Preview

Information Security Governance and Cloud Computing

Good Essays
Open Document
Open Document
598 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security Governance and Cloud Computing
A WALK THROUGH THE STANDARDS THAT APPLY IN IT: FROM INFORMATION SECURITY TO GOVERNANCE AND CLOUD COMPUTING
ISACA APPROVED 6 CPEs Offered

TÜV AUSTRIA ACADEMY

TIRANE PRO-TIK Innovation Center close to AKSHI, Rruga, Papa Gjion Pali II, Nr 3, Tirane

SEMINAR at

22 / 01 / 2013 Cost: 290€ per participant

40% discount for all TÜV AUSTRIA Hellas clients 20% discount for all TÜV clients that have already accepted our quotations but audit has not yet finished
ABOUT THIS COURSE
Are ISO (International Standardization Organization) and 27001 unknown words and just plain numbers? Is IT Service Management just a fancy way of saying nothing at all? Is BS 25999 something people should know about? Who is playing with the numbers 25999, 25777, 7799, 27799? Do you want to know what the name TUV, APMG, ITSMF, ISACA, ISEB, HISP and CSA stand for? Join this training course to get a firm understanding on the standards, the organizations and the principlas that lie behind these numbers and names. There are no prerequisites for the participation.

CONTENT
This training course is in fact a walk through the IT domain. The different areas that will be covered include: • IT Service Management • Information Security • IT Governance • Information Security Risk Management • Business Continuity • Disaster Recovery • Green IT • Cloud Computing

Tutor: Mrs ARGYRO CHATZOPOULOU, M.Sc., TÜV AUSTRIA HELLAS IT Manager, ISMS, QMS, BCMS and ITSMS Lead Auditor, recognized IRCA Tutor, with more than 400 hours of training in relevant courses. Ms Chatzopoulou also holds the following qualifications : CISA, HISP, ISEB BCMP, CCSK

WHAT YOU WILL LEARN
After the completion of this training course you will be acquainted with the most important standards that can be enforced in the IT industry. You will know the differences between the standards ISO 27001 and ISO 20000. You will be able to describe the difference in meaning between IT Service Management System and ITIL. You will gain

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The continued use of ISO 9000 standards The adoption of ISO 14000 standards Six Sigma training for employees Usage of TQM tools References Apollo Group Inc. (2014). Riordan Manufacturing. Retrieved from https://ecampus.phoenix.edu/secure/aapd/CIST/VOP/Business/Riordan/Ops/SupplyC hain.asp?hangzhou ASQ (2004).…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISM 3113 Week 2

    • 450 Words
    • 2 Pages

    Project Scope for the TMIS system will include the implementation of the hardware and software needed to run the online training center. This will include network communications needs that will allow for multiple courses and clients on the system at once. The software will include multiple courses including in Windows Office XP applications, SQL, Visual Basic, Visual C++, Java, and the Microsoft .NET application development environment. We also plan to offer courses necessary to prepare students for industry certification, including A+, MCSE, MCSD, MOUS, NetWare, and GroupWise. Possible constraints to the project include high network traffic, slow performance, and budget.…

    • 450 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The course equips the student with the necessary skills in administer different network platforms in terns of network users and shared resources.…

    • 4489 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Get and deform IT skills including how to manage with cryptography, IT assessments and IT audits.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    UW 330 Syllabus

    • 1576 Words
    • 7 Pages

    This course is an introduction to the fundamentals of information technologies and to the strategic opportunities and challenges presented by these technologies. The course is based on the belief that business opportunities and challenges are best addressed through a fundamental understanding of management and technological concepts. Topics covered include e-business, collaboration through IT, databases, telecommunication technologies, and IT security. While there is some introduction to technical details, the real impact of this class is gained by understanding the impact of technology on how business is done.…

    • 1576 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Dsc340 Hw1

    • 1721 Words
    • 7 Pages

    This is an introductory course on how information technologies (IT) are applied in business. After completing the class, you should • • • • • Have a basic understanding of computing technology. Have a basic understanding of the Internet and related technologies. Understand how business strategy and technology strategy are intertwined. Gain an appreciation of the challenges to the development of information systems (IS). Be in a position to help develop IT solutions for a business.…

    • 1721 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Info Systems Syllabus

    • 2463 Words
    • 10 Pages

    COURSE DESCRIPTION The information era of today requires students be equipped with an understanding of how to effectively utilize information technologies. This course provides an overview and hands-on practice of information technology at all levels of an organization including transactional processing systems, database management, decision support systems, enterprise information systems, and e-commerce applications. Lec 3, Cr 3…

    • 2463 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Information Security Governance can be defined specifically as the methods and processes that an organization or business will utilize as a means of controlling their IT Security Management program. There is an important distinction which needs to be made however as governance should be considered as separate from IT Security Management as a discipline that is based around the need to identify and control risks.…

    • 1212 Words
    • 5 Pages
    Good Essays
  • Best Essays

    554 Infrastructure

    • 3120 Words
    • 13 Pages

    This course focuses on the managerial level of knowledge and terminology for telecommunications and computer networks. This course covers the concepts and application of the Internet; server and storage architectures; and regulatory considerations.…

    • 3120 Words
    • 13 Pages
    Best Essays
  • Satisfactory Essays

    NTC 405

    • 418 Words
    • 2 Pages

    Throughout the last five weeks of this class I have done a lot text book reading and internet research. During all of my studying and research I have been reminded that even after 14+ years of working with Information Technology (IT), more specifically networking and telecommunications, I still have a lot of learning to do.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Studt Guide

    • 1311 Words
    • 6 Pages

    Before you begin this course it is important to keep in mind some important concepts…

    • 1311 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Syllabus IT/205

    • 2628 Words
    • 11 Pages

    This course introduces students to the world of information technology. Students will examine the technology concepts included in business systems, networking and project management and explore the systems development life cycle. Specific topics for the course include: hardware components, software applications, operating systems, databases, programming, as well as the security, privacy, and safety issues associated with information technology.…

    • 2628 Words
    • 11 Pages
    Satisfactory Essays
  • Powerful Essays

    Richter’s CIO is facing two major decisions – is the current IT structure appropriate to meet the growing demands of the overall organization and to what extent should IT at affiliates be centrally controlled.…

    • 2100 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    For any business, the need to protect its assets is just as important as the need to maintain or increase its bottom line. If a business does not, will not, or can not enact a sufficient security plan that is the equal to or greater than its needs, it may find itself rapidly losing its assets, its monies, or completely out of business. In addition to a robust security policy, there must also be robust standards put into place to clearly define the roles the employees, as well as the management, must play in order to properly enact those roles.…

    • 1124 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Itil Version 3 Paper

    • 11361 Words
    • 46 Pages

    • a means of delivering value to customer by a means of delivering value to customer by • facilitating outcomes customers want to achieve • without the ownership of specific costs and risks…

    • 11361 Words
    • 46 Pages
    Good Essays