Course Outline
1. Information Security Management Principles – 10%
1.1 Concepts and definitions
1.2 The need for & benefits of Information Security
2. Information Risk – 10%
2.1 Threats to & vulnerabilities of information systems
2.2 Risk Management
3. Information Security Framework – 20%
3.1 Organisation and responsibilities
3.2 Legal framework
3.3 Security standards and procedures
4. Procedural/people security controls – 15%
4.1 People
4.2 User access controls
4.3 Training
5. Technical security controls – 25%
5.1 Protection from malicious software
5.2 Networks and communications
5.3 External services
5.4 Cloud computing
5.5 IT infrastructure
6. Software development – 5%
6.1 Testing, audit & review
6.2 Systems development & support
7. Physical and environmental controls – 5%
8. Disaster recovery and business continuity management – 5%
9. Other technical aspects – 5%
9.1 Investigations & forensics
Requirements
A minimum of 12 months experience within any IT job is beneficial. No technical skill or Security background is required.
Testimonials (4)
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
I extracted valuable information that I will be able to present in my company as a solution to one of the processes
Paweł - Santander
Course - Public Key Infrastructure
Machine Translated