PCiIAA: Course Overview

The Practitioners Certificate in Information Assurance Architecture course prepares the student for a career in security architecture. A Security Architect (SA) is a senior-level enterprise architect role, either within a dedicated security team or as part of a more general Enterprise Architecture (EA) team.

It also provides the opportunity for those already within these roles to enhance or refresh their knowledge and in the process gain a qualification, recognised by industry, which demonstrates the level of knowledge gained.

Certificate in Information Security Management Principles: Sidebar Content

[Book_Now_Button] [Enquiry_Button]

Certificate in Information Security Management Principles: Exams and Stuff

Pre-requisites

There are no formal pre-requisites for this course. Knowledge of IT would be advantageous but not essential. An understanding of the general principles of information technology security would be useful, but again, not essential. Awareness of the issues involved with security control activity would be advantageous.

Assessment

At the end of each module an assessment is undertaken to determine understanding of the information covered in that module.

Certificate Exam

At the end of the course participants undertake a paper-based examination on the last day of the course.

Certificate in Information Security Management Principles: Dates and Fees

Course

Fees A$ per person

CISMPC®
Certificate in Information Security Management Principles (5 Days)

$3,450 + gst

The fee includes:

Certificate in Information Security Management Principles: Course Contents

Module 1
Information Security Management Principles
This module covers the basic concepts of information security along with the main terminology commonly in use. You will gain an understanding of why information security is assuming critical importance, not just in the IT community but also in the business community at large.

Module 2
Information Risk
This module provides an appreciation of risk assessment and risk management as applied to information security. At the end of this module you will be able to define and explain the concepts of Threats, Vulnerabilities, Assets, Impact, Likelihood and risk, as well as understand the overall process of risk management and the appropriate use of controls to manage risk in a cost effective and appropriate manner

Module 3
Information Security Framework
This module covers the basic principles used in establishing an Information Security framework within an organisation. In particular, it considers the role and use of security policy, standards and procedures, information assurance governance, security incident management, and their appropriate implementation

Module 4
Procedural/People Security Controls
Information assurance is a lot more than simply a series of technical controls, it is as much about people and procedural controls. This module will ensure participants understand how people and organisations should be managed and trained within an organisation.

Module 5
Technical Security Controls
This module addresses the technical controls that need to be implemented to help afford effective information security. Topics covered include: Protection from malicious software; Impact on networks and communications; Approaches to information security when dealing with outsourced or other external facilities providers; Cloud computing; IT Infrastructure

Module 6
Software Development and Lifecycle
This module provides an understanding of the principles behind developing and supporting systems with an appropriate level of assurance. This includes the methods and strategies for security testing, on-going reviews, auditing, systems development and support

Module 7
Physical and Environment Controls
The Information Security Manager needs to have a good appreciation of associated physical security issues to ensure a seamless Information Assurance management system across the whole organisation. This module comprehensively covers the key considerations of physical security.

Module 8
Disaster Recovery and Business Continuity Management
Even in the best prepared organisations, problems will arise. This module covers the key areas that the security manager needs to understand in order to effectively deal with the inevitable. At the end of this module you will: Understand the difference between a Business Continuity Plan (BCP) and a Disaster recovery (Dr) plan; be able to write draft BCP and Dr plans; understand the need for documentation, maintenance and testing

Module 9
Investigations, Forensics and Cryptography
Gain an understanding of two technical areas of key importance to information security: Incident investigation and how forensic evidence may be preserved; basic concepts and uses of cryptography

Module 10
Preparation for the CISMP exam and Mock exam
The final module provides preparation for the CISMP examination.

Certificate in Information Security Management Principles: Who Should Attend

This course is intended for anyone who has an interest in information security, either for a potential or existing security professional, or as an additional part of his or her general business knowledge (for example, the material covered on this course would make good supporting material for business/IT managers, system/security analysts, solutions architects or risk managers).

Certificate in Information Security Management Principles: Learning Outcomes

The course provides comprehensive coverage of the following key areas:

Certificate in Information Security Management Principles: Course Overview

* Are you wanting a career in information security but do not have that much experience as yet?
* Do you need to ensure your team has a very sound foundation knowledge of information security?

As such, CISMP addresses a significant gap in security education.
CISMP is also ideal for IT managers who need to enhance their knowledge to ensure that information security management and controls are adequately implemented in their organisation.
Accredited by BCS, The Chartered Institute for IT (formerly British Computer Society), CISMP provides a solid understanding of the key areas of information security management including:

CISMP also provides a base level knowledge suitable for future CISSP and CISM qualifications.

Key Benefits

This comprehensive 5-day course is designed for anyone who has information security responsibilities as part of their day-to-day role, or who is moving into an information security function, and who would benefit from a solid formal exposure to the principles of information security.

Solution Architecture Security Practitioner: Sidebar Content

[Course_Duration] day course.

[Book_Now_Button] [Enquiry_Button]

Solution Architecture Security Practitioner: Exams and Stuff

Certificate Exam

All participants receive a voucher to take the SASP Certificate exam after the course.  The exam is conducted online, web-proctored.

The exam is 90 minutes, 65 multiple-choice questions, 65% pass mark.

Pre-requisites

There are no formal entry requirements for candidates taking the Solutions Architecture Security Practitioner (SASP) course. However, candidates should have experience as solutions or technical architects.

Solution Architecture Security Practitioner: Dates and Fees

Course

Fees A$ per person

Solutions Architecture Security Practitioner (2 days)
$1850 + gst

Excellent team discounts available.  Please contact Dennis Pigram

 

Fees include:

Solution Architecture Security Practitioner: Course Contents

Module 1

Security Across the Lifecycle

This module introduces the Solution Architect to the various security concerns and considerations when embarking on a new development project all the way to in-service support.

Module 2
The Basics of Security Architecture

This module lays down the basic principles of security architecture and provides an understanding of what it means to be a security architect. It describes the relationship to Enterprise Architecture Frameworks and how these frameworks address security.

Being an SA is a technical job, without doubt, but the key to success in these areas comes from detailed knowledge of what comprises security technology in terms of product assurance, network and technical design/development work, and the trade-off between physical, logical and procedural controls. Unlike technical architecture, where components are added together to create an endsolution based on technical know-how, security architecture adopts a framework approach for deploying patterns of risk-reducing technology that provide varying levels of assurance depending on the underlying security requirements.

Module 3

Advanced Security Architecture Concepts

This module builds on Module 2, laying down the next level of detail for a variety of architectural concepts. It starts with security mechanisms such as cryptography. It then goes on to a wide range of security services. Finally the module describes how the security services can be applied within a system and how design patterns are an important tool for a SA.

Topics covered include:

 Module 4

Information Security Methodologies

This module covers various methodologies and techniques that can be used to assure the implementation of a system or a product. This includes Information Assurance Frameworks and the purpose of vulnerability and penetration testing.

Module 5

Preparation for the SASP exam

The final module provides preparation for the SASP examination.