EXIN Information Security Management Advanced
|
|
|
- Buck Carpenter
- 10 years ago
- Views:
Transcription
1 Preparation Guide EXIN Information Security Management Advanced based on ISO/IEC Edition
2 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing system or circulated in any form by print, photo print, microfilm or any other means without written permission by EXIN. 2
3 Content 1. Overview 4 2. Exam requirements 8 3. Literature 11 3
4 1. Overview EXIN Information Security Management Advanced based on ISO/IEC (ISMAS.EN) Summary Preparation Guides are designed to help training providers develop courses and course material that meet with EXIN requirements. The main objective of the Preparation Guide is to identify the exam subjects, the exam requirements and specifications, and the target audience to support the development of new, high quality courses. Information security is the preservation of confidentiality, integrity and availability of information (ISO/IEC definition). Information security is gaining importance in the Information Technology (IT) world. Globalization of the economy is leading to an ever-increasing exchange of information between organizations (their employees, customers and suppliers) and an explosion in the use of networked computers and computing devices. The core activities of many companies now completely rely on IT. Enterprise resource planning (ERP) management systems, the control systems that govern how a building runs or a manufacturing machine functions, day-to-day communications - everything - runs on computers. The vast majority of information - the most valuable commodity in the world - passes through IT. Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people, protected against accidental or malicious modification or destruction and must be available when it is needed. Companies and individual users of technology are also beginning to understand how important security is and are beginning to make choices based on the security of the technology or service. There are other important trends that are increasing the importance of the Information Security discipline: Compliance requirements are increasing: Most countries have multiple laws or regulations governing the use and requiring protection of various types of data. These laws are increasing in number and their requirements are growing. Many industries, particularly the financial world, have regulations in addition to those imposed by a government. These, too are growing in number and complexity. Security standards are being developed and refined at industrial, national and international levels. 4
5 Security certifications and auditable proof that an organization is complying to security standards and/or best practices are sometimes being demanded as a condition of doing business. The international standard, the Code of Practice for Information Security ISO/IEC 27002:2013 is a widely respected and referenced standard and provides a framework for the organization and management of an information security program. Implementing a program based on this standard will serve an organization well in its goal of meeting many of the requirements faced in today s complex operating environment. A strong understanding of this standard is important to the personal development of every information security professional. In EXIN s Information Security modules the following definition is used: Information Security deals with the definition, implementation, maintenance, compliance and evaluation of a coherent set of controls which safeguard the availability, integrity and confidentiality of the (manual and automated) information supply. The module Information Security Management Advanced based on ISO/IEC (ISMAS.EN) tests your understanding of the organizational and managerial aspects of information security. The subjects of this module are:: Information security perspectives: Business, Customer, Service provider/supplier Risk Management: Analysis, Controls, Remaining risks Information security controls: Organizational, Technical, Other. 5
6 Context Qualification program The Information Security Management Advanced Certificate builds on the Information Security Foundation Certificate in which the basic concepts of information security are tested. The Information Security Management Advanced Certificate is one of the prerequisites for the next step in the program: Information Security Management Expert. Target group Security professionals. This module is intended for everyone who is involved in the implementation, evaluation and reporting of an information security program, such as an Information Security Manager (ISM), Information Security Officer (ISO) or a Line Manager, Process Manager or Project Manager with security responsibilities. Prerequisites The Information Security Foundation based on ISO/IEC Certificate or an equivalent. Requirements for the certificate The Information Security Management Advanced training course with an EXIN accredited training provider (ATP), including having successfully fulfilled the two (2) practical assignments as part of the course. Successful completion of the exam Information Security Management Advanced based on ISO/IEC
