Information Security Manager Core Skills

The Information Security Manager Influences the organisation, customers, suppliers, partners and peers on cyber security and information assurance. The manager also builds appropriate and effective business relationships. Makes decisions which impact the success of assigned work, i.e. results, deadlines and budget and has significant influence over the allocation and management of resources appropriate to given assignments.
The manager also establishes milestones and has a significant role in the assignment of tasks and/or responsibilities. Advises on the available standards, methods, tools and applications relevant to own specialism and can make appropriate choices from alternatives. Analyses, designs, plans, executes and evaluates work to time, cost and quality targets. Assesses and evaluates risk.
Communicates effectively, both formally and informally. Demonstrates leadership. Facilitates collaboration between stakeholders who have diverse objectives. Takes all requirements into account when making proposals. Takes initiative to keep skills up to date. Mentors colleagues. Maintains an awareness of developments in the industry.

Read More

Cyber Security 101

To provide a base from which candidates can specialise further. Content include the threat environment, cryptography, protocols, technical security, attack tools, management and solutions.

DURATION: 5 months

OFFERING TYPE

  1. Contact learning (in partnership with CPUT & F’SATI) R 19 400 incl. VAT
  2. E-learning R 6 500 incl. VAT
     

REQUIREMENTS:  IT background (formal or experience)

 

COURSE OUTLINE

  • Threat environment
  • Malware, ransomware, social engineering attacks 
  • Attack process
  • Security protocols
  • Elementary encryption
  • Cryptanalysis
  • Cyber criminology
  • Governance
  • Analysis & Controls

TOOLS

  • Dark Web, Steganography, Encryption
  • Wireshark, Kali Linux
  • Reconnaissance, Putty, etc.

Cyber Forensics Level 1

Study forensics principles, tools and processes.

DURATION

Contact Learning: 5 days
E-learning: 5 months

OFFERING TYPE

  1. Contact learning R 15 400 incl. VAT
  2. E-learning R 6 500 incl. VAT

INTENDED AUDIENCE

Professionals intending to follow a career in the cyber forensics, cyber investigations and incident response fields.

REQUIREMENTS: Cyber security 101 or similar

COURSE OUTLINE

  • Forensic investigation process
  • Cyber crime
  • Evidence handling techniques and processes
  • Reporting of findings
  • Laws, regulations and procedures
  • Capturing data (imaging process)
  • Extracting data (including hidden data)
  • Passwords and encryption
  • Forensic Tools (software and hardware)
  • Seizing information
  • Cyber investigations
  • Operating systems and file systems forensics
  • Data acquisition and shadow copies
  • Timelines, Recovering data
  • Log capturing, analysis and event correlation
  • Metadata and encrypted data
  • Steganography, Analysis of data

Penetration Testing Level 1

Study penetration techniques, processes, regulations and the technical environment.

DURATION: 5 months

OFFERING TYPE

  1. E-learning R 6 500 incl. VAT
     
Read More

Cyber Analysis Level 1

Finding information in the open and closed domain relative to the established threat profile. Data analysis to
provide intelligence to upper analysis and operational levels.

DURATION
Contact Learning: 5 days
E-learning: 5 months

OFFERING TYPE

  1. Contact learning  R 15 400 incl. VAT
  2. E-learning R 6 500 incl. VAT
Read More

Cyber Security Governance

Study governance techniques and tools, including risk management and implementing effective controls.

DURATION 5 months

OFFERING TYPE

  1. E-learning R 6 500 incl. VAT
     
Read More

Cyber Security Management: Threats & Effective Controls

Effective cyber security management to control threats and implement solutions.

DURATION: 1 week

OFFERING TYPE

  1. Contact learning R 15 400 incl. VAT

 

Read More

Programming Security: Failures & Countermeasures

Study programming failures, secure programming techniques and countermeasures

DURATION: 5 months

OFFERING TYPE

  1. E-learning R 6 500 incl. VAT
     

INTENDED AUDIENCE
Programmers, software developers, application developers.

REQUIREMENTS: Cyber security 101 or similar, experience in software development.

COURSE OUTLINE
• The Secure systems design and principles
• Secure programming techniques
• Malware
• Buffer overflows
• SQL Injection
• Password security
Cross-site scripting
• Cryptography
• Countermeasures