Get in Touch

Course Outline

The syllabus covers training objectives, module details, and a recommended reading list:

View the latest syllabus

1. Information Security Management Principles

  • Identify definitions, meanings, and usage of concepts and terminology across information security management.
  • Explain the necessity and benefits of information security.

2. Information Risk

  • Outline threats to and vulnerabilities of information systems.
  • Describe processes for understanding and managing risk related to information systems at strategic, tactical, and operational levels.

3. Information Security Framework

  • Explain how risk management should be implemented within an organization:
    • Organizational management of information security
    • Organizational policy, standards, and procedures
    • Information security governance
    • Information security implementation
    • Security incident management
  • Interpret general principles of law, legal jurisdiction, and related topics affecting information security management.
  • Recognize common, established standards and procedures that directly impact information security management.

4. Security Lifecycle

  • Understand the importance and relevance of the information lifecycle.
  • Identify the stages of the information lifecycle.
  • Explore the design process lifecycle, including essential and nonfunctional requirements (architecture frameworks, Agile development, service continuity, and reliability).
  • Appreciate the importance of appropriate technical audit and review processes, effective change control, and configuration management.
  • Assess risks to security arising from systems development and support.

5. Procedural/People Security Controls

  • Analyze risks to information security involving people (organizational culture of security).
  • Examine user access controls that can be used to manage these risks.

6. Technical Security Controls

  • Identify technical controls that help ensure protection against Malicious Software.
  • Understand information security principles associated with underlying networks and communications systems:
    • Entry points in networks and associated authentication techniques
    • The role of cryptography in network security
  • Address information security issues related to value-added services using underlying networks and communications systems.
  • Examine information security issues related to organizations utilizing cloud computing facilities.
  • Understand operating systems, database and file management systems, network systems, and application systems and their application to IT infrastructure.

7. Physical and Environmental Security Controls

  • Explore physical aspects of security in multi-layered defenses.
  • Evaluate environmental risks.

8. Disaster Recovery and Business Continuity Management

  • Differentiate between business continuity and disaster recovery and understand the need for both.

9. Other Technical Aspects

  • Understand principles and common practices, including legal constraints and obligations, to contribute appropriately to investigations.
  • Recognize the role of cryptography in protecting systems and assets, including awareness of relevant standards and practices.

Note: This is the four-day course, which adds one additional day to the standard delivery to provide more time for exam preparation and practice exercises.

NobleProg is a BCS Accredited Training Provider.

This course is delivered by an expert NobleProg trainer approved by BCS.

The price includes the delivery of the full course syllabus by an approved BCS trainer and the BCS CISMP exam (which can be taken remotely at your own pace and is invigilated centrally by BCS). Upon successfully passing the exam (a multiple-choice test requiring a score of at least 65% to pass), participants will receive the accredited BCS Foundation Certificate in Information Security Management Principles (CISMP).

Requirements

There are no formal entry requirements. However, candidates should possess basic working knowledge of IT and an awareness of the issues involved in security control activities.

 28 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses

Related Categories