7 Examination type Multiple choice exam Indication study load 120 hours Practical assignments Practical assignments are part of the examination and will be assessed by an EXIN accredited training provider during the training course. In order to obtain the EXIN Information Security Management Advanced Certificate, the candidate will need to have successfully completed the practical assignments. Time allotted for examination 90 minutes Examination details Number of questions: 30 Pass mark: 65% (20 of 30) Open book/notes: No Electronic equipment permitted: No Sample questions A sample exam is available through your Accredited Training Provider. Training Group size The maximum number of course participants is 16. (This is not applicable for online- or computer based training.) Contact hours The minimum number of contact hours for the course is 20. This number includes (group) assignments, exam preparation and short coffee breaks. Not included are: homework, the logistics related to the exam session, the exam session and lunch breaks. Training provider A list of Accredited Training Providers may be found on EXIN s website 7
8 2. Exam requirements The exam requirements are specified in the exam specifications. The following table lists the topics of the module (exam requirements). The weight of the different topics in the exam is expressed as a percentage of the total. Exam requirement Exam specification Weight (%) 1 Information security perspectives The candidate understands the business interest of information security. 3,3 1.2 The candidate understands the customer perspective on information 3,3 governance. 1.3 The candidate understands the supplier's responsibilities in security assurance. 3,3 2 Risk Management The candidate understands the principles of risk management The candidate knows how to control risks The candidate knows how to deal with remaining risks Information security controls The candidate has knowledge of organizational controls The candidate has knowledge of technical controls The candidate has knowledge of physical, employment-related and continuity controls. 20 Total 100 8
9 Exam specifications 1. Information security perspective (10%) 1.1 Business (3.3%) The candidate understands the business interest of information security. The candidate is able to: Distinguish types of information based on their business value Explain the characteristics of a management system for information security 1.2 Customer (3.3%) The candidate understands the customer perspective on information governance. The candidate is able to: Explain the importance of information governance when outsourcing Recommend a supplier based on assurance controls 1.3 Service provider / supplier (3.3%) The candidate understands the supplier's responsibilities in security assurance. The candidate is able to: Distinguish security aspects in service management processes Support compliance activities 2. Risk management (30%) 2.1 Analysis (10%) The candidate understands the principles of risk management. The candidate is able to: Explain principles of analyzing risks Identify risks for classified assets Calculate risks for classified assets 2.2 Controls (10%) The candidate knows how to control risks. The candidate can: Categorize controls based on Confidentiality, Integrity and Availability (CIA) Choose controls based on incident cycle stages Choose relevant guidelines for applying controls 9
10 2.3 Remaining risks (10%) The candidate knows how to deal with remaining risks. The candidate can: Distinguish risk strategies Produce business cases for controls Produce reports on risk analyses 3. Information security controls (60%) 3.1 Organizational (20%) The candidate has knowledge of organizational controls. The candidate is able to: Write policies and procedures for information security Implement information security incident handling Perform an awareness campaign in the organization Implement roles and responsibilities for information security 3.2 Technical (20%) The candidate has knowledge of technical controls. The candidate is able to: Explain the purpose of security architectures Explain the purpose of security services Explain the importance of security elements in the IT infrastructure 3.3 Other controls (20%) The candidate has knowledge of physical, employment-related and continuity controls. The candidate is able to: Recommend controls for physical access Recommend security controls for employment life cycle Support the development and testing of a business continuity plan Comment For most staff members, security controls are the first aspects of information security they encounter. Therefore, information security controls are central to the module and have the highest weight. 10
