ITIL4P-CAI-ISM ITIL® 4 Practitioner: Information Security Management – Including Exam

This 1-day ITIL® 4 Practitioner: Information Security Management Practice module focuses on providing the candidates with the understanding of the key concepts, principles, value and challenges of the Information Security Management practice. It is intended to provide candidates with best practice guidance on how to protect the information needed by the organization to conduct its business.The ITIL 4 Information Security Management Practitioner module is structured and aligned around the ITIL framework. The examination is intended to assess whether the candidate can demonstrate sufficient understanding and application of the concepts covered in the ITIL 4 Information Security Management Practice publication.ITIL® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.

Kontakt oss: Kurs@sgpartner.no

Kurskode: ITIL4P-CAI-ISM Kategorier: ,

COURSE OBJECTIVE:
• Understand the key concepts of the practice. • Understand the processes of the practice. • Understand the roles and competences of the practice. • Understand how information and technology support and enable the practice. • Understand the role of partners and suppliers in the practice. • Understand how the ITIL capability model can be used to develop the practice. • Understand how the ITIL guiding principles support the practice.

 

TARGET AUDIENCE:
This practice module is for IT professionals who want to prove and validate their skills in this specific practice area.

COURSE PREREQUISITES:
• The candidate must have passed the ITIL 4 Foundation examination.

COURSE CONTENT:
Our ITIL® 4 Practitioner: Information Security Management training course will cover the following topics:1. Understand the key concepts of the practice1.1 Explain the purpose of the practice.
1.2 Describe the practice success factors & key metrics of the practice.
1.3 Explain the key terms/concepts:
a) information security characteristics (confidentiality, availability, integrity)
b) authentication
c) non-repudiation
d) threat, threat actor
e) vulnerability
f) risk, control, risk treatment, residual risk2. Understand the processes of the practice2.1 Describe inputs and outputs of the processes.
2.2 Describe the key activities of the processes.
2.3 Know how to integrate the practice in the organization's value streams.3. Understand the roles and competences of the practice3.1 Describe the responsibilities of the key roles of the practice
a) chief information security officer
b) information security manager
3.2 Know how to position the practice in the organizational structure.
4. Understand how information and technology support and enable the practice 4.1 Explain the tools application
4.2 Apply the recommendations on automation5. Understand the role of partners and suppliers in the practice 5.1 Explain the dependencies of the practice on third parties.
5.2 Explain how partners and suppliers can support the practice.6. Understand how the ITIL capability model can be used to develop the practice. 7. Understand how ITIL guiding principles help to develop the practice.

FOLLOW ON COURSES:
Not available. Please contact.

Additional information