Course Outline
- The need for Information Security
- Information Security Management System (ISMS) concepts & definitions
- Information risk management
- Corporate governance
- Organisational responsibilities
- Policies, standards & procedures
- ISO/IEC 27002, 27001 & 13335
- Information security controls
- Incident management
- Legal framework - personal data, DPA, CMA, IPR & copyright, HR & employment issues
- Cryptographic models
- Data Communications & networks
- Physical security
- Auditing & gap analysis
- Training & raising awareness
- Business continuity
- Security investigations & forensics
Requirements
Although perceived as an IT issue, Information Security is in fact a subject relevant to all business units. The CiSMP program is ideal for members of information security management teams, IT Managers, security and systems managers, Information asset owners and employees with legal compliance responsibilities.
The course will act as a stepping stone to more advanced qualifications (either managerial or technical), and also sits nicely with existing project management and service management based programs.
Testimonials (3)
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
I extracted valuable information that I will be able to present in my company as a solution to one of the processes
Paweł - Santander
Course - Public Key Infrastructure
Machine Translated
The oral skills and human side of the trainer (Augustin).