11 3. Literature Exam literature A Cazemier, J.A., Overbeek, P., and Peters, L. Information Security Management with ITIL V3 Van Haren Publishing, 2010 ISBN B C Whitman, M.E., Mattord, H.J. Management of Information Security Cengage learning, 2010 Third Edition ISBN or International version: ISBN ISO/IEC 27002:2013 (EN) Information technology - Security techniques - Code of practice for information security controls Switzerland, ISO/IEC, Additional literature D BSI-standard IT-Grundschutz Methodology Bundesamt für Sicherheit in der Informationstechnik English version available for download on Partnernet E F ISO/IEC 27005:2011 (EN) Information technology -- Security techniques -- Information security risk management Switzerland, ISO/IEC, Pfleeger, Charles P. and Pfleeger, Shari Lawrence Security in Computing, 4 th edition Upper Saddle River NJ, Prentice Hall, 2006 ISBN
12 G ISO/IEC 27000:2014 (EN) Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary Switzerland, ISO/IEC, Comment: U.S. trainers and candidates can use the international version of literature item B. The book is exactly the same, apart from ISBN and book cover. Literature B provides a Glossary of terms which, if related to the Chapters mentioned in the overview of the literature below, are basic concepts for the exams. Literature B Chapter 6, Models on page 222 will not be tested. Literature B Chapter 6, Figure 6-3 on page 230; the arrow should turn right instead of left (Plan Do Check Act). Although since 2013 risk management is represented in ISO/IEC 27005, instead of ISO/IEC 27002, ISO/IEC is not primary exam literature because in the current exam literature enough content is found about this subject. Additional literature is for reference and depth of knowledge only. The exam is based on the exam literature. 12
13 Overview of the literature Exam specification Literature 1.1 A: 2.1; Chapter 3; 5.6 B: Chapter 4; Chapter A: 2.1; 5.3.4; 5.7; Annex A B: Chapter 2 C: 15.1; A: 2.1; Chapter 4; Annex A B: Chapter 12 C: 15.1; 15.2; Chapter 18, A: B: Chapter 8 C: Chapter 0 Introduction; Chapter B C Chapter 8, chapter 9 Chapter 0 Introduction 2.3 B: Chapter 8; Chapter 9 C: Chapter A: 4.5; 5.2; 5.3.1; 5.4 B: Chapter 3; Chapter 4; Chapter 5; Chapter 11 C: Chapter 5; 6.1; Chapter 7; Chapter A: Chapter 2 B: Chapter 5; Chapter 6; Chapter 10 C: 8.3; 12.1; 12.2; 12.3; 12.4; 13.1; 13.2; 15.2; Chapter B: Chapter 3; Chapter 11 C: Chapter 7; Chapter 11; Chapter 17 13
14 Contact EXIN
Information Security Management Expert based on ISO/IEC 27002
Preparation Guide Information Security Management Expert based on ISO/IEC 27002 Edition April 2014 Content 1. Overview 3 2. Exam requirements 7 3. List of basic concepts 15 4. Literature 16 Copyright 2014
EXIN Foundation in IT Service Management based on ISO/IEC 20000
Preparation Guide EXIN Foundation in IT Service Management based on ISO/IEC 20000 Edition June 2015 Copyright 2015 EXIN All rights reserved. No part of this publication may be published, reproduced, copied
Preparation Guide. EXIN IT Service Management Associate based on ISO/IEC 20000
Preparation Guide EXIN IT Service Management Associate based on ISO/IEC 20000 Edition January 2014 Copyright 2014 EXIN All rights reserved. No part of this publication may be published, reproduced, copied
Preparation Guide. EXIN IT Service Management Associate Bridge based on ISO/IEC 20000
Preparation Guide EXIN IT Service Management Associate Bridge based on ISO/IEC 20000 Edition January 2014 Copyright 2014 EXIN All rights reserved. No part of this publication may be published, reproduced,
Preparation Guide. Side entry to the EXIN Expert in IT Service Management based on ISO/IEC 20000
Preparation Guide Side entry to the EXIN Expert in IT Service Management based on ISO/IEC 20000 Edition June 2015 Copyright 2015 EXIN All rights reserved. No part of this publication may be published,
List of courses offered by Marc Taillefer
ISO/IEC 20000 Foundation (IS20F.EN) List of courses offered by Marc Taillefer Designed to provide knowledge of what an IT service management system is and the minimum requirements that service providers
Preparation Guide. IT Service Management Foundation Bridge based on ISO/IEC 20000
Preparation Guide IT Service Management Foundation Bridge based on ISO/IEC 20000 Edition April 2011 Copyright 2011 EXIN All rights reserved. No part of this publication may be published, reproduced, copied
Preparation Guide. EXIN IT Service Management Executive Consultant/Manager based on ISO/IEC 20000
Preparation Guide EXIN IT Service Management Executive Consultant/Manager based on ISO/IEC 20000 Edition March 2014 Copyright 2014 EXIN All rights reserved. No part of this publication may be published,
Preparation Guide. Microsoft Operations Framework Foundation
Preparation Guide Microsoft Operations Framework Foundation Edition February 2015 Copyright 2014 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in
Preparation Guide. EXIN Cloud Computing Foundation
Preparation Guide EXIN Cloud Computing Foundation Edition June 2012 Copyright 2012 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
Preparation Guide Content. EXIN Cloud. 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13. Computing Foundation
Preparation Guide Content EXIN Cloud 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13 Computing Foundation Edition December 2015 Copyright 2015 EXIN All rights reserved.
Foundation Bridge in IT Service Management (ITSM) according to ISO/IEC 20000. Specification Sheet. ISO/IEC 20000 Foundation Bridge TÜV SÜD Akademie
Foundation Bridge in IT Service Management (ITSM) according to ISO/IEC 20000 Specification Sheet TÜV SÜD Akademie Issue: 2.0 Date: 25 October 2012 Table of Contents 1 Reading aid... 4 2 ISO/IEC 20000 -
Preparation Guide. EXIN Agile Scrum Foundation
Preparation Guide EXIN Agile Scrum Foundation Edition March 2014 Copyright 2014 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
White paper. Secure Cloud Services: An Integrated Approach
White paper Secure Cloud Services: An Integrated Approach Edition October 2013 Whitepaper Information Management Secure Cloud Services: An Integrated Approach Edition October 2013 Copyright 2013 EXIN All
ITIL V3 Service Design Certification Program 3 Days
ITIL V3 Service Design Certification Program 3 Days Program Overview The ITIL Intermediate Qualification: Service Design Certificate is a free-standing qualification, but is also part of the ITIL Intermediate
ITIL V3 Service Operation Certification Program
ITIL V3 Service Operation Certification Program 3 Days Program Overview The ITIL Intermediate Qualification: Service Operation (SO) Certificate, although a stand alone qualification, yet is also part of
IT Service Management Practitioner: Support & Restore (based on ITIL ) (IPSR.EN)
Exam requirements IT Service Management Practitioner: Support & Restore (based on ITIL ) (IPSR.EN) Publication date 01-12-2009 Start date 01-01-2006 Summary Target group Context Prerequisites Practical
Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. March 19, 2015
Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan March 19, 2015 Network Security Reference Books Corporate Computer Security (3rd Edition)
ITIL 2011 Service Design Certification Program - 3 Days
ITIL 2011 Service Design Certification Program - 3 Days Program Overview ITIL is a set of best practices guidance that has become a worldwide-adopted framework for Information Technology Services Management
ITIL Operations Support Analysis (OSA) Certification Program - 5 Days
ITIL Operations Support Analysis (OSA) Certification Program - 5 Days Program Overview ITIL is a set of best practices guidance that has become a worldwide-adopted framework for Information Technology
IT Service Management Practitioner: Plan & Improve (based on ITIL ) (IPPI.EN)
Exam requirements IT Service Management Practitioner: Plan & Improve (based on ITIL ) (IPPI.EN) Publication date 01-12-2009 Start date 01-03-2007 Summary Target group Context Prerequisites Practical assignment
Frameworks for IT Management
Frameworks for IT Management Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see www.vanharen.net 18 ITIL - the IT Infrastructure
Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5), 46-49.
Safeguards Frameworks and Controls Theory of Secure Information Systems Features: Safeguards and Controls Richard Baskerville T 1 F 1 O 1 T 2 F 2 O 2 T 3 F 3 O 3 T 4... T n...... F l O m T F O Security
-Blue Print- The Quality Approach towards IT Service Management
-Blue Print- The Quality Approach towards IT Service Management The Qualification and Certification Program in IT Service Management according to ISO/IEC 20000 TÜV SÜD Akademie GmbH Certification Body
BCS Specialist Certificate in Business Relationship Management Syllabus. Version 1.9 March 2015
BCS Specialist Certificate in Business Relationship Management Syllabus Version 1.9 March 2015 BCS Specialist Certificate in Business Relationship Management Syllabus Contents Change History... 2 Rationale...
ISMS Implementation Guide
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation
ITIL Intermediate: Service Design. Lesson Plan. Mock Exam: Duration: Language:
ITIL Intermediate: Service Design Lesson Plan Delivery: e-learning Certificate: Examination (included) Accredited By: EXIN Mock Exam: Duration: Language: Included in Course (x2) 20 hours, self-paced English
EXIN Cloud Computing Foundation
Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
EXIN IT Service Management Foundation based on ISO/IEC 20000
Sample Exam EXIN IT Service Management Foundation Edition October 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
Name: Lynda Cooper Date: November 24th. Revising ISO/IEC 20000 to fit the future of service management
Name: Lynda Cooper Date: November 24th Revising ISO/IEC 20000 to fit the future of service management Agenda Brief overview of ISO20000 Changes Why and How What Your views and how you can influence the
ITIL 2011 Service Offerings & Agreement (SOA) Certification Program - 5 Days
ITIL 2011 Service Offerings & Agreement (SOA) Certification Program - 5 Days Program Overview ITIL is a set of best practices guidance that has become a worldwide-adopted framework for Information Technology
A Structured Comparison of Security Standards
A Structured Comparison of Security Standards Kristian Beckers 1, Isabelle Côté 3, Stefan Fenz 2, Denis Hatebur 1,3, and Maritta Heisel 1 1 paluno - The Ruhr Institute for Software Technology - University
BCS Specialist Certificate in Service Desk & Incident Management Syllabus
BCS Specialist Certificate in Service Desk & Incident Management Syllabus Version 1.8 March 2015 BCS Specialist Certificate in Service Desk & Incident Management Syllabus Contents Change History... 2 Rationale...
ISO 27000 Information Security Management Systems Foundation
ISO 27000 Information Security Management Systems Foundation Professional Certifications Sample Questions Sample Questions 1. is one of the industry standards/best practices in Service Management and Quality
2008 by Bundesamt für Sicherheit in der Informationstechnik (BSI) Godesberger Allee 185-189, 53175 Bonn
2008 by Bundesamt für Sicherheit in der Informationstechnik (BSI) Godesberger Allee 185-189, 53175 Bonn Contents Contents 1 Introduction 1.1 Version History 1.2 Objective 1.3 Target group 1.4 Application
ITIL V3 Release, Control and Validation (RCV) Certification Program - 5 Days
ITIL V3 Release, Control and Validation (RCV) Certification Program - 5 Days Program Overview The ITIL Intermediate Qualification: Release, Control and Validation (RCV) Certificate, although a stand alone
Chapter 4 Information Security Program Development
Chapter 4 Information Security Program Development Introduction Formal adherence to detailed security standards for electronic information processing systems is necessary for industry and government survival.
BCS Specialist Certificate in Change Management Syllabus
BCS Specialist Certificate in Change Management Syllabus Version 1.9 March 2015 BCS Specialist Certificate in Change Management Syllabus Contents Change History... 2 Rationale... 3 Aims and Objectives...
Information technology Security techniques Information security management systems Overview and vocabulary
INTERNATIONAL STANDARD ISO/IEC 27000 Third edition 2014-01-15 Information technology Security techniques Information security management systems Overview and vocabulary Technologies de l information Techniques
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...
ITIL v3 Service Manager Bridge
ITIL v3 Service Manager Bridge Course Length: 5 Days Course Overview This 5 day hands on, certification training program enables ITIL Version 2 certified Service Managers to upgrade their Service Manager
How To Manage Information Management
Copyright protected. Use is for Single Users only via a VHP Approved License. BiSL A Management Guide Copyright protected. Use is for Single Users only via a VHP Approved License. Other publications by
White Paper. Comparison of ISO/IEC 20000 with ASL and BiSL
White Paper Comparison of ISO/IEC 20000 with ASL and BiSL Both ISO/IEC 20000 and ASL offer guidance for IT Service Providers, ISO/IEC 20000 giving broad guidance for IT Service Management and ASL focusing
Frameworks for IT Management
Frameworks for IT ment 14 BiSL Business Information Services Library The Business Information Services Library (BiSL) has a focus on how business organizations can improve control over their information
Sample Exam. IT Service Management Foundation based on ISO/IEC 20000
Sample Exam IT Service Management Foundation based on ISO/IEC 20000 Edition April 2011 Copyright 2011 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored
ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters
When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9
Guideline for Roles & Responsibilities in Information Asset Management
ISO 27001 Implementer s Forum Guideline for Roles & Responsibilities in Information Asset Management Document ID ISMS/GL/ 003 Classification Internal Use Only Version Number Initial Owner Issue Date 07-08-2009
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
Recent Advances in Automatic Control, Information and Communications
Proposal of the improvement of actual ITIL version based on comparative IT Service Management methodologies and standards The implementation of IT Service Management frameworks and standards Anel Tanovic*,
An Overview of ISO/IEC 27000 family of Information Security Management System Standards
What is ISO/IEC 27001? The ISO/IEC 27001 standard, published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), is known as Information
How To Protect Your Computer System From Being Hacked
INTERNATIONAL STANDARD ISO/IEC 27002 Second edition 2013-10-01 Information technology Security techniques Code of practice for information security controls Technologies de l information Techniques de
CS 450/650 Fundamentals of Integrated Computer Security
CS 450/650 Fundamentals of Integrated Computer Security Course Information Department of Computer Science & Engineering UNR, Fall 2014 Class hours Tuesday & Thursday, 1:00 2:15am @ PE 101 Instructor E
ITIL v3 Qualification Scheme
ITIL v3 Qualification Scheme ITIL Version 3 Qualification Scheme diagram Key for the Intermediate modules: Lifecycle modules SS Service Strategy SD Service Delivery ST Service Transition SO Service Operation
COBIT Helps Organizations Meet Performance and Compliance Requirements
DISCUSS THIS ARTICLE COBIT Helps Organizations Meet Performance and Compliance Requirements By Sreechith Radhakrishnan, COBIT Certified Assessor, ISO/IEC 20000 LA, ISO/IEC 27001 LA, ISO22301 LA, ITIL Expert,
ISO/IEC 20000 Part 1 the next edition. Lynda Cooper project editor for ISO20000 part 1
ISO/IEC 20000 Part 1 the next edition Lynda Cooper project editor for ISO20000 part 1 Agenda The ISO20000 series Why has it changed Changes ITIL3 impact New requirements Changed requirements How to prepare
Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see www.vanharen.
Metrics for Service Management Governance Strategy Risk Architecture + Infrastructure Design CSF KPI Metrics Transition SDP Requirements CSI Tools Services Operation Processes + ITSM Processes Value Other
BCS Practitioner Certificate in Business Continuity Management Syllabus
BCS Practitioner Certificate in Business Continuity Management Syllabus Version 4.3 March 2015 Contents Change History... 4 Introduction... 5 Objectives... 5 Entry Criteria... 5 Examination Format and
DRAFT ÖNORM ISO/IEC 27005
DRAFT ÖNORM ISO/IEC 27005 Edition: 2013-07-01 Information technology Security techniques Information security risk management (ISO/IEC 27005:2011) Informationstechnologie Sicherheitstechnik Informationssicherheits-
Accredited ITIL elearning courses
Accredited ITIL elearning courses Contents Introducing ITIL. 3 Available now!. 4 ITIL 2011 Foundation elearning. 5 ITIL Intermediate level. 7 ITIL 2011 Intermediate: Service Strategy Premium elearning.
GUIDE 62. General requirements for bodies operating assessment and certification/registration of quality systems
GUIDE 62 General requirements for bodies operating assessment and certification/registration of quality systems First edition 1996 ISO/IEC GUIDE 62:1996(E) Contents Pag e Section 1: General 1 1.1 Scope
EXAM PREPARATION GUIDE
EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27001 Lead Auditor The objective of the Certified ISO/IEC 27001 Lead Auditor examination is to ensure that the candidate has the knowledge and the skills to
INTERMEDIATE QUALIFICATION
PROFESSIONAL QUALIFICATION SCHEME INTERMEDIATE QUALIFICATION SERVICE CAPABILITY PLANNING, PROTECTION AND OPTIMIZATION CERTIFICATE SYLLABUS The Swirl logo is a trade mark of the Cabinet Office ITIL is a
IRCA Briefing note ISO/IEC 20000-1: 2011
IRCA Briefing note ISO/IEC 20000-1: 2011 How to apply for and maintain Training Organization Approval and Training Course Certification IRCA 3000 Contents Introduction 3 Summary of the changes within ISO/IEC
ITIL Service Lifecycle Design
ITIL Service Lifecycle Design Course Details Course Code: Duration: Notes: ITILSL-Des 5 days This course syllabus should be used to determine whether the course is appropriate for the students, based on
Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see www.vanharen.
