• Home


Posted on 18 Apr, 2018



Information Security

4.5 (23)

Information security is becoming increasingly important. Globalization of the economy leads to a growing exchange of information between organizations (their employees, customers and suppliers) and a growing use of networks, such as the internal company network, connection with the networks of other companies and the Internet. Furthermore, activities of many companies now rely on ICT, and information has become a valuable asset. Protection of information is crucial for the continuity and proper functioning of the organization: information must be reliable In the Information Security Foundation module, based on ISO/IEC 27002 (ISFS), the basic concepts of information security and their coherence are tested.


Participants will learn
  • Prepare for and take the EXIN Information Security Foundation (ISF) exam based on ISO/IEC 27002
  • Confidently explain and define an array of security terminologies
  • Navigate the complexities of threats and risks in your organization
  • Maintain a robust security infrastructure that responds effectively to security incidents
  • Deploy security countermeasures against a wide range of malware attacks
  • Ensure compliance with vital information technology laws and regulations

Course Outcome

The ability to recognize, describe and apply:
  • The data, information, knowledge, wisdom continuum
  • The layers of the basic infrastructure and corresponding threats
  • The value of data and information
  • The impact of Information Security on an organization’s overall strategy
  • The aspects of information reliability
  • The types of threats to information security and the effects these threats have on information and its storage, processing, and distribution
  • The objectives and content of security policy
  • The critical components of a security organization
  • The importance of Incident Management and escalation.

Benefits of the Harmony information security training include:

  • Makes training easy and efficient with many delivery methods
  • Demonstrates fulfillment of compliance requirements by tracking course completion and evaluation results
  • Educates you and your staff on integrating regulatory and industry compliance and security into their everyday routine
  • Training based on internationally best practice and standards ISO 27002
  • Increases retention by engaging learners with hands on activities
  • Instructors are It Security professional practitioners

Target Audience

Anyone who wants a basic understanding, of information security, from entry-level personnel to executive managers. This course is also valuable for those seeking a career in information technology as well as those whose organizations are preparing for the ISO/IEC 27002 certification. This module can be a good start for new information security professionals.

Course Benefits

ISO/IEC 27000 is a globally-recognized set of standards that outlines best practices in information security for your organization. This course prepares you for the EXIN ISF Certification exam based on ISO/IEC 27002. You gain knowledge of standard security terminologies and practices needed to pass the examination. Workshops and practice exam questions provide you with practical experience preparing for the EXIN ISF Certification exam based on the ISO/IEC 27002.


Lecture and Exercises

Practical exercises and team assignments will be used to meet the learning objectives during the delivery of this accredited course. We will make use of exercises to enhance the reinforcement of the learning objectives in the syllabus.

Publication included
 The Basics of Information Security - A practical handbook

Exam format

  • Exam type: multiple choice exam
  • Number of questions: 40
  • Exam duration: 60 minutes
  • Pass rate: 65%

Course Content

1. Introduction to foundation course

a. Examination and certification goals

b. Blueprint of the Information Security Foundation exam

c. Assessing your initial readiness

2. Introduction to Information and Security

a. The concepts of information

b. Value of information

c. Reliability of aspect

3. Threats and Risks to the Organization

a. Threats and risks

b. Relationship between threats risks and the reliability of information

4. Approaches and organization

a. Security policy and security organization

b. Components

c. Incident management

5. Implementing Security Countermeasures

a. Importance of measures

b. Physical security measures

c. Technical measures

d. Organizational measures

6. Legislation

7. Exam preparation and review

8. Mock Exam


  • Lectures
  • Starts on 09 Apr 2018 to 13 Apr | 07 May 2018 to 11 May 2018 in Nairobi

Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
Our Blog
Information Security Courses


ISO 27001 ISMS Foundation Lead Implemntor & Auditor
30 Apr 2018 to 04 May 2018

Certified Information System Auditor (CISA)
14 May 2018 to 18 May 2018

Certified Information Security Manager (CISM)
21 May 2018 to 25 May 2018

Certified Information System Security Professional (CISSP)
25 Jun 2018 to 29 Jun 2018

Computer Hacking Forensics Investigator (CHFI)
04 Jun 2018 to 08 Jun 2018

Information Security Resilience Foundation & Practitioner

23 Jul 2018 to 27 Jul 2018


Do you wish to study this Course? Do not hesitate, Contact Us for more information