Course Outline

The syllabus includes training objectives, details of modules, and a recommended reading list:

The latest syllabus

1. Information Security Management Principles

  • Identify definitions, meanings, and the use of concepts and terms across information security management.
  • Explain the need for and the benefits of information security in government operations.

2. Information Risk

  • Outline the threats to and vulnerabilities of information systems used for government purposes.
  • Describe the processes for understanding and managing risk related to information systems at strategic, tactical, and operational levels for government.

3. Information Security Framework

  • Explain how risk management should be implemented within an organization for government use.
    • The organization’s management of information security.
    • Organizational policy, standards, and procedures relevant to government operations.
    • Information security governance in a public sector context.
    • Information security implementation for government systems.
    • Security incident management in government environments.
  • Interpret general principles of law, legal jurisdiction, and associated topics as they affect information security management for government.
  • Common, established standards and procedures that directly impact information security management for government.

4. Security Lifecycle

  • The importance and relevance of the information lifecycle in government settings.
  • The stages of the information lifecycle within government operations.
  • The design process lifecycle, including essential and nonfunctional requirements (architecture frameworks, Agile development, service continuity, and reliability) for government systems.
  • The importance of appropriate technical audit and review processes, effective change control, and configuration management in government environments.
  • The risks to security brought about by systems development and support in government contexts.

5. Procedural/People Security Controls

  • The risks to information security involving people (organizational culture of security) in government agencies.
  • User access controls that may be used to manage those risks within government operations.

6. Technical Security Controls

  • Technical controls that can help ensure protection from malicious software in government systems.
  • Information security principles associated with the underlying networks and communications systems for government.
    • Entry points in networks and associated authentication techniques used by government agencies.
    • The role of cryptography in network security for government operations.
  • Information security issues related to value-added services that use the underlying networks and communications systems for government.
  • Information security issues related to organizations that utilize cloud computing facilities for government purposes.
  • Operating systems, database and file management systems, network systems, and applications systems and how they apply to the IT infrastructure for government.

7. Physical and Environmental Security Controls

  • Physical aspects of security in multi-layered defenses for government facilities.
  • Environmental risks relevant to government operations.

8. Disaster Recovery and Business Continuity Management

  • Differences between and the need for business continuity and disaster recovery in government settings.

9. Other Technical Aspects

  • Understanding of the principles and common practices, including any legal constraints and obligations, so they can contribute appropriately to investigations in a government context.
  • The role of cryptography in protecting systems and assets for government, including awareness of relevant standards and practices.

Govtra is a BCS Accredited Training Provider.

This course will be delivered by an expert Govtra trainer approved by BCS.

The price includes delivery of the full course syllabus by an approved BCS trainer and the BCS CISMP exam (which can be taken remotely in your own time and is invigilated centrally by BCS). Subject to successfully passing the exam (multiple choice, requiring a score of at least 65% to pass), participants will hold the accredited BCS Foundation Certificate in Information Security Management Principles (CISMP).

Requirements

While there are no formal entry requirements, candidates should possess a foundational understanding of IT operations and be aware of the challenges associated with security control activities for government environments.

 21 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories