COBIT 5 for Information Security: Course Overview

ISACA’s COBIT® 5 framework provides a comprehensive framework that assists enterprises in achieving their objectives for the governance and management of enterprise IT. COBIT 5 for Information Security builds on the COBIT 5 framework in that it focusses on information security and provides more detailed and more practical guidance for information security professionals and other interested parties at all levels of the enterprise.

This course provides introductory and practical coverage of all aspects of COBIT 5 for Information Security, including its components, enablers and implementation guidance. Using relevant scenarios or case studies, the course will highlight how COBIT 5 for Information Security can be used in parts or holistically in a simple and pragmatic way. The course will also cover a high level overview of how COBIT 5 for Information Security can be leveraged to implement or improve an Information Security Management System (ISMS), compliant with ISO/IEC 27001 requirements. Chief Information Security Officers (CISOs), Information Security Managers (ISMs) and other information security professionals who are interested in realigning their Information Security function and / or initiatives will benefit from this course.

COBIT 5 for Information Security: Learning Outcomes

Gain a detailed understanding of COBIT 5 for Information Security framework

COBIT 5 for Information Security: Who Should Attend

This course is designed for anyone responsible for realigning the Information Security function in their organisation and for InfoSec initiatives more broadly.   Typically this will include:

COBIT 5 for Information Security: Course Contents

Session 1: Introduction to COBIT 5 for Information Security
Session 2: Detailed understanding of COBIT 5 enablers for implementing information security
Session 3: (Re)-Aligning your information security initiatives using COBIT 5 for Information Security
Session 4: Implementing or improving an Information Security Management System (ISMS) using COBIT 5 for Information Security

COBIT 5 for Information Security: Dates and Fees

COBIT 5 for Information Security: Exams and Stuff

Prerequisites:</h3

A basic knowledge of ISACA’s COBIT 5 or COBIT 4.1 frameworks is recommended.

Exams:

There are no exams associated with this course

COBIT 5 for Information Security: Sidebar Content

Course

Fees A$ per person

Customer Service Skills: Sidebar Content

Planning and Implementing ITIL: Sidebar Content

SABSA Foundation2: Sidebar Content

doller-img[Course_Fee]+ GST

[Course_Duration] day

[Book_Now_Button] [Enquiry_Button]

SABSA Foundation2: Learning Outcomes

F1 –  Security Strategy and Planning

This module provides participants with a comprehensive understanding of how the SABSA framework delivers successful security strategy and architecture. Through a series of innovative presentations, case studies and workshops, you will develop the skills to use the most proven security architecture design and management processes and find out how to develop a comprehensive strategy for the creation of a security architecture that genuinely meets the needs of your organisation.

The top ten competencies developed on this course are:

F2 – Security Service Management and Design

This module leverages the strategy defined in Foundation Module One to create the roadmap to design, deliver and support a set of consistent and high-quality security services.

Covering the good practice lifecycle, participants will find out how to design, deliver and support a comprehensive security services architecture that integrates fully and seamlessly with their existing IT management and business infrastructure and practices.

The top ten competencies developed on this course are:

    • Use SABSA to create an holistic framework to align and integrate standards
    • Describe roles, responsibilities,  decision-making and organisational structure
    • Explain the integration of SABSA into a service management environment
    • Define Security Services
    • Describe the placement of security services within ICT Infrastructure
    • Create a SABSA Trust Model
    • Describe and model security associations intra-domain and inter-domain
    • Explain temporal factors in security and sequence  security services
    • Determine an appropriate start-up approach for SABSA Architecture
    • Apply SABSA Foundation level competencies to your  own environment

SABSA Foundation2: Who Should Attend

SABSA Key Points

SABSA is used extensively by global business and governments around the world.