Certificate in Information Security Management Principles Training
CISMP is a foundation information security certification which measures knowledge of the basic principles of information security management.
- Our CISMP training courses include everything required to pass the CISMP exam and master the syllabus
- Boost your information security career with a CISMP qualification, the globally recognised information security certification
- CISMP holders are highly respected for their skills and knowledge of information security and can earn high salaries
- Enrol today and receive expert tuition from trusted CISMP trainers with years of industry experience
Sorry, we do not have any courses matching your criteria
FAQs
Is this course accredited?
Yes our course is fully accredited
What do you provide me on the course?
We will provide you with a courseware folder, exam, certificate, refreshments, experienced instructor and relevant course materials
Does the course include exams?
Yes, we are pleased to say that the exam is included in the course fee
What time shall I arrive at the venue?
Please arrive at 08:45am for a prompt 09:00 start
Overview
The course focuses on the need for management and technical solutions to tackle the information related risks which can jeopardise an organisation's ability to achieve its business objectives. It provides a comprehensive overview of how organisations should select and implement controls based on the security risks they face. It should be stressed this is not a technical course and whilst technical controls (amongst other controls) are discussed, it is from an overview and principles perspective.
Course Audience
The course will benefit members of information security management team, IT managers, security/systems administrators and co-ordinators, internal auditors, staff with a local security co-ordination role, staff responsible for legal and corporate governance, staff responsible for information assets and systems.
Course Pre-Requisites
There are no formal requirements for entry to the course but we advise the following:
Information risk management.
Information security organisation & responsibilities: Legal and regulatory obligations.
Policies, standards & procedures: Delivering a balanced ISMS. Security procedures.
Information security governance: Policy reviews. Security audits.
Security incident management: Objectives and stages of incident management.
Information security implementation: Getting management buy-in.
Legal framework: Processing personal data. Employment issues. Computer misuse. Intellectual property rights. Data Protection Act.
Security standards & procedures: ISO/IEC 27002 and ISO/IEC 15408.
Threats to, and vulnerabilities of, information systems.
People security: Organisational culture. Acceptable use policies.
Systems development & support: Linking security to whole business process. Change management process. Handling security patches.
Role of cryptography: Common encryption models.
Protection from malicious software: Methods of control.
User access controls: Authentication and authorisation mechanisms.
Networks & communications: Partitioning networks. Role of cryptography. Controlling 3rd party access. Intrusion monitoring. Penetration testing, cloud computing.
External services: Protection of Web servers and e-commerce applications.
IT infrastructure: Operating, network, database and file management systems.
Testing, audit & review: Strategies for security testing of business systems.
Training: The purpose and role of training. Promoting awareness.
Physical & environmental security: Controlling access and protecting physical sites and assets.
Disaster recovery & business continuity management: Relationship between risk assessment and impact analysis.
Investigations & forensics: Common processes, tools and techniques. Legal and regulatory guidelines.
What's Included
- The courseware folder
- Course Materials
- Exam
- Certificate
- Experienced Instructor
- Refreshments
Testimonials
There hasn't been any testimonials submitted to this topic
Video
We do not currently have a video for this topic
Social
The course focuses on the need for management and technical solutions to tackle the information related risks which can jeopardise an organisation's ability to achieve its business objectives. It provides a comprehensive overview of how organisations should select and implement controls based on the security risks they face. It should be stressed this is not a technical course and whilst technical controls (amongst other controls) are discussed, it is from an overview and principles perspective.
Course Audience
The course will benefit members of information security management team, IT managers, security/systems administrators and co-ordinators, internal auditors, staff with a local security co-ordination role, staff responsible for legal and corporate governance, staff responsible for information assets and systems.
Course Pre-Requisites
There are no formal requirements for entry to the course but we advise the following:
Information risk management.
Information security organisation & responsibilities: Legal and regulatory obligations.
Policies, standards & procedures: Delivering a balanced ISMS. Security procedures.
Information security governance: Policy reviews. Security audits.
Security incident management: Objectives and stages of incident management.
Information security implementation: Getting management buy-in.
Legal framework: Processing personal data. Employment issues. Computer misuse. Intellectual property rights. Data Protection Act.
Security standards & procedures: ISO/IEC 27002 and ISO/IEC 15408.
Threats to, and vulnerabilities of, information systems.
People security: Organisational culture. Acceptable use policies.
Systems development & support: Linking security to whole business process. Change management process. Handling security patches.
Role of cryptography: Common encryption models.
Protection from malicious software: Methods of control.
User access controls: Authentication and authorisation mechanisms.
Networks & communications: Partitioning networks. Role of cryptography. Controlling 3rd party access. Intrusion monitoring. Penetration testing, cloud computing.
External services: Protection of Web servers and e-commerce applications.
IT infrastructure: Operating, network, database and file management systems.
Testing, audit & review: Strategies for security testing of business systems.
Training: The purpose and role of training. Promoting awareness.
Physical & environmental security: Controlling access and protecting physical sites and assets.
Disaster recovery & business continuity management: Relationship between risk assessment and impact analysis.
Investigations & forensics: Common processes, tools and techniques. Legal and regulatory guidelines.