Foundation Certificate in Information Security (FCIS) Course Description

Similar documents
Practitioner Certificate in Information Assurance Architecture (PCiIAA)

ITIL V3 Service Operation Certification Program

BCS Foundation Certificate in Business Analysis Syllabus. Version 3.8 July 2016

Examination Guidance for the Advanced Certificate in PPSO Examinations. Version 1.0

Software Testing Certifications

Guide to CQI Qualifications for learners

The aim of this presentation is to give you an overview of the main things that will help you prepare candidates for success at F6 (ROM).

ITIL V3 Service Design Certification Program 3 Days

ITIL 2011 Service Design Certification Program - 3 Days

BCS Foundation Certificate in Agile Syllabus

Factsheet ITIL -V3 Capability module Release, Control and Validation

ITIL v3 Qualification Scheme

Certification criteria for. Internal QMS Auditor Training Course

BCS Specialist Certificate in Change Management Syllabus

Digital Industries Apprenticeship: Assessment Plan. Cyber Security Technologist. April 2016

ITIL Operations Support Analysis (OSA) Certification Program - 5 Days

Improve your English and increase your employability with EN Campaigns

Frequently Asked Questions.

OGC s Official Accreditor

Agile Tester Foundation Course Outline

SABSA A Brief Introduction

The Open Group Certified Architect (Open CA) Program

Prince2. Foundation and practitioners. Course

Evidence of English language skills: Guidance for European doctors applying for a licence to practise

MASTER S DEGREE IN EUROPEAN STUDIES

Teaching Framework. Competency statements

ITSM Specialties, LLC

ITIL Intermediate Programs

EXIN Accredited 4 days workshop on ITIL Intermediate Qualification- Release Control & Validation Certificate

Personal Development Planning

ITIL 2011 Service Offerings & Agreement (SOA) Certification Program - 5 Days

BCS-ISEB Business Analysis Training

Diploma and Foundation Degree in Merchanting

Qualification Specification

E-Learning Courses. Course Category

Student Course Outline

The course is taught in English. duration of 12 semesters may be agreed by the school.

DIPLOMA OF PROJECT MANAGEMENT BSB (Classroom Delivery)

ITIL V3 Release, Control and Validation (RCV) Certification Program - 5 Days

Federal higher educational standard for Business Informatics in Russia Prof. Victor Nikitin, Prof. Svetlana Maltseva, Prof. Oleg Kozyrev (State

Level 3 Certificate in Printing and Graphic Communications (5261)

School of Health Sciences Department or equivalent Health Services Research and Management Division

CSci application information for self-guided route

BCS Certificate in Systems Modelling Techniques Syllabus

The CIF provides core information to students, staff teams and others on a particular course of study. Web Design and Software Development

Writing Reports BJECTIVES ONTENTS. By the end of this section you should be able to :

Project Management Assessment Overview

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies

Revised October 2013

Qualification Specification

Training for IT project managers and team leads

Young Enterprise Masterclass

Course 6234A: Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services

National University of Ireland, Galway

Tier 1 Life Insurance

VDA 6.3 Training & Qualification.

Certificate IV in Credit Management Course Outline

Lean Six Sigma Black Belt Certification Recommendation. Name (as it will appear on the certificate) Address. City State, Zip

Charity Accounting and Financial Management (Conversion) Cass Business School Department or equivalent MSc Programme (Cass Business School)

Certified Big Data Science Professional (CBDSP)

Professional Accounting Qualifications with the Chartered Institute of Management Accountants (CIMA) November 2014

CERTIFIED BUSINESS RELATIONSHIP MANAGER

Hertsmere Borough Council. Data Quality Strategy. December

Study Guide for the Library Media Specialist Test Revised 2009

Career Paths in Information Security v6.0

How to tackle exams: a marker s perspective

Document Control Information

ITIL Intermediate Qualification: Service Offerings and Agreement. Webinar presentation 8 May 2009

Syllabus. No: CIS 150. Title: Networking Fundamentals. Credits: 4. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer

Agile Programme Management

DIPLOMA OF PROJECT MANAGEMENT BSB (Workplace Delivery)

Data Vault Modeling in a Day

Software Architecture Professional Certificate

High level principles for risk management

N252; N250; N250; I120; I160; I210 KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University

1) Course Entry Requirement(s) To gain entry to the Diploma of Higher Education in Business Studies prospective students must have:

Appendix 1 Exam Regulations. Application for Reaccreditation for the Master degree: Master of Science in Electronic Business

Health and Safety Policy and Procedures

Module F13 The TOGAF Certification for People Program

University Centre at Blackburn College. Abbreviated Programme Specification Containing Both Core + Supplementary Information

NetDimensions Performance

The Advanced Certificate in Performance Audit for International and Public Affairs Management. Workshop Overview

ITIL Intermediate Qualification: Service Strategy Certificate. Webinar presentation 15 April 2009

The ITIL v.3. Foundation Examination

Business School. Accounting. June 2007

Guide to Media Evaluation. 1. What is the purpose of Media Evaluation? 2. What forms can it take?

EXTENUATING CIRCUMSTANCES GUIDELINES FOR STUDENTS AND STAFF

Foundation Year in Social Sciences and

BCS Certificate in Business Analysis Extended Syllabus. Version 2.4 March 2015

Designing a Microsoft SharePoint 2010 Infrastructure

Henley Business School at Univ of Reading. Accreditation from the British Computer Society will be sought

Policy Document Planning, Assessment, Recording and Reporting September 2010

Module Management Information

Basics of Student Project Management (BSPM) High- Level Course Syllabus

BUSINESS STRATEGY SYLLABUS

Industrial Psychology - INP 4004

ASAP Certification Examination Preparation Guide

STIR Education Micro-Innovations that raise results STUDENT ATTENDANCE SCANNER

Practitioner Certificate Software Asset Management Syllabus. Version 2.0

i2isales Training Solution - Sales Management

Transcription:

Foundation Certificate in Information Security (FCIS) Course Description 14 th April 2015 Version 1.4 Course Duration: 1.5 days / 11.5 hours The Foundation Certificate in Information Security (FCIS) course is designed to provide the foundation of knowledge necessary for individuals who have IT or information security responsibilities as part of their day-to-day role, or who are thinking of moving into an information security function. Every member of IT staff should have this knowledge. If your IT staff do not know what a BIA is or do not understand the significance of Risk Assessments then it may be time to baseline all your IT staff with this course. The FCIS course introduces the concept of and disciplines within Information Assurance and how this can contribute to and form part of the overall business strategy for an organisation. It provides the opportunity for those exploring or moving into information security roles to enhance or refresh their knowledge and, in the process, gain a recognised industry qualification, regulated by the Global Certification Institute (GCI). This is useful to both the individual and employer in terms of attesting to the level of professional ability an individual has attained. Based upon international standards and industry best practice, this course provides a great foundation for anyone starting a career in Information/Cyber Security or who are taking on extra Information Security responsibilities. 11.5 hours of condensed knowledge + a 1 hour exam proves your understanding of the top four disciplines of Information Security. The InfoSec Skills FCIS course primes the student with all the knowledge needed to sit the Global Certification Institute (GCI) - Foundation Certificate in Information Security (FCIS) examination. InfoSec Skills Limited 2014. All rights reserved. Page 1 of 5

