Information Security Manual (ISM) Fundamentals

by CIT Solutions Claim Listing

The Information Security Manual (ISM) Fundamentals Course is designed for organisations who intend to have an Infosec Registered Assessors Program (IRAP) Assessment conducted in their workplace.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

CIT Solutions Logo

img Duration

2 Days

Course Details

The Information Security Manual (ISM) Fundamentals Course is designed for organisations who intend to have an Infosec Registered Assessors Program (IRAP) Assessment conducted in their workplace

Facilitated by our expert trainer with extensive experience in cybersecurity and risk management, this short two-day program supports members in an organisation to better prepare them for an IRAP Assessment by understanding the Australian Government Information Security Manual and how it applies to the IRAP assessment process. 

It aims to give participants a basic understanding of why an organisation would engage an IRAP Assessor and what processes are involved during an IRAP Assessment. It also covers the foundational documentation that supports this process, the Australian Government Information Security Manual (ISM).

Created and maintained by the Australian Cyber Security Centre (ACSC), the Information Security Manual (ISM) is the key document used as the national industry-standard for cyber security practices. 

Aiming to protect the data, systems, and information of individual organisations, the ISM acts as a framework for organisations that they can apply using their own risk management frameworks. 

It’s used by high level security officers, chief information officers, cybersecurity professionals, and information technology managers. The ISM offers best practice and essential protocols, which IRAP Assessors follow and report on during an assessment.

 

Learners can expect to learn about:

  • The governance of cyber security and Australian Government policy frameworks
  • The benefits of an IRAP Assessment for their organisation
  • The ACSC’s Information Security Manual
  • How the ISM is used for an IRAP Assessment

 

Additional Information:

The course covers how the principles from the Information Security Manual will be applied during an IRAP Assessment. By understanding the fundamentals of the Information Security Manual, participants will better prepare themselves and their organisation for an IRAP Assessment.

 

Learning Outcomes:

  • Discuss security controls as outlined in policy and guidance, including the ISM
  • Explain and contrast the roles of ASD, system owners, and relevant security authorities, and explain the relationships between them
  • Describe the threats present and the role of security controls
  • Apply a risk-based approach to implementing appropriate security controls
  • Communicate the merits of a particular implementation or deviation from security controls
  • Bruce Branch

    J, Vowels Cres, Bruce, Canberra
  • Red Hill Branch

    40 Monaro Crescent, ACT 2603, Red Hill, Canberra

Check out more ISMS (Information Security Management System) courses in Australia

ITSM Hub Logo

NIST Cyber Security Professional Certification

The Framework also helps them respond to and recover from cyber security incidents, prompting them to analyse root causes and consider how they can make improvements

by ITSM Hub [Claim Listing ]
Australian Institute of Management Logo

Cybersecurity Fundamentals

This practical and interactive course focuses on demystifying the complex world of cybersecurity, translating it into language and concepts that are easily understood and actionable for non-technical individuals.

by Australian Institute of Management [Claim Listing ]
Ab2 Institute of Accounting Logo

Data and Cyber Security

Understand the risks hackers pose to your accounting firm and learn how to spot their breaches with this all-inclusive introduction to cybersecurity.

by Ab2 Institute of Accounting [Claim Listing ]
Brighton College Logo

Advanced Diploma of Information Technology (Telecommunications Network Engineering and Cyber Security)

This qualification reflects the role of individuals in a variety of information and communications technology (ICT) roles who have established specialised skills in a technical ICT function

by Brighton College [Claim Listing ]
Logitrain Logo

CompTIA Security

The evolved CompTIA Security+ certification course aims to train information technology students with adequate skills and knowledge required to network security issues and efficiently tackle them. Being vendor-neutral, this CompTIA certification course imparts broad knowledge to develop expertise i...

by Logitrain

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy