Foundation Certificate in Information Security: Course Contents

Module  1

Introduction to Information Security Management

This module covers the basic concepts of information security along with the main terminology commonly in use. You will gain an understanding of why information security is becoming increasingly important, not just in the IT community but also in the business community at large.

At the end of this module you will be able to:

 

Module  2

Introduction to Information Risk Management

This module introduces the basic concepts of business risk management, its rationale, core terminology and fundamental principles. It introduces the need for and application of international standards and regulatory frameworks and stresses the adoption of a strategic approach to information risk management.

At the end of this module you will be able to:

Module  3

Introduction to Business Continuity Management

This module covers the basic concepts of business continuity management along with the main terminology commonly in use.  You will gain an understanding of why business continuity management is becoming increasingly important, not just in the IT community but also in the business community at large.

Topics covered include:

Module  4

Introduction to Information Security Architecture

This module lays down the basic principles of security architecture and provides an understanding of what it means to be a security architect. It describes the relationship to Enterprise Architecture Frameworks and how these frameworks address security.

Security architecture is at the heart of what it is to be a security architect. However, unlike technical architecture work where components are added together to create an end-solution based on technical know-how, security architecture adopts a framework approach for deploying patterns of risk-reducing technology that provide varying levels of assurance depending on the underlying security requirements.  Being an SA is a technical job, without doubt, but the key to success in these areas comes from detailed knowledge of what comprises security technology in terms of product assurance, network and technical design/development work (using secure development principles) and the trade off between physical, logical and procedural controls.

Module  5

Preparation for the Foundation exam

The final module will prepare you for the Foundation examination to be undertaken after the course.

Course Overview  |  Learning Outcomes  |  Who Should Attend  |  Course Contents  |  Fees  |  Exams