Management with adaptable practices
We denounce with righteous indige nation and dislike men who are so beguiled and demo realized by the charms of pleasure of the moment, so blinded by desire, that they cannot foresee the pain and trouble that are bound to ensue cannot foresee. These cases are perfectly simple and easy to distinguish. In a free hour, when our power of choice is untrammelled data structures manages data in technology.
Chief Information Security Officer Training Course Outline
Module 1: Governance and Risk Management
- Governance
- Information Security Management Structure
- Principles of Information Security
- Risk Management
- Management and Technical Information Security Elements
- Compliance
- Privacy
- Privacy Impact Assessment
- Privacy and Security
- Laws and Regulatory Drivers
- Standards and Frameworks
- ISO/IEC 27000 Series
- ISO/IEC 27001
- NIST Cybersecurity Framework
- Federal Information Processing Standards
- NIST Special Publications
- Privacy Shield
- COBIT
- Information Security Trends and Best Practices
- Open Web Application Security Project
- Cloud Security Alliance
- Centre for Internet Security
- Information Security Training and Certifications
- Ethics
Module 2: Information Security Controls, Compliance, and Audit Management
- Information Security Controls
- Control Fundamentals
- Control Frameworks
- Information Security Control Life Cycle Frameworks
- NIST Risk Management Framework
- NIST Cybersecurity Framework
- ISO/IEC 27000
- Information Security Control Life Cycle
- Risk Assessment
- Design
- Implementation
- Assessment
- Monitoring
- Exploring Information Security Control Frameworks
- Auditing for the CISO
- Audit Management
- Audit Process
- Control Self-Assessments
- Continuous Auditing
- Specific Types of Audits and Assessments
Module 3: Security Programme Management and Operations
- Security Programme Management
- Security Areas of Focus
- Security Streams of Work
- Asset Security Management
- Security Projects
- Security Programme Budgets, Finance, and Cost Control
- Establishing the Budget
- Managing and Monitoring Spending
- Security Programme Resource Management: Building the Security Team
- Project Management
- Project Management Fundamentals
- Project Management
- Phases of Project Management
- Initiating
- Planning
- Executing
- Monitoring and Controlling
- Closing
Module 4: Information Security Core Competencies
- Malicious Software and Attacks
- Malware
- Scripting and Vulnerability – Specific Attacks
- Social Engineering
- Types of Social Engineering Attacks
- Why Employees Are Susceptible to Social Engineering
- Social Engineering Defences
- Asset Security
- Asset Inventory and Configuration
- Management
- Secure Configuration Baselines
- Vulnerability Management
- Asset Security Techniques
- Data Security
- Data at Rest
- Data in Transit
- Data in Use
- Data Life Cycle
- Identity and Access Management
- Identity and Access Management Fundamentals
- Identity Management Technologies
- Authentication Factors and Mechanisms
- Access Control Principles
- Access Control Models
- Access Control Administration
- Identity and Access Management Life Cycle
- Communication and Network Security
- WANs and LANs
- IP Addressing
- Network Address Translation
- Network Protocols and Communications
- Wireless
- Network Technologies and Defences
- Cryptography
- Cryptographic Definitions
- Cryptographic Services
- Symmetric, Asymmetric, and Hybrid Cryptosystems
- Hash Algorithm s
- Message Authentication Codes
- Digital Signatures
- Public Key Infrastructure
- Cloud Security
- Cloud Computing Characteristics
- Cloud Deployment Models
- Cloud Service Models
- Cloud Security Risks and Assurance Levels
- Cloud Security Resources
- Physical Security
- Physical Security Threats
- Physical Security Programme Planning
- Physical Security Resources
- Physical Security Controls
- Physical Security Auditing and Measurement
- Personnel Security
- Software Development Security
- Integrating Security into the SDLC
- Security SDLC Roles and Responsibilities
- Software Vulnerabilities
- Secure Coding Practices
- Software Vulnerability Analysis and Assessments
- Forensics, Incident Handling, and Investigations
- Relevant Law
- Logging and Monitoring
- Incident Response and Investigations
- Forensics and Digital Evidence
- Security Assessment and Testing
- Vulnerability Assessments
- Penetration Testing
- Regulatory Compliance Assessments
- Security Programme Assessments
- Business Continuity and Disaster Recovery
- Continuity Planning Initiation
- Business Impact Analysis
- Identify Preventive Controls
- Develop Recovery Strategies and Solutions
- Develop the Plan
- Test the Plan
- Maintain the Plan
Module 5: Strategic Planning, Finance, Procurement, and Vendor Management
- Strategic Planning
- Organisational Strategic Planning
- Organisational Strategic Planning Teams
- Strategic Planning Process
- Security Strategic Plan
- Making Security Decisions
- Financial Management
- Accounting and Finance Basics
- Information Security Annual Budget
- Procurement and Vendor Management
- Procurement Core Principles and Processes
- Types of Contracts
- Scope Agreements
- Third-Party Vendor Risk Management
Prerequisites
In this Chief Information Security Officer (CISO) Training course, there are no formal prerequisites.
Audience
This Chief Information Security Officer (CISO) Training is designed for anyone who wants to reach a top-level position in the information security profession. However, this course is more beneficial for Information Security Officers and Digital Security Managers.
Chief Information Security Officer Training Course Overview
Chief Information Security Officer (CISO) is a high-rank executive who creates and executes security programmes to assure that organisation's technologies and data are secured from external and internal threats. A CISO (Chief Information Security Officer) can take on various responsibilities and duties depending on the hierarchy, size, industry, and regulations suitable to the organisation. Organisations that have a Chief Information Security Officer realise many benefits like reduced risks and limited liability issues. So, individuals holding great skills, knowledge, and abilities to perform the duties of Chief Information Security Officer are highly in demand by the various multinational organisations.
This 3-day Chief Information Security Officer Training course aims to provide delegates with a comprehensive knowledge of Information Security Officer roles and responsibilities. During this course, delegates will learn about assessing and monitoring information security control life cycle. They will also learn about the information security controls, cryptography, physical security, security SDLC roles and responsibilities, organisational strategic planning, etc. Our highly professional trainer with years of experience in teaching information security courses will conduct this training course and help delegates get a complete understanding of CISO's roles and responsibilities.
This training will also cover the following concepts:
- Information security management structure
- Life cycle frameworks of information security control
- Information security core competencies
- Identity and access management life cycle
- Communication and network security
- Business continuity and disaster recovery
- Financial management
At the end of this Chief Information Security Officer Training course, delegates will be able to use various principles and structures to manage information security effectively. They will be able to effectively access the management life cycle and deal with clients using different management technologies. They will also be able to use various network security technologies to secure the organisation's data.
- Delegate pack consisting of course notes and exercises
- Manual
- Experienced Instructor
EU GDPR Practitioner Exam Information
The GDPR Practitioner exam assesses a candidate’s knowledge of compliance mechanisms, cloud and third-party processing, the stipulations of the GDPR, Data Protection Impact Assessments, security breaches, and the expectations of GDPR-mandated roles. The exam consists of:
- Type: Multiple choice questions
- Duration: 1 hour 30 minutes
- Pass mark: 55%
- Open Book: Yes