Praha (14 000 Kč)
Brno (14 000 Kč)
Bratislava (600 €)
Two-days course introduces terminology and principles in identifying and evaluating assets, vulnerabilities and threats on information security and the resulting risks on business continuity of corporations as well as government agencies.
General overview of the possibilities of information technology and threats
to information security
Security requirements in general
Concepts of confidentiality
(confidentiality), integrity (integrity), availability (availability). More
complex terms such as non-repudiation, privacy, safety, authenticity,
reputation
Concepts of business continuity and disaster recovery
The
relationship of information security to BCP and DR
Terms asset, valuation,
vulnerability, threat, risk
Roles of workers such as asset owner, risk
owner
Risk assessment in general
Relationship threat - risk
Asset
management
Risk assessment methodologies according to ISO 27005
Examples
of vulnerabilities in information technology
Examples of threats in
information technology
Examples of building a risk analysis on threats to
information technology
The prices are without VAT.