Introduction
The training course provides participants with detailed knowledge of the concepts relating to information security (confidentiality, integrity, availability, vulnerability, threats, risks and countermeasures), along with an understanding of current legislation and regulations which impact information security management. Certification holders will be able to apply the practical principles covered throughout the course to ensure their normal business processes become robust and more secure.
Course Objectives
- Understand the current business and common technical environments in which information security must operate.
- Recognize current national and international standards, frameworks and organizations which facilitate the management of information security.
- Explain the fundamental concepts relating to information security management.
- Describe the categorization, operation and effectiveness of controls of different types and characteristics.
- Understand current legislation and regulations which impact upon information security management.
Target Audience
This course is ideal for members of information security management teams, IT managers, security and systems managers, information asset owners and employees with legal compliance responsibilities.
Course Outline
Day 1: Information Risk
- Threats
- Vulnerabilities
- Risk Management
Information Security Framework
- Organizations and responsibilities
- Organizational policy, standards, and procedures
- Information security governance
- Information assurance program implementation
- Security incident management
- Legal frameworks
- Security standards and procedures
Day 2: Security Lifecycle
- The information life cycle
- Testing, audit, and review
- Systems development and support
Day 3: Procedural / People Security Controls
- General controls
- People security
- User access controls
- Training and awareness
Day 4: echnical Security Controls
- Technical security
- Protection from malicious software
- Networks and communications
- Operational Technology
- External services
- Cloud computing
- IT infrastructure
Physical and Environmental Security Controls
- Physical Security
- Different uses of controls
Day 5: Disaster Recovery (DR) and Business Continuity Management (BCM)
- Relationship between DR/BCP, risk assessment and impact analysis
- Resilience and redundancy
- Approached to writing plans and implementing plans
- The need for documentation, maintenance, and testing
- The need for links to managed service provision and outsourcing
- The need for secure off-site storage of vital material
- The need to involve personnel, suppliers, and IT systems providers
- Relationship with security incident management
- Compliance with standards