+123 012 034 056 info@yourmail.com
Select Page

Information Security Services Professionals Overview

The Threat landscape is basically excessively huge and complex, making it impossible to depend on a solitary, silver shot arrangement. Effective information security management requires an expansive blend of innovation, methodology, procedures, individuals and information security services – all lined up with business targets to guarantee operational achievement.

Why should one take this course?

  • To understand the regulatory, legal and compliance issues in information security for financial markets.
  • To know the provisions for business continuity plan.
  • To understand the security management practices and physical and environmental security.

Who will benefit from this course?

  • Students
  • Mid and senior level managers who are working in the field of IT security
  • People working with the IT and security-related department with the Brokers/Sub-brokers
  • Employees of IT companies/BPOs
  • Bank employees
  • Compliance officers

Information Security Services Professionals Syllabus

1. Security Policy

Security policy is a definition of what it means to be secure for a system, organization or other
entity. For an organization, it addresses the constraints on the behavior of its members as well as
constraints imposed on adversaries by mechanisms such as doors, locks, keys, and walls.

2. Security Models

A computer security model is a scheme for specifying and enforcing security policies. A security
model may be founded upon a formal model of access rights, a model of computation, a model of
distributed computing, or no particular theoretical grounding at all.

3. Physical Security

Physical security is the protection of personnel, hardware, software, networks, and data from physical actions
and events that could cause serious loss or damage to an enterprise, agency or institution. This includes
protection from fire, flood, natural disasters, burglary, theft, vandalism, and terrorism.

4. Communications and operations security

Information technology systems process large quantities of university data. These systems – which include
computers, networking equipment, mobile devices, storage media, and other IT components – must be
managed so as to protect information

5. Business Continuity Planning

The business continuity planning (BCP) is the creation of a strategy through the recognition of threats and
risks facing a company, with an eye to ensuring that personnel and assets are protected and able to function in
the event of a disaster.

6. Compliance

In general, compliance means conforming to a rule, such as a specification, policy, standard or law.
Regulatory compliance describes the goal that organizations aspire to achieve in their efforts to ensure that
they are aware of and take steps to comply with relevant laws and regulations

.
7. Access Control

In the fields of physical security and information security, access control is the selective restriction of access
to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to
access a resource is called authorization.