Why should you attend? This course is intended for anyone who has an interest in information security, either for potential or existing security professionals, or as an additional part of his or her general business knowledge (for example, the material covered on this course would make good supporting material for network/system administrator who have or who are taking on additional security responsibilities, business managers, IT managers, security analysts and IT staff. When used as a baseline for all IT staff this course ensures that they speak the same language as your security team and that they understand why the security team do what they do. Prerequisites Knowledge of IT systems would be advantageous but not essential. An understanding of the general principles of information technology security would be useful, but again, not essential. Course Contents The course consists of five modules: Module 1 Introduction to Information Security Management Module 2 Introduction to Information Risk Management Module 3 Introduction to Business Continuity Management Module 4 Introduction to Information Assurance Architecture Module 5 Preparation for the FCIS exam Assessment Each topic contains a quiz that enables a student to test their knowledge of the information covered in that topic. At the end of each module the student must undertake a test to assess their understanding of the information provided in that module and to see if the objectives of the module have been met. At the end of the course, we provide an overview of the format, structure and scoring of the exam that prepares you for the Global Certification Institute (GCI) - Foundation Certificate in Information Security (FCIS) exam and professional certificate, which is bundled with this course. Total Length of Course The total time specified in this syllabus is a minimum of 11.5 hours of lecturing and practical work. Course Materials On attending this course students are provided with: Full colour, indexed, perfect bound, course book containing all course slides and notes Classroom exercises Sample exam questions InfoSec Skills Limited 2014. All rights reserved. Page 2 of 5

Course Outline Module 1 Introduction to Information Security Management In this module the student will learn the basic concepts of information security along with the main terminology commonly in use. Students will gain an understanding of why information security is becoming increasingly important, not just in the IT community but also in the business community at large. Concepts and definitions Benefits and requirements of information security At the end of this module the student will: Be able to define and explain the key terms used in information security and use these terms correctly and appropriately Be able to explain and justify a number of the key concepts in information security and explain these concepts correctly and appropriately 2 hours. Module 2 Introduction to Information Risk Management This module introduces the student to the basic concepts of business risk management, its rationale, core terminology and fundamental principles. It introduces the need for and application of international standards and regulatory frameworks and stresses the adoption of a strategic approach to information risk management. Information risk management terminology Risk management in the business context Information risk management fundamentals Understand the significance of information risk management to business Understand and be able to apply basic information risk management terminology Understand basic information risk management principles 4 hours. InfoSec Skills Limited 2014. All rights reserved. Page 3 of 5

Module 3 Introduction to Business Continuity Management In this module the student will learn the basic concepts of business continuity management along with the main terminology commonly in use. Students will gain an understanding of why business continuity management is becoming increasingly important, not just in the IT community but also in the business community at large. The need for business continuity management The context of business continuity management in the business The business continuity lifecycle Define and explain the key terms used in business continuity management in their appropriate context Explain and justify a number of the key concepts of business continuity management Explain the overall business continuity lifecycle 2 hours. Module 4 Introduction to Information Assurance Architecture What is Security Architecture? This module lays down the foundation of understanding of what it means to be a security architect and what the basic principles of architecture are. It describes the relationship to Enterprise Architecture Frameworks and how some of these frameworks address security. Security architecture is at the heart of what it is to be a security architect. However, unlike technical architecture work, where components are added together to create an end-solution based on technical know-how, security architecture adopts a framework approach for deploying patterns of risk-reducing technology that provide varying levels of assurance depending on the underlying security requirements. Being an SA is a technical job, without doubt, but the key to success in these areas comes from detailed knowledge of what comprises security technology in terms of product assurance, network and technical design/development work (using secure development principles) and the trade off between physical, logical and procedural controls. What is Security Architecture? The Role of a Security Architect. Security Design Principles. Conceptual Architectures. Describe the role of the security architect and the concept of security architectures in context of enterprise architectures. Explain the skills, especially soft skills, an SA must possess. Explain the concepts and design principles used by security architects when designing systems. Design principles such as least privilege, segregation of duties are described. Describe security architectures at a high level using appropriate contextual terms and have enough knowledge to describe architectural concepts related to security concerns. InfoSec Skills Limited 2014. All rights reserved. Page 4 of 5

Explain the importance of design patterns and conceptual architectures. Recognise separation of systems as a way to reduce risk. 3 hours. Module 5 Preparation for the FCIS exam The final module will prepare the student for the FCIS examination to be undertaken through an online proctored exam. Format, structure and scoring of the exam Objectives At the end of this module the student will: Understand the format and scoring of the examination Be prepared to take and pass the FCIS examination 30 minutes. InfoSec Skills Limited 2014. All rights reserved. Page 5 of 5