Home » Enterprise Information Security Foundational Course
Loading Events

Elevate Your Cybersecurity Career with UA&P CRC’s Enterprise Information Security (EIS) Foundational Course!

In today’s digital landscape, safeguarding information is paramount. With cyber threats continuously evolving, organizations need skilled professionals who can effectively protect data and manage complex regulations. At the University of Asia and the Pacific (UA&P), our Enterprise Information Security (EIS) Foundational Course is specifically designed to provide cybersecurity professionals with the essential and up-to-date knowledge and skills to excel in this critical field.

Course Description

The Enterprise Information Security Foundational Course is a 36-hour instructor-led training designed to equip cybersecurity professionals with the essential and up-to-date knowledge and skills to safeguard organizational data and infrastructure. This comprehensive course covers fundamental concepts of information security, threat management, assessment and validation, and defense management. Learners will learn to implement robust security measures, develop effective security policies, and ensure compliance with legal and regulatory requirements. The course is ideal for those looking to enhance their cybersecurity expertise and effectively protect their organization against evolving cyber threats.

Course Objectives

By the end of this course, learners will be able to:

1. Understand Information Security Fundamentals: Grasp the core concepts, principles, and importance of information security in an organizational context.
2. Apply Security Governance Principles: Evaluate and implement security governance principles, ensuring adherence to legal, regulatory, and compliance requirements.
3. Develop and Implement Security Policies: Create, document, and enforce effective security policies, standards, procedures, and guidelines.
4. Enhance Threat Management Skills: Build capabilities to detect, respond to, and manage internal and external cyber threats.
5. Conduct Security Assessments and Testing: Use various methodologies to assess, test, and validate information security controls and manage vulnerabilities.
7. Implement Defense Mechanisms: Apply principles of defense in depth, implement defensive and preventive controls, and utilize endpoint, network, and cloud security technologies.
8. Foster a Security-Aware Culture: Establish and maintain security awareness, education, and training programs within the organization.

Course Outcomes

Upon completing our course, learners will possess highly sought-after skills and knowledge in the cybersecurity industry. Whether advancing in their current role, seeking new job opportunities, or pursuing future certifications, our course is a first step towards their information security career growth.

Learners will receive a Certificate of Completion from the University of Asia and the Pacific if they attend at least 3 out of the 4 training days and a Certificate of Recognition if they pass the EIS Assessment Exam. These Certificates not only validate their newly acquired skills and knowledge but also enhance your professional credibility, making you a valuable asset to any organization.

The University of Asia and the Pacific is renowned for its exceptional academic and continuing real-world education programs grounded in liberal education. This approach ensures you receive a well-rounded education that cultivates intellectual discipline—essential for specialized knowledge. At UA&P, a supportive learning environment prepares you to make a significant impact in your career.

Instructors

Learners will learn from seasoned industry professionals and cybersecurity experts dedicated to their success. Our instructors provide professional support, share practical insights, and help them develop the core competencies needed as a information security professional:

Paolo Pedro C Martinez, MSEM, CISSP, GSOM, CHFI, CIH, CTIA, AWS CCP, ITIL4

Engr. Martinez graduated with a Bachelor of Science in Computer Engineering and Master of Science in Engineering Management (Risk and Reliability Management) in Mapua University, a premier Engineering and Technological School in the Philippines. He also finished his executive diploma degree in Cybersecurity.

His professional experience focused on Leading Security Operations, Digital Forensics and Incident Response, Cyber Investigation, Litigation, and Cyber security Transformation on local, multinational, and global organizations. Paolo was certified on various information security certifications such as Certified Information Systems Security Professional (CISSP), GIAC Security Operations Manager, Certified Incident Handler (CIH), Certified Hacking and Forensics Investigator (CHFI), and Certified Threat Intelligence Analyst (CTIA). Also, is certified in IT Service Management (ITIL) and cloud technology (AWS Certified Cloud Professional). He is also one of the Scientific and Technological Specialists in the Philippines that was awarded by the Department of Science and Technology.

Nathanael S. Alcain, ECE, CISSP, NCSP, CCNA

Engr. Alcain is a seasoned information security expert with over a decade of experience. He holds prestigious certifications including CISSP, CompTIA Security+, Fortinet NSE4 Security Professional, Fortinet NSE5 Security Analyst, and Cisco Certified Network Associate with a perfect exam score. He specializes in security governance, technical practices, and advanced frameworks such as CIS Controls, Zero Trust Security, and NIST Cybersecurity Framework.

His expertise extends to security architecture, vulnerability management, identity and access management, and security standards. As an Information Security Trainer, he excels in delivering insights on Vulnerability Assessments and Penetration Testing, risk evaluation, and cybersecurity skills development. He also earned his degree in Electronics and Communications Engineering from the Professional Regulation Commission in the Philippines.

Who can Enroll

To ensure learners get the most out of this course, we recommend that they have:

> A basic understanding of IT concepts and networking.
> Some experience or background in information technology, cybersecurity, or a related field, recommended but mandatory
> Familiarity with information security policies and procedures is advantageous but not mandatory.

This course is also designed for a wide range of professionals, including but not limited to:

> Information Security Professionals: Enhance your existing skills and stay abreast of the latest threats and security practices.
> IT Managers: Gain a deeper understanding of security governance to better protect your organization’s data.
> Security Analysts: Develop advanced skills in threat management, assessment, and defense.
> Network Administrators: Secure network infrastructures and manage vulnerabilities effectively.
> Governance, Risk, and Compliance Officers: Ensure your organization adheres to regulatory and compliance requirements.
> Cybersecurity Consultants: Expand your expertise with cutting-edge security knowledge.
> IT Auditors: Improve your ability to evaluate and test information security controls.
> Career Shifters: Transition into the dynamic field of cybersecurity by gaining foundational knowledge and practical skills, even if you come from a non-technical background.
> Entry-Level Professionals: Kickstart your career in cybersecurity with a comprehensive introduction to the core principles, methodologies, and best practices in the industry. This course will equip you with the skills and confidence needed to begin your journey in this rapidly growing field.

Training Schedule

November 8, 9, 15, 16, & 23 (assessment exam), 2024

Course Fee

Php 37,500.00

Course Delivery

The lectures will be conducted online via Zoom. The link will be provided to the confirmed participants through their registered emails.

Enrollment Process

To ensure learners get the most out of this course, we recommend that they have:

1. Fill out the online registration form.
2. Wait for an email notification from CRC.
3. Provide the required information for the billing request and wait for the invoice.
4. Pay at least 50% of the course fee thru cash or bank transfer and email deposit slip or proof of payment to CRC.
5. Wait for an email confirmation from CRC and the official receipt of your payment.

Course Outline

Enterprise Information Security Foundational Course

 

 

The Center for Research and Communication  (CRC) is the research and communication arm of the University of Asia and the Pacific (UA&P). CRC also offers another upskilling course called Data Protection Officer (DPO) Foundational Course and in-house training for both the EIS and DPO Foundational Courses. For inquiries, email: [email protected].