibility of executing transactions electronically.

 

Day 2

Electronic management elements:

  • Paperless management.

  • Management without rigid organizations.

  • Management without a place.

  • Timeless management.

  • What are the specifications of the office manager and the electronic secretary?

 

Day 3

Security of documents and papers:

  • Historical development of information security science.

  • Information security policies.

  • Setting and developing an information security strategy in the face of potential dangers.

  • Basic concepts in information security management.

  • Security stages for the security of documents and papers.

  • The stage of creating the official paper.

  • Preservation and security stage.

  • Trading and viewing stage.

  • The stage of execution of the official paper.

  • Some data protection methods.

 

Day 4

Information documentation technology:

  • electronic archive

  • The concept of an automated document processing system

  • Ways to save files

  • Classification and indexing of files

  • Strategic objectives of electronic archiving

  • Objectives of electronic archiving within the organization

  • Pros and cons of electronic preservation of information.

  • How does the document and file processing system work?

  • Features of the automated document and file processing system.

 

Day 5

The general stages of implementing a project to convert a paper archive into an electronic archive:

  • A practical case in the field of electronic documentation and archiving.

  • Security requirements for workers.

  • Computer applications and confidentiality of information.

  • Document security applications.

  • Data protection through a suite of office software.

  • Backup methods.

  • Data encryption.

  • Email protection.

  • Viruses, electronic piracy, protection systems, and programs.

  • Security deficiencies in the field of documents.

  • Applications and practical cases.

IT manager

Training Course: Administrative best practices in information security


Register Now
Quick Inquiry
Discount Group Download Brochure (37)

IT235046

11 - 15 May 2025

Cairo (Egypt) - Holiday Inn & Suites Cairo Maadi, an IHG Hotel

Hotel : Holiday Inn & Suites Cairo Maadi, an IHG Hotel

Cost: 3575 € Euro


  About Cairo

Cairo is a mesmerizing assortment of iconic monuments, bustling markets, and ancient sites encircled by a vast and sprawling metropolis. At its core lies a maze-like medieval quarter. A world away from the modern side of the city, it boasts a seductive blend of intricate mosques, jostling crowds, madrasas, and traditional hammams. No visit could be complete without visiting the awe-inspiring Giza Pyramids that preside over the city's horizon. Whether you come to delve into the city's ancient past, dive into colorful souqs, sip mint tea and contemplate thousands of years of history or explore the city's cosmopolitan side, you'll be left with memories to last a lifetime.


  Things to do and places to visit in Cairo

The multi-layered capital of Egypt offers its visitors lively markets, authentic restaurants, and a multitude of ancient sights and archeological findings. Gaze in wonder at the Pyramids, take an awe-inspiring look at Tutankhamen's burial mask, shop for handmade souvenirs in the bazaars or hop on a sunset cruise down the Nile and embrace the sensory overload that is Cairo.

Take a vacation in Cairo and you can:

  • Visit the Great Sphinx of Giza, one of Ancient Egypt's great mysteries.
  • Explore the ramparts of the Salah El-Din Citadel.
  • Join locals drinking coffee at Fishawi Café, one of Cairo's first cafes and most important meeting spots.
  • Marvel at the seemingly endless historical artifacts on display at the Egyptian Museum.
  • Learn about the Ummayad, Ottoman, and Ayyubbid dynasties and more at the Museum of Islamic Art.
  • Haggle for souvenirs and gifts at the Khan el-Khalili souk.
  • See one of the world's oldest universities at the Al-Azhar Mosque, one of the city's original mosques.
  • Take a tour of the showstopping Giza pyramids.
  • Savor local cuisine such as mezze in the old city.
  • Wander through the labyrinth-like streets of Coptic Cairo, the city's ancient quarter, and spot Roman relics.
 22 Portman Square, Marylebone, London W1H 7BG, UK
 3 Oudai street, Aldouki, Giza, Giza Governorate, Egypt
 0020233379764
 00201095004484
 00201102960555
 00201102960666
 19 Mayıs Mahallesi, 19 Mayis Street No 2 Sisli, 34360 Istanbul/Turkey
 00905357839460
 Australia Street, Raouche Beirut, Lebanon .، Beirut, Lebanon
 0096181746278
 811 Massachusetts Avenue, Boston, Massachusetts, 02118, USA
 6 Beirut Street - Fifth Circle Abdoun, P.O. Box 831370, 11183 Amman, Jordan
Copyright Global Horizon Training Center © 2019