Plan Szkolenia
Welcome & Introduction - Course overview and objectives
The Information Security Landscape
- Defining information security: Confidentiality, Integrity, Availability (CIA triad)
- Data classifications and sensitivity levels
- Understanding common cyber threats (malware, phishing, social engineering, etc.)
- Real-world case studies of information security breaches
Building Your Information Security Arsenal
- Essential security controls: Access control, encryption, firewalls, intrusion detection
- Implementing secure practices: Password management, multi-factor authentication (MFA), data backups
- Understanding security frameworks and standards (NIST, ISO 27001)
Navigating the Information Security Career Landscape
- Overview of the diverse career paths available (Security Management, Governance, Risk and Compliance (GRC), Security Analyst, Penetration Tester, Incident Responder, etc.)
- Understanding the skills and qualifications required for different roles
- Exploring educational and certification options
- Q&A with industry professionals (optional)
Specialising in the Security Realm
- Deep dive into specific security domains: Network security, cloud security, application security, data security
- Emerging trends and future directions in information security - AI, Culture Change
- Career growth and advancement opportunities
Hands-on Activity: Applying Security Concepts
- Interactive scenario-based exercise to put theory into practice
- Group discussion and collaborative problem-solving
Charting Your Course: Actionable Steps
- Developing a personalized career roadmap
- Identifying resources for further learning and networking
- Q&A and open discussion
Course Wrap-up and Feedback
- Key takeaways and concluding remarks
- Feedback form and evaluation
Wymagania
No specific technical skills or knowledge required, but reasonable understanding of common technologies e.g. Internet and standard IT tools such as MS Office.
Opinie uczestników (5)
Hazem ma bardzo duże doświadczenie w zdawaniu egzaminów i wie, jak ISC konstruuje swoje pytania.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Szkolenie - Certified Information System Security Professional (CISSP) CBK Review
Przetłumaczone przez sztuczną inteligencję
Szeroki wachlarz zagadnień i wrzucane od czasu do czasu przez trenera "ciekawostki".
Kamil - Komenda Główna Straży Granicznej
Szkolenie - Bezpieczeństwo aplikacji internetowych
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Szkolenie - CISSP - Certified Information Systems Security Professional
Wyciągnąłem cenne informacje, które będę mógł przedstawić w swojej firmie jako rozwiązanie do jednego z procesów
Paweł - Santander
Szkolenie - Public Key Infrastructure
Lap Qradar