Course Summary

The ITIL 4 Practitioner: Information Security Management is intended for IT professionals who want to prove and validate their skills in this specific practice area. The individuals can demonstrate their understanding and application of the key concepts, principles, value and challenges of the practice at both strategic and operational levels, maximising value of the Information Security Management practice in their everyday work.

This course will help you to:

• Ensure in conjunction with other ITIL Practices that an organisation’s products and services meet the required level of information security for all involved parties
• Protect the technology and data assets crucial for the organisation’s operations including from loss of reputation and financial consequences
• Protect the organisation, its employees and its customers from cyber crime
• Provide a clear picture of information security threats and vulnerabilities
• Measure, assess and develop the Information Security Management practice capability in their organisation by using the ITIL Maturity Model.

1. The key concepts of the practice
1.1 Explain the purpose of the practice
1.2 Describe the PSFs & key metrics of the practice
1.3. Explain the key terms/concepts:
a. information security characteristics
b. (confidentiality, availability, integrity)
c. authentication
d. non-repudiation
e. threat, threat actor
f. vulnerability
g. risk, control, risk treatment, residual risk
2. The processes of the practice
2.1 Describe inputs and outputs of the processes
2.2 Describe the key activities of the processes
2.3 Know how to integrate the practice in the organization’s value streams
3. The roles and competencies of the practice
3.1 Describe the responsibilities of the key roles of the practice:
a. chief information security officer
b. information security manager
3.2 Know how to position the practice in the organizational structure
4. How information and technology
4.1 Explain the tools application
4.2 Apply the recommendations on automation
5. The role of partners and suppliers in the practice
5.1 Explain the dependencies of the practice on third parties
5.2 Explain how partners and suppliers can support the practice
6. How the ITIL capability model can be used to develop the practice
6.1 Explain how capability criteria support the practice capability development
7. The recommendations for the practice success
7.1 Understand the recommendations for information security management success and how they are supported by the ITIL guiding principles

There are currently no prerequisites for this course

Exam Details: Number of Questions: 20 Format: Multiple Choice Passing Score: 13 out of 20 marks (65%) Duration: 30 minutes Format: Closed book

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?