Get in Touch

Course Outline

The syllabus outlines training objectives, module details, and a recommended reading list:

The latest syllabus

1. Information Security Management Principles

  • Identify definitions, meanings, and applications of key concepts and terminology across information security management.
  • Explain the need for information security and its associated benefits.

2. Information Risk

  • Outline threats to and vulnerabilities within information systems.
  • Describe processes for understanding and managing risks related to information systems at strategic, tactical, and operational levels.

3. Information Security Framework

  • Explain how risk management should be implemented within an organisation, covering:
    • Management of information security
    • Organisational policies, standards, and procedures
    • Information security governance
    • Implementation of information security
    • Security incident management
  • Interpret general principles of law, legal jurisdiction, and related topics as they affect information security management.
  • Review common, established standards and procedures that directly impact information security management.

4. Security Lifecycle

  • Understand the importance and relevance of the information lifecycle.
  • Identify the stages of the information lifecycle.
  • Explore the design process lifecycle, including essential and non-functional requirements (architecture frameworks, Agile development, service continuity, and reliability).
  • Recognise the importance of appropriate technical audit and review processes, effective change control, and configuration management.
  • Assess security risks introduced by systems development and support activities.

5. Procedural/People Security Controls

  • Identify risks to information security involving people, including organisational security culture.
  • Understand user access controls used to manage these risks.

6. Technical Security Controls

  • Apply technical controls to help ensure protection against malicious software.
  • Understand information security principles related to underlying networks and communication systems, including:
    • Network entry points and associated authentication techniques
    • The role of cryptography in network security
  • Address information security issues related to value-added services using underlying networks and communication systems.
  • Address information security issues for organisations utilising cloud computing facilities.
  • Understand operating systems, database and file management systems, network systems, and application systems, and their application within IT infrastructure.

7. Physical and Environmental Security Controls

  • Examine the physical aspects of security within multi-layered defence strategies.
  • Identify environmental risks.

8. Disaster Recovery and Business Continuity Management

  • Understand the differences between, and the need for, business continuity and disaster recovery.

9. Other Technical Aspects

  • Understand principles and common practices, including legal constraints and obligations, to contribute effectively to investigations.
  • Recognise the role of cryptography in protecting systems and assets, including awareness of relevant standards and practices.

NobleProg is a BCS Accredited Training Provider.

This course will be delivered by an expert NobleProg trainer approved by BCS.

The price includes delivery of the full course syllabus by an approved BCS trainer and the BCS CISMP exam (which can be taken remotely at your convenience and is centrally invigilated by BCS). Upon successfully passing the exam (multiple-choice format, requiring a minimum score of 65%), participants will be awarded the accredited BCS Foundation Certificate in Information Security Management Principles (CISMP).

Requirements

There are no formal entry requirements; however, candidates should possess basic IT working knowledge and an awareness of issues related to security control activities.

 21 Hours

Testimonials (4)

Related Categories