Course Outline

The syllabus includes training objectives, details of modules, and a recommended reading list:

The latest syllabus

1. Information Security Management Principles

  • Identify definitions, meanings, and the use of concepts and terms in information security management.
  • Explain the necessity and benefits of information security for government operations and public sector governance.

2. Information Risk

  • Outline the threats to and vulnerabilities of information systems used in government agencies.
  • Describe the processes for understanding and managing risk related to information systems at strategic, tactical, and operational levels for government entities.

3. Information Security Framework

  • Explain how risk management should be implemented in an organization:
    • The organization’s management of information security for government operations.
    • Organizational policy, standards, and procedures relevant to public sector governance.
    • Information security governance and its importance for accountability in the public sector.
    • Information security implementation strategies for government agencies.
    • Security incident management processes tailored for government use.
  • Interpret general principles of law, legal jurisdiction, and associated topics as they affect information security management in the public sector.
  • Common, established standards and procedures that directly impact information security management for government operations.

4. Security Lifecycle

  • The importance and relevance of the information lifecycle for government data management.
  • The stages of the information lifecycle in public sector contexts.
  • The design process lifecycle, including essential and non-functional requirements (architecture frameworks, Agile development, service continuity, and reliability) for government systems.
  • The importance of appropriate technical audit and review processes, effective change control, and configuration management for government IT infrastructure.
  • The risks to security brought about by systems development and support in public sector environments.

5. Procedural/People Security Controls

  • The risks to information security involving people (organizational culture of security) in government agencies.
  • User access controls that can be used to manage these risks for public sector operations.

6. Technical Security Controls

  • Technical controls that can ensure protection from malicious software in government systems.
  • Information security principles associated with underlying networks and communications systems:
    • Entry points in networks and associated authentication techniques for government use.
    • The role of cryptography in network security for public sector applications.
  • Information security issues related to value-added services that utilize underlying networks and communications systems in the public sector.
  • Information security concerns for organizations utilizing cloud computing facilities, particularly in government contexts.
  • The application of operating systems, database and file management systems, network systems, and applications systems to the IT infrastructure of government agencies.

7. Physical and Environmental Security Controls

  • Physical aspects of security in multi-layered defenses for government facilities.
  • Environmental risks affecting public sector information security.

8. Disaster Recovery and Business Continuity Management

  • Differences between and the need for business continuity and disaster recovery in government operations.

9. Other Technical Aspects

  • Understanding of principles and common practices, including legal constraints and obligations, to contribute appropriately to investigations for government agencies.
  • The role of cryptography in protecting systems and assets, including awareness of relevant standards and practices for public sector use.

Note: This is the four-day course which adds one additional day to the standard delivery to provide more time for exam preparation and practice exercises.

NobleProg is a BCS Accredited Training Provider.

This course will be delivered by an expert NobleProg trainer approved by BCS.

The price includes delivery of the full course syllabus by an approved BCS trainer and the BCS CISMP exam (which can be taken remotely in your own time and is invigilated centrally by BCS). Subject to successfully passing the exam (multiple choice, requiring a score of at least 65% to pass), participants will hold the accredited BCS Foundation Certificate in Information Security Management Principles (CISMP).

Requirements

While there are no formal entry requirements, candidates should possess a foundational understanding of information technology and be aware of the challenges associated with security control activities for government operations.
 28 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories