Course Summary
The ITIL 4 Practitioner: Information Security Management is intended for IT professionals who want to prove and validate their skills in this specific practice area. The individuals can demonstrate their understanding and application of the key concepts, principles, value and challenges of the practice at both strategic and operational levels, maximising value of the Information Security Management practice in their everyday work.
This course will help you to:
• Ensure in conjunction with other ITIL Practices that an organisation’s products and services meet the required level of information security for all involved parties
• Protect the technology and data assets crucial for the organisation’s operations including from loss of reputation and financial consequences
• Protect the organisation, its employees and its customers from cyber crime
• Provide a clear picture of information security threats and vulnerabilities
• Measure, assess and develop the Information Security Management practice capability in their organisation by using the ITIL Maturity Model.
1. The key concepts of the practice
1.1 Explain the purpose of the practice
1.2 Describe the PSFs & key metrics of the practice
1.3. Explain the key terms/concepts:
a. information security characteristics
b. (confidentiality, availability, integrity)
c. authentication
d. non-repudiation
e. threat, threat actor
f. vulnerability
g. risk, control, risk treatment, residual risk
2. The processes of the practice
2.1 Describe inputs and outputs of the processes
2.2 Describe the key activities of the processes
2.3 Know how to integrate the practice in the organization’s value streams
3. The roles and competencies of the practice
3.1 Describe the responsibilities of the key roles of the practice:
a. chief information security officer
b. information security manager
3.2 Know how to position the practice in the organizational structure
4. How information and technology
4.1 Explain the tools application
4.2 Apply the recommendations on automation
5. The role of partners and suppliers in the practice
5.1 Explain the dependencies of the practice on third parties
5.2 Explain how partners and suppliers can support the practice
6. How the ITIL capability model can be used to develop the practice
6.1 Explain how capability criteria support the practice capability development
7. The recommendations for the practice success
7.1 Understand the recommendations for information security management success and how they are supported by the ITIL guiding principles
Other Popular Courses
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Intermediate
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 4 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT
Next Generation Mindfulness
- Duration: 1 Days
- Language: English
- Level: Foundation
- Exam: NGM