Course Outline

The syllabus includes training objectives, details of modules, and a recommended reading list:

The latest syllabus

1. Information Security Management Principles

  • Identify definitions, meanings, and the use of concepts and terms across information security management for government.
  • Explain the need for and the benefits of information security in a governmental context.

2. Information Risk

  • Outline the threats to and vulnerabilities of information systems within government environments.
  • Describe the processes for understanding and managing risk relating to information systems at strategic, tactical, and operational levels for government operations.

3. Information Security Framework

  • Explain how risk management should be implemented in an organization:
    • The organization’s management of information security for government agencies.
    • Organizational policy, standards, and procedures relevant to government operations.
    • Information security governance for government entities.
    • Information security implementation within governmental frameworks.
    • Security incident management in the public sector.
  • Interpret general principles of law, legal jurisdiction, and associated topics as they affect information security management for government agencies.
  • Common, established standards and procedures that directly impact information security management within the public sector.

4. Security Lifecycle

  • The importance and relevance of the information lifecycle in government operations.
  • The stages of the information lifecycle for government data.
  • The design process lifecycle, including essential and nonfunctional requirements (architecture frameworks, Agile development, service continuity, and reliability) for government systems.
  • The significance of appropriate technical audit and review processes, effective change control, and configuration management in government IT environments.
  • The risks to security brought about by systems development and support within governmental contexts.

5. Procedural/People Security Controls

  • The risks to information security involving people (organizational culture of security) in government agencies.
  • User access controls that may be used to manage those risks for government employees and contractors.

6. Technical Security Controls

  • Technical controls that can help ensure protection from Malicious Software within government systems.
  • Information security principles associated with underlying networks and communications systems:
    • Entry points in networks and associated authentication techniques for government networks.
    • The role of cryptography in network security for government communications.
  • Information security issues related to value-added services that use the underlying networks and communications systems within government operations.
  • Information security issues related to organizations that utilize cloud computing facilities for government data.
  • Operating systems, database and file management systems, network systems, and applications systems and how they apply to the IT infrastructure of government agencies.

7. Physical and Environmental Security Controls

  • Physical aspects of security in multi-layered defenses for government facilities.
  • Environmental risks to government information systems.

8. Disaster Recovery and Business Continuity Management

  • Differences between and the need for business continuity and disaster recovery in government operations.

9. Other Technical Aspects

  • Understanding of principles and common practices, including any legal constraints and obligations, so they can contribute appropriately to investigations within government agencies.
  • The role of cryptography in protecting systems and assets for government entities, including awareness of relevant standards and practices.

Note: This is the four-day course which adds one additional day to the standard delivery to provide more time for exam preparation and practice exercises.

Govtra is a BCS Accredited Training Provider.

This course will be delivered by an expert Govtra trainer approved by BCS.

The price includes delivery of the full course syllabus by an approved BCS trainer and the BCS CISMP exam (which can be taken remotely in your own time and is invigilated centrally by BCS). Subject to successfully passing the exam (multiple choice, requiring a score of at least 65% to pass), participants will hold the accredited BCS Foundation Certificate in Information Security Management Principles (CISMP).

Requirements

While there are no formal entry requirements, candidates should possess a foundational understanding of IT operations and be aware of the challenges associated with security control activities for government.

 28 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories