Course Outline

The syllabus includes training objectives, details of modules, and a recommended reading list:

The latest syllabus

1. Information Security Management Principles

  • Identify definitions, meanings, and the application of concepts and terms in information security management.
  • Explain the necessity and benefits of information security for government operations.

2. Information Risk

  • Outline the threats to and vulnerabilities within information systems.
  • Describe the processes for understanding and managing risk at strategic, tactical, and operational levels for government agencies.

3. Information Security Framework

  • Explain how risk management should be implemented in an organization:
    • The organization’s approach to information security management.
    • Organizational policies, standards, and procedures for ensuring information security.
    • Information security governance frameworks.
    • Implementation strategies for information security measures.
    • Management of security incidents within the organization.
  • Interpret general principles of law, legal jurisdiction, and related topics as they pertain to information security management for government entities.
  • Common, established standards and procedures that directly impact information security management in public sector organizations.

4. Security Lifecycle

  • The importance and relevance of the information lifecycle for government operations.
  • The stages of the information lifecycle from creation to disposal.
  • The design process lifecycle, including essential and non-functional requirements such as architecture frameworks, Agile development, service continuity, and reliability.
  • The significance of appropriate technical audit and review processes, effective change control, and configuration management for government systems.
  • The risks to security posed by systems development and support activities within government agencies.

5. Procedural/People Security Controls

  • The risks to information security involving people, including the organizational culture of security in government settings.
  • User access controls that can be implemented to manage these risks effectively for government personnel.

6. Technical Security Controls

  • Technical controls to protect against Malicious Software (Malware) and ensure system integrity for government systems.
  • Information security principles related to underlying networks and communications systems:
    • Entry points in networks and associated authentication techniques.
    • The role of cryptography in enhancing network security for government communications.
  • Information security issues pertaining to value-added services that utilize government networks and communication systems.
  • Information security challenges faced by organizations using cloud computing facilities, particularly those in the public sector.
  • Operating systems, database and file management systems, network systems, and application systems as they relate to the IT infrastructure of government agencies.

7. Physical and Environmental Security Controls

  • Physical security measures in multi-layered defense strategies for government facilities.
  • Environmental risks that can impact information security in government settings.

8. Disaster Recovery and Business Continuity Management

  • The distinctions between business continuity and disaster recovery, and the necessity of both for ensuring uninterrupted government services.

9. Other Technical Aspects

  • An understanding of principles and common practices, including legal constraints and obligations, to contribute effectively to investigations in a government context.
  • The role of cryptography in protecting systems and assets, with an emphasis on relevant standards and practices for government use.

NobleProg is a BCS Accredited Training Provider.

This course will be delivered by an expert NobleProg trainer approved by BCS.

The price includes the full delivery of the course syllabus by an approved BCS trainer and the BCS CISMP exam, which can be taken remotely at your convenience and is centrally invigilated by BCS. Subject to successfully passing the exam (multiple choice, requiring a score of at least 65% to pass), participants will earn the accredited BCS Foundation Certificate in Information Security Management Principles (CISMP) for government professionals.

Requirements

While there are no formal entry requirements, candidates should possess a foundational understanding of information technology and be aware of the challenges associated with security control activities for government.
 21 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories