Course Outline
1. Information Security Management Principles – 10%
1.1 Concepts and definitions
1.2 The need for & benefits of Information Security
2. Information Risk – 10%
2.1 Threats to & vulnerabilities of information systems
2.2 Risk Management
3. Information Security Framework – 20%
3.1 Organisation and responsibilities
3.2 Legal framework
3.3 Security standards and procedures
4. Procedural/people security controls – 15%
4.1 People
4.2 User access controls
4.3 Training
5. Technical security controls – 25%
5.1 Protection from malicious software
5.2 Networks and communications
5.3 External services
5.4 Cloud computing
5.5 IT infrastructure
6. Software development – 5%
6.1 Testing, audit & review
6.2 Systems development & support
7. Physical and environmental controls – 5%
8. Disaster recovery and business continuity management – 5%
9. Other technical aspects – 5%
9.1 Investigations & forensics
Requirements
A minimum of 12 months experience within any IT job is beneficial. No technical skill or Security background is required.
Getuigenissen (4)
Lap Qradar
Sutthikan Noisombat - NTT
Cursus - IBM Qradar SIEM: Beginner to Advanced
Hazem heeft een zeer recente ervaring met het behalen van het examen en kent de gotcha's en de manier waarop ISC hun vragen structureert.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Cursus - Certified Information System Security Professional (CISSP) CBK Review
Machine Translated
Benaderbaar zijn en ons aanzetten tot interactie
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Cursus - CISSP - Certified Information Systems Security Professional
Machine Translated
Ik heb er waardevolle informatie uitgehaald die ik in mijn bedrijf kan presenteren als oplossing voor een van de processen
Paweł - Santander
Cursus - Public Key Infrastructure
Machine Translated