Course Outline
The syllabus includes training objectives, details of modules, and a recommended reading list:
1. Information Security Management Principles
- Identify definitions, meanings, and the use of concepts and terms in information security management.
- Explain the necessity and benefits of information security for government operations and public sector governance.
2. Information Risk
- Outline the threats to and vulnerabilities of information systems used in government agencies.
- Describe the processes for understanding and managing risk related to information systems at strategic, tactical, and operational levels for government entities.
3. Information Security Framework
- Explain how risk management should be implemented in an organization:
- The organization’s management of information security for government operations.
- Organizational policy, standards, and procedures relevant to public sector governance.
- Information security governance and its importance for accountability in the public sector.
- Information security implementation strategies for government agencies.
- Security incident management processes tailored for government use.
- Interpret general principles of law, legal jurisdiction, and associated topics as they affect information security management in the public sector.
- Common, established standards and procedures that directly impact information security management for government operations.
4. Security Lifecycle
- The importance and relevance of the information lifecycle for government data management.
- The stages of the information lifecycle in public sector contexts.
- The design process lifecycle, including essential and non-functional requirements (architecture frameworks, Agile development, service continuity, and reliability) for government systems.
- The importance of appropriate technical audit and review processes, effective change control, and configuration management for government IT infrastructure.
- The risks to security brought about by systems development and support in public sector environments.
5. Procedural/People Security Controls
- The risks to information security involving people (organizational culture of security) in government agencies.
- User access controls that can be used to manage these risks for public sector operations.
6. Technical Security Controls
- Technical controls that can ensure protection from malicious software in government systems.
- Information security principles associated with underlying networks and communications systems:
- Entry points in networks and associated authentication techniques for government use.
- The role of cryptography in network security for public sector applications.
- Information security issues related to value-added services that utilize underlying networks and communications systems in the public sector.
- Information security concerns for organizations utilizing cloud computing facilities, particularly in government contexts.
- The application of operating systems, database and file management systems, network systems, and applications systems to the IT infrastructure of government agencies.
7. Physical and Environmental Security Controls
- Physical aspects of security in multi-layered defenses for government facilities.
- Environmental risks affecting public sector information security.
8. Disaster Recovery and Business Continuity Management
- Differences between and the need for business continuity and disaster recovery in government operations.
9. Other Technical Aspects
- Understanding of principles and common practices, including legal constraints and obligations, to contribute appropriately to investigations for government agencies.
- The role of cryptography in protecting systems and assets, including awareness of relevant standards and practices for public sector use.
Note: This is the four-day course which adds one additional day to the standard delivery to provide more time for exam preparation and practice exercises.
NobleProg is a BCS Accredited Training Provider.
This course will be delivered by an expert NobleProg trainer approved by BCS.
The price includes delivery of the full course syllabus by an approved BCS trainer and the BCS CISMP exam (which can be taken remotely in your own time and is invigilated centrally by BCS). Subject to successfully passing the exam (multiple choice, requiring a score of at least 65% to pass), participants will hold the accredited BCS Foundation Certificate in Information Security Management Principles (CISMP).
Requirements
Testimonials (5)
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
The knowledge and understanding of the trainer on the training material was exceptional. The trainer was well aware of the subject, provided practical examples in relevance. I would highly recommend him as a trainer for this training.
Tayyeb Mahmood - Ajman Municipality
Course - COBIT 2019 Foundation
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.