NOTE: To view the training dates and registration button clearly put your mobile phone, tablet on landscape layout. Thank you
| Training Mode | Platform | Fee | Enroll |
|---|---|---|---|
| Online Training | Zoom/ Google Meet | 900USD | Register |
| Course Date | Location | Fee | Enroll |
|---|---|---|---|
| 18/05/2026 to 22/05/2026 | Nairobi | 1,500 USD | Register |
| 18/05/2026 to 22/05/2026 | Mombasa | 1,750 USD | Register |
| 18/05/2026 to 22/05/2026 | Kigali | 2,500 USD | Register |
| 15/06/2026 to 19/06/2026 | Nairobi | 1,500 USD | Register |
| 15/06/2026 to 19/06/2026 | Dubai | 4,500 USD | Register |
| 20/07/2026 to 24/07/2026 | Nairobi | 1,500 USD | Register |
| 20/07/2026 to 24/07/2026 | Mombasa | 1,750 USD | Register |
| 17/08/2026 to 21/08/2026 | Nairobi | 1,500 USD | Register |
| 17/08/2026 to 21/08/2026 | Kigali | 2,500 USD | Register |
| 21/09/2026 to 25/09/2026 | Nairobi | 1,500 USD | Register |
| 21/09/2026 to 25/09/2026 | Mombasa | 1,750 USD | Register |
| 21/09/2026 to 25/09/2026 | Dubai | 4,500 USD | Register |
| 19/10/2026 to 23/10/2026 | Nairobi | 1,500 USD | Register |
| 16/11/2026 to 20/11/2026 | Nairobi | 1,500 USD | Register |
| 16/11/2026 to 20/11/2026 | Mombasa | 1,750 USD | Register |
Course Introduction
The Information Security Governance and Audit Training Course is an advanced professional program designed to equip participants with the knowledge and skills required to evaluate, design, and audit information security governance frameworks within organizations. In an increasingly digital and interconnected world, safeguarding information assets has become a critical priority for businesses, governments, and institutions.
This course provides a strong foundation in information security governance principles, cybersecurity frameworks, and IT audit methodologies. Participants will learn how information security policies are developed, implemented, and monitored, and how governance structures ensure alignment between security objectives and organizational strategy.
A key focus of the program is auditing information security controls, including access management, data protection mechanisms, network security controls, and incident response systems. Learners will explore how auditors assess whether security controls are effective in protecting sensitive data and mitigating cyber risks.
Participants will also gain practical knowledge in security risk assessment and compliance auditing, including evaluation of ISO 27001 standards, NIST frameworks, regulatory requirements, and internal control systems. The training highlights how organizations ensure confidentiality, integrity, and availability of information assets through structured governance practices.
The course further explores emerging challenges in information security such as ransomware attacks, cloud security risks, insider threats, AI-driven cyberattacks, and data privacy regulations. Learners will understand how evolving technologies are reshaping security governance and audit requirements across industries.
By the end of the course, participants will be able to assess information security governance frameworks, conduct security audits, and recommend improvements to strengthen cyber resilience. The program prepares professionals to enhance organizational security posture and ensure robust protection of critical information systems.
Duration
5 days
Information security auditors responsible for evaluating cybersecurity controls and governance systems
IT auditors conducting assessments of information systems and digital infrastructure
Cybersecurity professionals managing risk, compliance, and security operations
Risk management professionals assessing information security risks and exposures
Compliance officers ensuring adherence to data protection and security regulations
Chief information security officers (CISOs) overseeing enterprise security governance
Internal auditors reviewing IT controls and security frameworks
Network security engineers involved in safeguarding organizational systems
Data protection officers managing privacy and information security compliance
Consultants advising organizations on cybersecurity governance and audit frameworks
Equip participants with a comprehensive understanding of information security governance and audit frameworks to evaluate, design, and strengthen cybersecurity controls while ensuring alignment with organizational risk management and compliance requirements
Develop the ability to assess information security governance structures and policies within organizations
Enable learners to conduct structured information security audits across IT systems and infrastructure
Strengthen skills in evaluating access controls, authentication mechanisms, and identity management systems
Train participants to assess cybersecurity risks including malware, ransomware, and insider threats
Build competency in evaluating compliance with international security standards such as ISO 27001 and NIST
Enhance understanding of data protection laws and regulatory compliance requirements
Prepare professionals to evaluate incident response and disaster recovery frameworks
Enable participants to communicate security audit findings effectively to management and stakeholders
Develop leadership capability in strengthening information security governance and organizational cyber resilience
Introduction to information security governance principles and their role in protecting organizational information assets and ensuring cybersecurity resilience across enterprise systems
