Information system security is the practice of protecting computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a critical aspect of modern technology and business operations as our dependence on digital information and communication continues to grow. This course takes the information security field as a whole and is well suited to anyone wondering what people mean when they use the term information security, or anyone interested in the field and wondering where to start. The course will begin with a basic introduction to Information Security covering its fundamental concepts and terminologies. Following this, you will understand the risk that comes with it. Moving ahead, you will gain a basic understanding of the information systems, and their development through the SDLC process. You will also learn about the most common and effective attacks on the weakest link by defining social engineering and explaining phishing, smishing, and vishing. Further in this course, you will learn what cryptography is, and about symmetric and asymmetric cryptography. Lastly, you will explore what Information Security Policy is. After completing this course, you will have gained an understanding of the core principles of information security to help you better protect your IT and business infrastructure, as well as the people of the organization.
The Protection of Personal Information Act, No 4 of 2013 (“POPIA”) will directly affect your business. The Act brings a wave of change after the grace period for full implementation expired on 1 July 2021. POPIA in itself is very technical and comprises of eight condtions for lawfull processing of personal information. POPIA entrench the fundamentals of fairness, risk and compliance. We aim to simplify the Act to make it practically applicable to your business and demistify the duties of the Information Officer and concepts such as the impact assessment, compliance framework and much more.
The Promotion of Access to Information Act (PAIA), Act No. 2 of 2000, seeks to, inter alia, give effect to the constitutional right of access to any information held by the state or by any other person where such information is required for the exercise or protection of any right.
Information system security is the practice of protecting computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a critical aspect of modern technology and business operations as our dependence on digital information and communication continues to grow. This course takes the information security field as a whole and is well suited to anyone wondering what people mean when they use the term information security, or anyone interested in the field and wondering where to start. The course will begin with a basic introduction to Information Security covering its fundamental concepts and terminologies. Following this, you will understand the risk that comes with it. Moving ahead, you will gain a basic understanding of the information systems, and their development through the SDLC process. You will also learn about the most common and effective attacks on the weakest link by defining social engineering and explaining phishing, smishing, and vishing. Further in this course, you will learn what cryptography is, and about symmetric and asymmetric cryptography. Lastly, you will explore what Information Security Policy is. After completing this course, you will have gained an understanding of the core principles of information security to help you better protect your IT and business infrastructure, as well as the people of the organization.
The Protection of Personal Information Act, No 4 of 2013 (“POPIA”) will directly affect your business. The Act brings a wave of change after the grace period for full implementation expired on 1 July 2021. POPIA in itself is very technical and comprises of eight condtions for lawfull processing of personal information. POPIA entrench the fundamentals of fairness, risk and compliance. We aim to simplify the Act to make it practically applicable to your business and demistify the duties of the Information Officer and concepts such as the impact assessment, compliance framework and much more.
The Promotion of Access to Information Act (PAIA), Act No. 2 of 2000, seeks to, inter alia, give effect to the constitutional right of access to any information held by the state or by any other person where such information is required for the exercise or protection of any right.
2025 © LabourSmart Training (Pty) Ltd. All Rights Reserved. | Developed and Hosted by Resolve Technology Solutions (Pty) Ltd | SEO by NextG