Information Security in the Banking Sector

Course Description

The course aims at forming an understanding of the risks associated with technology and its importance to the bank’s operations and its management. It focuses on the protection of technology, systems, and data from inappropriate modification or destruction. It teaches basic security fundamentals, concepts, and techniques that help to protect financial information.

Course Objectives
This course aims to:

  • Form an understanding the fundamentals of information security and how it is related to banking. 
  • Understand the types of security threats in banking and the ways to mitigate them. 
  • Teach best practices to help protect financial institutions. 

Course Outcomes
At the end of the course, the participants should be able to:

  • Protect financial information. 
  • Apply information security rules.
  • Implement the basics of information security. 
  • Protect financial institutions from cyber attacks. 

Who should Attend?
This course is suited for

  • Bank employees. 
  • Any employee working in financial institutions. 

Training Strategies

The following training strategies will be adopted for this course:

  • Interactive Lecture and discussion. 
  • Case studies and simulated practical situations. 

Delivery Plan

  • Fundamentals of information security for banking (day 1). 
  • Cybersecurity threats and protection (day 2). 
  • Information security policies and best practices (day 3).  
  • Social engineering and other types of attacks (day 4). 

Month
Starts December, 4, 2022 Ends December, 8, 2022

Duration

Hours per Day: 2
Number of Days: 4
Total no. of Hours: 8 hours

Timing
Afternoon from 5:00 p.m till 7:00. p.m

Language

The course is taught in English, but  Kurdish support can be available if necessary. 

Certification

Professional and Executive Education Centre, University of Kurdistan Hewlêr. 

Trainer Biography

Akam Omer is a cybersecurity expert and a data security specialist. He has been working in the field of information technology for over 20 years. He began his career as a software developer but soon found that his skills were better suited to data security and management. As a cybersecurity expert, he specializes in protecting data from hackers, viruses, and other threats. As an information management professional, his focus is on improving how to manage the data collected by companies around the world so that it can be accessed quickly and easily whenever necessary without compromising its integrity or security.