Course Outline
The syllabus includes training objectives, details of modules, and a recommended reading list:
1. Information Security Management Principles
- Identify definitions, meanings, and the application of concepts and terms in information security management.
- Explain the necessity and benefits of information security for government operations.
2. Information Risk
- Outline the threats to and vulnerabilities within information systems.
- Describe the processes for understanding and managing risk at strategic, tactical, and operational levels for government agencies.
3. Information Security Framework
- Explain how risk management should be implemented in an organization:
- The organization’s approach to information security management.
- Organizational policies, standards, and procedures for ensuring information security.
- Information security governance frameworks.
- Implementation strategies for information security measures.
- Management of security incidents within the organization.
- Interpret general principles of law, legal jurisdiction, and related topics as they pertain to information security management for government entities.
- Common, established standards and procedures that directly impact information security management in public sector organizations.
4. Security Lifecycle
- The importance and relevance of the information lifecycle for government operations.
- The stages of the information lifecycle from creation to disposal.
- The design process lifecycle, including essential and non-functional requirements such as architecture frameworks, Agile development, service continuity, and reliability.
- The significance of appropriate technical audit and review processes, effective change control, and configuration management for government systems.
- The risks to security posed by systems development and support activities within government agencies.
5. Procedural/People Security Controls
- The risks to information security involving people, including the organizational culture of security in government settings.
- User access controls that can be implemented to manage these risks effectively for government personnel.
6. Technical Security Controls
- Technical controls to protect against Malicious Software (Malware) and ensure system integrity for government systems.
- Information security principles related to underlying networks and communications systems:
- Entry points in networks and associated authentication techniques.
- The role of cryptography in enhancing network security for government communications.
- Information security issues pertaining to value-added services that utilize government networks and communication systems.
- Information security challenges faced by organizations using cloud computing facilities, particularly those in the public sector.
- Operating systems, database and file management systems, network systems, and application systems as they relate to the IT infrastructure of government agencies.
7. Physical and Environmental Security Controls
- Physical security measures in multi-layered defense strategies for government facilities.
- Environmental risks that can impact information security in government settings.
8. Disaster Recovery and Business Continuity Management
- The distinctions between business continuity and disaster recovery, and the necessity of both for ensuring uninterrupted government services.
9. Other Technical Aspects
- An understanding of principles and common practices, including legal constraints and obligations, to contribute effectively to investigations in a government context.
- The role of cryptography in protecting systems and assets, with an emphasis on relevant standards and practices for government use.
NobleProg is a BCS Accredited Training Provider.
This course will be delivered by an expert NobleProg trainer approved by BCS.
The price includes the full delivery of the course syllabus by an approved BCS trainer and the BCS CISMP exam, which can be taken remotely at your convenience and is centrally invigilated by BCS. Subject to successfully passing the exam (multiple choice, requiring a score of at least 65% to pass), participants will earn the accredited BCS Foundation Certificate in Information Security Management Principles (CISMP) for government professionals.
Requirements
Testimonials (5)
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
The knowledge and understanding of the trainer on the training material was exceptional. The trainer was well aware of the subject, provided practical examples in relevance. I would highly recommend him as a trainer for this training.
Tayyeb Mahmood - Ajman Municipality
Course - COBIT 2019 Foundation
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.