+254 721 331 808    training@upskilldevelopment.com

Information Security Governance and Audit Training Course

NOTE: To view the training dates and registration button clearly put your mobile phone, tablet on landscape layout. Thank you

Online Training Registration

Training Mode Platform Fee Enroll
Online Training Zoom/ Google Meet 900USD Register

Classroom/On-site Training Schedule

Course Date Location Fee Enroll
18/05/2026 to 22/05/2026 Nairobi 1,500 USD Register
18/05/2026 to 22/05/2026 Mombasa 1,750 USD Register
18/05/2026 to 22/05/2026 Kigali 2,500 USD Register
15/06/2026 to 19/06/2026 Nairobi 1,500 USD Register
15/06/2026 to 19/06/2026 Dubai 4,500 USD Register
20/07/2026 to 24/07/2026 Nairobi 1,500 USD Register
20/07/2026 to 24/07/2026 Mombasa 1,750 USD Register
17/08/2026 to 21/08/2026 Nairobi 1,500 USD Register
17/08/2026 to 21/08/2026 Kigali 2,500 USD Register
21/09/2026 to 25/09/2026 Nairobi 1,500 USD Register
21/09/2026 to 25/09/2026 Mombasa 1,750 USD Register
21/09/2026 to 25/09/2026 Dubai 4,500 USD Register
19/10/2026 to 23/10/2026 Nairobi 1,500 USD Register
16/11/2026 to 20/11/2026 Nairobi 1,500 USD Register
16/11/2026 to 20/11/2026 Mombasa 1,750 USD Register

Course Introduction

The Information Security Governance and Audit Training Course is an advanced professional program designed to equip participants with the knowledge and skills required to evaluate, design, and audit information security governance frameworks within organizations. In an increasingly digital and interconnected world, safeguarding information assets has become a critical priority for businesses, governments, and institutions.

This course provides a strong foundation in information security governance principles, cybersecurity frameworks, and IT audit methodologies. Participants will learn how information security policies are developed, implemented, and monitored, and how governance structures ensure alignment between security objectives and organizational strategy.

A key focus of the program is auditing information security controls, including access management, data protection mechanisms, network security controls, and incident response systems. Learners will explore how auditors assess whether security controls are effective in protecting sensitive data and mitigating cyber risks.

Participants will also gain practical knowledge in security risk assessment and compliance auditing, including evaluation of ISO 27001 standards, NIST frameworks, regulatory requirements, and internal control systems. The training highlights how organizations ensure confidentiality, integrity, and availability of information assets through structured governance practices.

The course further explores emerging challenges in information security such as ransomware attacks, cloud security risks, insider threats, AI-driven cyberattacks, and data privacy regulations. Learners will understand how evolving technologies are reshaping security governance and audit requirements across industries.

By the end of the course, participants will be able to assess information security governance frameworks, conduct security audits, and recommend improvements to strengthen cyber resilience. The program prepares professionals to enhance organizational security posture and ensure robust protection of critical information systems.

Duration

5 days

Who Should Attend

  • Information security auditors responsible for evaluating cybersecurity controls and governance systems

  • IT auditors conducting assessments of information systems and digital infrastructure

  • Cybersecurity professionals managing risk, compliance, and security operations

  • Risk management professionals assessing information security risks and exposures

  • Compliance officers ensuring adherence to data protection and security regulations

  • Chief information security officers (CISOs) overseeing enterprise security governance

  • Internal auditors reviewing IT controls and security frameworks

  • Network security engineers involved in safeguarding organizational systems

  • Data protection officers managing privacy and information security compliance

  • Consultants advising organizations on cybersecurity governance and audit frameworks

Course Objectives

  • Equip participants with a comprehensive understanding of information security governance and audit frameworks to evaluate, design, and strengthen cybersecurity controls while ensuring alignment with organizational risk management and compliance requirements

  • Develop the ability to assess information security governance structures and policies within organizations

  • Enable learners to conduct structured information security audits across IT systems and infrastructure

  • Strengthen skills in evaluating access controls, authentication mechanisms, and identity management systems

  • Train participants to assess cybersecurity risks including malware, ransomware, and insider threats

  • Build competency in evaluating compliance with international security standards such as ISO 27001 and NIST

  • Enhance understanding of data protection laws and regulatory compliance requirements

  • Prepare professionals to evaluate incident response and disaster recovery frameworks

  • Enable participants to communicate security audit findings effectively to management and stakeholders

  • Develop leadership capability in strengthening information security governance and organizational cyber resilience

Comprehensive Course Outline

Module 1: Foundations of Information Security Governance

  • Introduction to information security governance principles and their role in protecting organizational information assets and ensuring cybersecurity resilience across enterprise systems

  • Overview of governance structures and their alignment with IT security strategies

  • Understanding confidentiality, integrity, and availability (CIA triad) principles

  • Role of auditors in evaluating security governance effectiveness

Module 2: Information Security Risk Management

  • Evaluation of information security risk identification and assessment methodologies

