Trainings

Check back time to time to receive the latest updates

Security Training

Mobirise

Requirements and Security Assessment include:
~ Building and maintaining a secure network
~ Protecting cardholder data
~ Maintaining a vulnerability management program
~ Implementing strong access control measures
~ Regularly monitoring and testing networks
~ Maintaining an information security policy

Cyber Security Based on ISO:
~ Introduction as to what is information security and security in general
~ Risk Assessment and Treatment
~ Security Policy
~ Organization of Information Security (internal organization and external      
   parties)
~ and more (find out more in the tabs below)

Asset Management: responsibility for assets and information classification
Human Resources Security: prior to employment, during employment, and termination or change of employment
Physical and Environmental Security: secure areas and equipment security

This consists of:
~ Operational procedures and responsibilities
~ Third party service delivery management
~ System planning and acceptance
~ Protection against malicious ad mobile code
~ Back-up
~ Network security management
~ Media handling
~ Exchange of information
~ Electronic commerce services
~ Monitoring

This consists of:
~ Business requirement for access control  
~ User access management and responsibilities
~ Network access control
~ Operating system access control
~ Application and information access control
~ Mobile computing and teleworking
~ Security requirements of information systems
~ Correct processing in applications
~ Cryptographic controls
~ Security of system files
~ Security in development and support processes
~ Technical vulnerability management 

This consists of:
~ Information Security Incident Management   
        ~ Reporting information security events and weaknesses 
        ~ Management of information security incidents and improvements
~ Business Continuity Management
        ~ Information security aspects of business continuity management 
~ Compliance 
        ~ Compliance with legal requirements 
        ~ Compliance with security policies and standards, and technical                                  compliance                                                                                                                               ~ Information systems audit considerations

© Copyright 2021 A & A Consulting Limited - All Rights Reserved

This page was created with Mobirise