Combating Cyber Crimes



👤 By 🕓 Posted: 18 / 09 / 2014 | 👁 Views: 2,905


AFRALTI jointly with Uganda Communications Commission (UCC) and the East African Communications Organisation (EACO) is running a five day course on Combating Cyber Crimes, the course will take place at Hotel Africana starting from 17th to 21st November 2014.

Course Overview

Today, the Internet has become an integral part of modern societies with over 2.4 billion users connected in the world. This has in turn created a new realm for malicious users to perpetrate fraud, theft and forgery and transmit illegitimate content just as it happens in the traditional offline setup.

Government agencies, business organisations and individuals are nowadays depending on the Internet to fulfil their obligations and business objectives. With the sophistication cyber attacks, availability of user-friendly attack tools, loopholes in legal frameworks, organised online crimes, vulnerabilities in hardware and software systems, cyber security continues to be the greatest concern.

This intensive 5-day course discusses the safeguards that should be taken to ensure that government agencies, business organisations and end users benefit from the full advantages of Internet. The course also prepares participants for security related certifications like CISA, CISM, CISSP among others.

 Target Audience

This course will significantly benefit ICT professionals who design, build and manage enterprise information security, and anyone who is concerned about the integrity of the cyber world.

  Pre-requisite/s

  • Participants should possess at least one year of IT or related experience with additional understanding of critical areas of business operations
  • Experienced professionals with 3 years or more experience from the security, risk management, facility, IT security, business operations who have direct or indirect responsibilities are encouraged to attend.

 Pain Points

Information Security management is poised with numerous challenges that deter it from achieving the core objectives namely:

  • Authenticity which allows trustful operations by guaranteeing that the handler of information is whoever s/he claims to be.
  • Confidentiality which is understood in the sense that only authorized users can access the information, thus avoiding this information being spread among users who do not have the proper rights.
  • Availability which refers to being able to access information whenever necessary, thus guaranteeing that the services offered can be used when needed.
  • Integrity is the quality which shows that the information has not been modified by third parties, and ensures its correctness and completeness.

 Value Proposition

A new study reveals that boardroom executives are still unaware of cyber threats, much to the chagrin of those working in information security. Information security requires a clear understanding of relevant technological issues and of the social/organisational issues, as well as the relationships between them. This workshop covers these concerns by:

  • Offering modules that cover security technologies, incident response and digital investigations, network security implementations as well as information security from a management perspective.
  • Providing a curriculum that is relevant to the changing needs of the Information Security industries and professions.
  • Adopting the philosophy that security has to be baked in to the business – and not just at a cyber level.  Security is a business issue, and has to include how people operate; how information is used (including via telephone, paper and any other way).

 

Combating Cyber Crimes – Technical, Legal and Regulatory Measures – Course Outline

Registration Form – AFRALTI, UCC, EACO Workshops
Upcoming course

Spectrum Utilization and Harmonization