ESAMI Offices

Short Courses

Information Communication Technology

The ICT programme has been widely acclaimed as one of the most competitive programmes in the region.
The programme covers specializations in the areas of Hardware, Software and Design in addition to equipping
the student with a wide range of skills and knowledge necessary for any Information Technology professional.

Sorry,the application deadline for this course has expired.

Course Title: Formulating ICT Security Policy - Nov 2017

Venue: ESAMI Headquarters, Arusha, TANZANIA  
Learning Duration:  2 weeks 
Starting: 6 Nov 2017  Ending: 17 Nov 2017
Fees: 1500 USD
Payment Details: to cover tuition and training materials only.

ICT Security Policy must ensure the organization's information is secured. A more effective concept of coming up with an ICT security policy is to develop a suite of policy documents to cover all information security bases; these can be targeted for specific audiences, making a more efficient process for everyone. This programme examines the elements that need to be considered when developing and maintaining information security policy and goes on to present a design for a suite of in- formation security documents and the accomplished development process. Participants will understand the key global trends in developing ICT security policies and the need for a guideline towards ICT security management.


At the end of the course participants will be able to:

  • Explore the major issues and challenges surrounding IT security policies
  • Develop effective ICT Security policies and information protection programs for preventing, deterring, deflecting, detecting and correcting destruction and disasters in information systems;
  • Explain the implementation details for the security policies framework through governance of ICT security policy at all levels of the organization.


Individuals who are responsible for planning, managing and auditing ICT resources in an organization.TOPICS INCLUDE

  • Security policies, Procedures and objectives;
  • Policy life cycle;
  • Approaches to policy formulation;
  • Important factors to consider in formulating ICT Security Policy;
  • Risk management;
  • Developing ICT security policy documents;
  • Implementation and management.

Course No:  2017-11-06-3-10-1669



14 May 2018
    BUSINESS SCHOOL CALENDAR FOR 2018   ESAMI Business School is inviting applications for its degree programmes scheduled to commence as below.   S/N VEN...
View More

Short Courses Calendar





facebook   twitter