
Cyber Security, Information Governance, Legal Risk Management, and Compliance
£5800.00
INTRODUCTION
In today's digitised world, organisations face increasing information threats, risks, audit requirements, legal regulations, and compliance standards. This engaging Al-Majd Pathways Centre (APC) training course, complete with practical case studies and workshops, equips participants with the knowledge of cyber security, data protection, risk reduction, global compliance standards, privacy requirements, and the use of ISO records management and ISO information security management to provide solutions.
This Cyber Security training course provides the latest skills and case studies on managing information, auditing controls, addressing legal regulations and standards, working safely online, and safeguarding sensitive information. Participants will learn how to manage cyber-related risks and apply information governance roles and responsibilities effectively. With cybercrime ranking as a significant global threat, a focus on cyber security is essential for any enterprise operating in today's data-driven environment.
This highly interactive APC training course covers data management principles, cyber security risks and mitigation measures, and networking essentials.
TRAINING OBJECTIVES
The Al-Majd Pathways Centre (APC) training course aims to help participants achieve the following critical objectives:
Understand cyber security risks in various stages of data management.
Identify and combat threats related to cyber security.
Address a wide range of cyber security risks, issues, and threats through effective controls and solutions.
Develop policies, communications, and strategies to address information governance, compliance, standards, legal, and audit requirements.
Improve security awareness and training.
Enhance cyber security strategies, review tools, and discuss security, confidentiality, and business solutions to reduce operational risks.
Gain a working knowledge of global industry standards and best practices in cyber security and information risk management.
Apply ISO standards, including ISO 15489 Records Management Compliance and ISO 27001 Information Security Management, to reduce threats and risks.
Familiarise with emerging technologies like Cloud, AI, IoT, and Blockchain.
WHO SHOULD ATTEND?
This training course is suitable for a wide range of Information Technology professionals, particularly:
Technology Engineers, Chief Technology Officers (CTOs), and Chief Information Officers (CIOs).
Chief Risk Officers.
Key Application Development and Data Research Personnel.
Professionals and leaders interested in cyber security strategies, information governance, and ISO standards.
Personnel working in IT systems management, legal, risk management, information security, projects, HR, and procurement.
Personnel transitioning into management and IT security roles looking to learn about the latest trends in cyber security, information audit, and risk management.
TRAINING METHODOLOGY
The Cyber Security training course combines presentations with interactive practical exercises, supported by video materials, activities, and case studies. Participants will actively engage in relating cyber security and information governance principles to their workplace needs. Case examples and studies involving the course leader's personal experiences will be extensively used.
TRAINING SUMMARY
This Al-Majd Pathways Centre (APC) training course equips participants with essential skills and best practice global standards to address complex cyber security and information governance requirements. In a connected world where cyber security risks and threats are on the rise, having the skills and knowledge to apply more effective solutions, policies, and practices is crucial while understanding the latest international compliance standards.
TRAINING OUTLINE
Day 1: Cyber Security and Information Security Management
Introduction to Cyber Security.
Online Threats, Risks, and Issues.
Business Continuity, Fraud, and Disaster Management.
ISO 27001 and Its Family of Standards.
Data, Information, and Records Governance.
Establishing Information Governance, Roles, and Responsibilities.
Day 2: Audit, Legal, Risk, and ISO Standards
Categorising Physical and Electronic Risks.
Audit, Legal Risks, and Compliance Management.
Document and Records Management Compliance.
ISO 15489 Records Management Review.
Applying ISO 27001 Information Security Controls.
Developing Policies, Procedures, and Standards.
Current Threat and Trend Analysis.
Day 3: Project, Implementation, and Training for New Technologies
Key Risk Indicator (KRI).
Project Implementation Plans and Controls.
Risk and Issue Management.
Developing a Business Continuity Plan.
Cybersecurity Incident Management.
Cybersecurity Crisis Management.
Day 4: Systems and IT Applications
Network Protocols and Communications.
Network Access.
Firewalls, Application, and Network Security.
Role-Based Access Controls and User Management.
Encryption Technologies and Standards.
Email and Web Security.
Cyber Security Systems.
Day 5: New Trends in Cybersecurity - Cloud, IoT, and Blockchain
Types of Cloud (Public, Private, Hybrid).
Blockchain Technology.
Hacking Principles.
Mathematics of Hacking.
Vulnerabilities in Systems and Tracing.
Proposal for a New Title.
Format: On-site and Online
Language(s): English and Arabic
Duration: One Week
Certificate of Completion: Upon successful completion of the program, participants will receive an Al-Majd Pathways Centre (APC) Certificate of Completion.
Customised training courses are available upon request, allowing for tailoring to specific organisational needs, goals, and branding.
Get in touch with us today.
Follow
Sign-up for our newsletter
0044 7466410010
©2025 All rights reserved.