  • Assessment of threat modeling and vulnerability analysis techniques

  • Identification of cyber risk exposure across organizational systems

  • Integration of risk management into security governance frameworks

Module 3: IT Security Controls and Frameworks

  • Evaluation of IT general controls and application controls in security environments

  • Assessment of ISO 27001 and NIST cybersecurity frameworks

  • Identification of control weaknesses in information systems

  • Strengthening control design and implementation strategies

Module 4: Identity and Access Management Controls

  • Evaluation of user authentication and authorization mechanisms

  • Assessment of access control policies and privileged access management

  • Identification of identity security risks and vulnerabilities

  • Strengthening identity governance frameworks

Module 5: Network and Infrastructure Security Auditing

  • Evaluation of network security architectures and protective controls

  • Assessment of firewall, intrusion detection, and prevention systems

  • Identification of infrastructure vulnerabilities and misconfigurations

  • Strengthening network defense and monitoring systems

Module 6: Data Protection and Privacy Compliance

  • Evaluation of data protection policies and regulatory compliance requirements

  • Assessment of data classification, encryption, and storage controls

  • Identification of privacy risks in organizational systems

  • Integration of data protection frameworks into security governance

Module 7: Incident Response and Cyber Resilience

  • Evaluation of incident response plans and procedures

  • Assessment of cyber incident detection and escalation mechanisms

  • Identification of gaps in disaster recovery and business continuity plans

  • Strengthening organizational cyber resilience strategies

Module 8: Cloud Security and Emerging Technologies

  • Evaluation of cloud security risks and shared responsibility models

  • Assessment of AI-driven cybersecurity threats and vulnerabilities

  • Identification of risks in IoT and emerging digital technologies

  • Integration of cloud governance into security audit frameworks

Module 9: Security Compliance and Audit Reporting

  • Evaluation of regulatory compliance requirements in cybersecurity governance

  • Assessment of audit reporting standards and documentation practices

  • Identification of non-compliance issues in security systems

  • Communication of audit findings to stakeholders and executives

Module 10: Information Security Audit Simulation and Capstone Project

  • End-to-end simulation of information security governance and audit processes

  • Practical evaluation of cybersecurity controls and governance frameworks

  • Development of information security audit reports with findings and recommendations

  • Presentation of cybersecurity audit outcomes demonstrating applied expertise

Training Approach

This course will be delivered by our skilled trainers who have vast knowledge and experience as expert professionals in the fields. The course is taught in English and through a mix of theory, practical activities, group discussion and case studies. Course manuals and additional training materials will be provided to the participants upon completion of the training.

Tailor-Made Course

This course can also be tailor-made to meet organization requirement. For further inquiries, please contact us on: Email: training@upskilldevelopment.com Tel: +254 721 331 808

Training Venue 

The training will be held at our Upskill Training Centre. We also offer training for a group (at a discount of 10% to 50%) at requested location all over the world. The Onsite course fee covers the course tuition, training materials, two break refreshments, buffet lunch, airport transfers, Upskill gift package, and guided tour.

Visa application, travel expenses, dinners, accommodation, insurance, and other personal expenses are catered by the participant

Certification

Participants will be issued with Upskill certificate upon completion of this course.

Airport Pickup and Accommodation

Airport pickup and accommodation is arranged upon request. For booking contact our Training Coordinator through Email: training@upskilldevelopment.com, +254 721 331 808

Terms of Payment:

Unless otherwise agreed between the two parties’ payment of the course fee should be done 3 working days before commencement of the training so as to enable us to prepare better.

Online Training Registration

Training Mode Platform Fee Enroll
Online Training Zoom/ Google Meet 900USD Register

Classroom/On-site Training Schedule

Course Date Location Fee Enroll
18/05/2026 to 22/05/2026 Nairobi 1,500 USD Register
18/05/2026 to 22/05/2026 Mombasa 1,750 USD Register
18/05/2026 to 22/05/2026 Kigali 2,500 USD Register
15/06/2026 to 19/06/2026 Nairobi 1,500 USD Register
15/06/2026 to 19/06/2026 Dubai 4,500 USD Register
20/07/2026 to 24/07/2026 Nairobi 1,500 USD Register
20/07/2026 to 24/07/2026 Mombasa 1,750 USD Register
17/08/2026 to 21/08/2026 Nairobi 1,500 USD Register
17/08/2026 to 21/08/2026 Kigali 2,500 USD Register
21/09/2026 to 25/09/2026 Nairobi 1,500 USD Register
21/09/2026 to 25/09/2026 Mombasa 1,750 USD Register
21/09/2026 to 25/09/2026 Dubai 4,500 USD Register
19/10/2026 to 23/10/2026 Nairobi 1,500 USD Register
16/11/2026 to 20/11/2026 Nairobi 1,500 USD Register
16/11/2026 to 20/11/2026 Mombasa 1,750 USD Register

Some of Our Recent Clients

Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses

Training that focuses on providing skills for work?

We support the development of a skilled and confident workforce to meet the changing demands of growing sectors by offering the best possible training to enable them to fulfil learning goals.

Make a Mark in You Day to Day work