Corporate Data Management, Cyber Security& Forensic Computing

Introduction

As our lives and businesses become increasingly dependent on computer systems and communication technologies, there is the need enhance the dependability of these systems. The Internet has grown in sophistication and has emerged as the new battleground of the 21st century. From cyber criminals hacking systems of major organisations to situation where nations are attacking nations. Governments are now formulating measures and laws to protect national IT architecture.

This Mandatory and Continuous Professional Development (MCPD) programme was initiated in order to coordinate efforts toward developing capacities needed to create a more secure country and the world at large. It will provide an unparalleled opportunity to learn current techniques and emerging issues in managing corporate data, privacy, cyber threats and application and communication vulnerabilities.

CPN intends to make this edition of MCPD programme a premier interdisciplinary platform where experienced practitioners, researchers and educators have been invited as speakers and instructors to present the most recent innovations, trends, and concerns, as well as practical challenges encountered and solutions in the fields of corporate data management, cyber security and computer forensic.


Content

i. Data management techniques

ii. Data quality management

iii. Business intelligence management

iv. Privacy management

v. Modern authentication strategies

vi. Access management

vii. Introduction to Information Security

viii. Data and application security

ix. Cloud data security

x. Mobile application security

xi. Security operations

xii. Intrusion prevention and detection techniques

xiii. Multi-party signature schemes 

xiv. Cyber-attacks and countermeasures

xv. Managing mobile malware 

xvi. Addressing newly emerging cyber crimes

xvii. Techniques for attacks analysis and detection

xviii. Information security risk assessment techniques

xix. Use of cyber security tools

xx. Use of computer forensic tools


Who Should Attend

Security professionals, Directors and managers of IT, Data  managers and scientists, team leaders, project team members, Software and hardware engineers, Network engineers, Lecturers, sales managers/representatives, IT Professionals, project office staff members, and anyone interested in IT Security from private and public organisations. 

Learning Method

Lecture, individual and group exercise, action learning workshop and case studies, and group discussions

Early Registration(Before Aug. 10th  Member = 60,000     Non Member = 65,000

Late Registration(After Aug. 10th     Member= 65,000      Non Member = 70,000





Tuesday Sep 12, 2017 to Thursday Sep 14, 2017

NGN 80000.00 (Members)
NGN 85000 (Non-Members)

JOS
ICT COMPLEX II SHELL LAB, NARAGUTA CAMPUS, UNIVERSITY OF JOS, JOS

Register Now Send to a friend






Related Events

Back to top