Overview of governance structures and their alignment with IT security strategies
Understanding confidentiality, integrity, and availability (CIA triad) principles
Role of auditors in evaluating security governance effectiveness
Evaluation of information security risk identification and assessment methodologies
Assessment of threat modeling and vulnerability analysis techniques
Identification of cyber risk exposure across organizational systems
Integration of risk management into security governance frameworks
Evaluation of IT general controls and application controls in security environments
Assessment of ISO 27001 and NIST cybersecurity frameworks
Identification of control weaknesses in information systems
Strengthening control design and implementation strategies
Evaluation of user authentication and authorization mechanisms
Assessment of access control policies and privileged access management
Identification of identity security risks and vulnerabilities
Strengthening identity governance frameworks
Evaluation of network security architectures and protective controls
Assessment of firewall, intrusion detection, and prevention systems
Identification of infrastructure vulnerabilities and misconfigurations
Strengthening network defense and monitoring systems
Evaluation of data protection policies and regulatory compliance requirements
Assessment of data classification, encryption, and storage controls
Identification of privacy risks in organizational systems
Integration of data protection frameworks into security governance
Evaluation of incident response plans and procedures
Assessment of cyber incident detection and escalation mechanisms
Identification of gaps in disaster recovery and business continuity plans
Strengthening organizational cyber resilience strategies
Evaluation of cloud security risks and shared responsibility models
Assessment of AI-driven cybersecurity threats and vulnerabilities
Identification of risks in IoT and emerging digital technologies
Integration of cloud governance into security audit frameworks
Evaluation of regulatory compliance requirements in cybersecurity governance
Assessment of audit reporting standards and documentation practices
Identification of non-compliance issues in security systems
Communication of audit findings to stakeholders and executives
End-to-end simulation of information security governance and audit processes
Practical evaluation of cybersecurity controls and governance frameworks
Development of information security audit reports with findings and recommendations
Presentation of cybersecurity audit outcomes demonstrating applied expertise
Training Approach
This course will be delivered by our skilled trainers who have vast knowledge and experience as expert professionals in the fields. The course is taught in English and through a mix of theory, practical activities, group discussion and case studies. Course manuals and additional training materials will be provided to the participants upon completion of the training.
Tailor-Made Course
This course can also be tailor-made to meet organization requirement. For further inquiries, please contact us on: Email: training@upskilldevelopment.com Tel: +254 721 331 808
Training Venue
The training will be held at our Upskill Training Centre. We also offer training for a group (at a discount of 10% to 50%) at requested location all over the world. The Onsite course fee covers the course tuition, training materials, two break refreshments, buffet lunch, airport transfers, Upskill gift package, and guided tour.
Visa application, travel expenses, dinners, accommodation, insurance, and other personal expenses are catered by the participant
Certification
Participants will be issued with Upskill certificate upon completion of this course.
Airport Pickup and Accommodation
Airport pickup and accommodation is arranged upon request. For booking contact our Training Coordinator through Email: training@upskilldevelopment.com, +254 721 331 808
Terms of Payment:
Unless otherwise agreed between the two parties’ payment of the course fee should be done 3 working days before commencement of the training so as to enable us to prepare better.
| Training Mode | Platform | Fee | Enroll |
|---|---|---|---|
| Online Training | Zoom/ Google Meet | 900USD | Register |
| Course Date | Location | Fee | Enroll |
|---|---|---|---|
| 18/05/2026 to 22/05/2026 | Nairobi | 1,500 USD | Register |
| 18/05/2026 to 22/05/2026 | Mombasa | 1,750 USD | Register |
| 18/05/2026 to 22/05/2026 | Kigali | 2,500 USD | Register |
| 15/06/2026 to 19/06/2026 | Nairobi | 1,500 USD | Register |
| 15/06/2026 to 19/06/2026 | Dubai | 4,500 USD | Register |
| 20/07/2026 to 24/07/2026 | Nairobi | 1,500 USD | Register |
| 20/07/2026 to 24/07/2026 | Mombasa | 1,750 USD | Register |
| 17/08/2026 to 21/08/2026 | Nairobi | 1,500 USD | Register |
| 17/08/2026 to 21/08/2026 | Kigali | 2,500 USD | Register |
| 21/09/2026 to 25/09/2026 | Nairobi | 1,500 USD | Register |
| 21/09/2026 to 25/09/2026 | Mombasa | 1,750 USD | Register |
| 21/09/2026 to 25/09/2026 | Dubai | 4,500 USD | Register |
| 19/10/2026 to 23/10/2026 | Nairobi | 1,500 USD | Register |
| 16/11/2026 to 20/11/2026 | Nairobi | 1,500 USD | Register |
| 16/11/2026 to 20/11/2026 | Mombasa | 1,750 USD | Register |
We support the development of a skilled and confident workforce to meet the changing demands of growing sectors by offering the best possible training to enable them to fulfil learning goals.
Make a Mark in You Day to Day work