Implementing Information Security based on ISO 27001/ISO 27002 - A Management Guide Other publications by Van Haren Publishing Van Haren Publishing (VHP) specializes in titles on Best Practices, methods
Document Control Information
Document Control Information Document Details Document Name Purpose of Document Document Version Number 3.0 Document Status Document Owner Prepared By ITIL Service Management Practices: V3 Qualifications
Factsheet ITIL -V3 Capability module Service Offerings and Agreements
Factsheet ITIL -V3 Capability module Service Offerings and Agreements www.startel.nl 1. GENERAL 1.1. Course data and course hours Training courses IT Service Management Capability module Service Offerings
ISO 9001. What to do. for Small Businesses. Advice from ISO/TC 176
ISO 9001 for Small Businesses What to do Advice from ISO/TC 176 ISO 9001 for Small Businesses What to do Advice from ISO/TC 176 ISO Central Secretariat 1, chemin de la Voie-Creuse Case postale 56 CH -
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents INSTRUCTIONS TO VENDORS 3 VENDOR COMPLIANCE PROGRAM OVERVIEW 4 VENDOR COMPLIANCE
Guidelines 1 on Information Technology Security
Guidelines 1 on Information Technology Security Introduction The State Bank of Pakistan recognizes that financial industry is built around the sanctity of the financial transactions. Owing to the critical
Practical implementation of ISO 27001 / 27002
Practical implementation of ISO 27001 / 27002 Lecture #2 Security in Organizations 2011 Eric Verheul 1 Main literature for this lecture: 1. ISO 27001 and ISO 27002 Literature 2. How to Achieve 27001 Certification,
Tasmanian Government Information Security Framework
Tasmanian Government Information Security Framework Tasmanian Government Information Security Charter Version 1.0 May 2003 Department of Premier and Cabinet Inter Agency Policy And Projects Unit 1 Purpose
ISO 27001: Information Security and the Road to Certification
ISO 27001: Information Security and the Road to Certification White paper Abstract An information security management system (ISMS) is an essential part of an organization s defense against cyberattacks
ITIL Service Management Practices V3 Qualifications Scheme
ITIL Service Management Practices V3 Qualifications Scheme Contents 1. Scope and purpose of document 1 1.1. Synopsis 1 1.2. Suggested reading 1 2. ITIL Overview 1 2.1. What is ITIL? 1 2.2. What does official
ISO20000: What it is and how it relates to ITIL v3
ISO20000: What it is and how it relates to ITIL v3 John DiMaria; Certified Six Sigma BB, HISP BSI Product Manager; ICT (ISMS,ITSM,BCM) Objectives and Agenda To raise awareness, to inform and to enthuse
ITIL Foundation for IT Service Management 2011 Edition
ITIL Foundation for IT Service Management 2011 Edition ITIL Rev 03.12 3 days Description ITIL (IT Infrastructure Library) provides a practical, no-nonsense framework for identifying, planning, delivering
Information Security Management Systems
Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector
ITIL QUALIFICATION SCHEME & ROLE-BASED TRAINING MATRIX WHITE PAPER
& ROLE-BASED TRAINING MATRIX WHITE PAPER PRESENTED BY: PUBLISHED: MAY 1, 2014 VERSION: 4 LISA SCHWARTZ AND DONNA KNAPP, ITSM ACADEMY SECTION PAGE Overview 2 Path to ITIL Expert Certification 3-5 Complementary
INTERMEDIATE QUALIFICATION
PROFESSIONAL QUALIFICATION SCHEME INTERMEDIATE QUALIFICATION SERVICE LIFECYCLE CONTINUAL SERVICE IMPROVEMENT CERTIFICATE SYLLABUS Page 2 of 18 Document owner The Official ITIL Accreditor Contents CONTINUAL
EXIN Accredited 4 days workshop on ITIL Intermediate Qualification- Release Control & Validation Certificate
EXIN Accredited 4 days workshop on ITIL Intermediate Qualification- Release Control & Validation Certificate About the Workshop Workshop on The ITIL Intermediate Qualification: Release, Control and Validation
