Information Security Manual (ISM) Fundamentals

by CIT Solutions Claim Listing

The Information Security Manual (ISM) Fundamentals Course is designed for organisations who intend to have an Infosec Registered Assessors Program (IRAP) Assessment conducted in their workplace.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

CIT Solutions Logo

img Duration

2 Days

Course Details

The Information Security Manual (ISM) Fundamentals Course is designed for organisations who intend to have an Infosec Registered Assessors Program (IRAP) Assessment conducted in their workplace

Facilitated by our expert trainer with extensive experience in cybersecurity and risk management, this short two-day program supports members in an organisation to better prepare them for an IRAP Assessment by understanding the Australian Government Information Security Manual and how it applies to the IRAP assessment process. 

It aims to give participants a basic understanding of why an organisation would engage an IRAP Assessor and what processes are involved during an IRAP Assessment. It also covers the foundational documentation that supports this process, the Australian Government Information Security Manual (ISM).

Created and maintained by the Australian Cyber Security Centre (ACSC), the Information Security Manual (ISM) is the key document used as the national industry-standard for cyber security practices. 

Aiming to protect the data, systems, and information of individual organisations, the ISM acts as a framework for organisations that they can apply using their own risk management frameworks. 

It’s used by high level security officers, chief information officers, cybersecurity professionals, and information technology managers. The ISM offers best practice and essential protocols, which IRAP Assessors follow and report on during an assessment.

 

Learners can expect to learn about:

  • The governance of cyber security and Australian Government policy frameworks
  • The benefits of an IRAP Assessment for their organisation
  • The ACSC’s Information Security Manual
  • How the ISM is used for an IRAP Assessment

 

Additional Information:

The course covers how the principles from the Information Security Manual will be applied during an IRAP Assessment. By understanding the fundamentals of the Information Security Manual, participants will better prepare themselves and their organisation for an IRAP Assessment.

 

Learning Outcomes:

  • Discuss security controls as outlined in policy and guidance, including the ISM
  • Explain and contrast the roles of ASD, system owners, and relevant security authorities, and explain the relationships between them
  • Describe the threats present and the role of security controls
  • Apply a risk-based approach to implementing appropriate security controls
  • Communicate the merits of a particular implementation or deviation from security controls
  • Bruce Branch

    J, Vowels Cres, Bruce, Canberra
  • Red Hill Branch

    40 Monaro Crescent, ACT 2603, Red Hill, Canberra

Check out more ISMS (Information Security Management System) courses in Australia

ALC Training Logo

CGEIT® Certified in Governance of Enterprise IT

The ISACA® Certified in Governance of Enterprise IT (CGEIT)® certification is the world-leading vendor-neutral certification designed for IT professionals in large organisations who are responsible for directing, managing and supporting the governance of enterprise IT.

by ALC Training [Claim Listing ]
Prog360 Logo

CISM - Certified Information Security Manager Training Course

Our CISM training methodology provides an in-depth coverage of contents across the Four CISM domains with a clear focus on building concepts and solving ISACA released CISM exam questions.

by Prog360
IT Route Training & Certification Logo

CompTIA Security+

CompTIA Security + course covers network security and risk management area of IT network. This course is suitable for the Professionals who want to advance their career in network security.

by IT Route Training & Certification [Claim Listing ]
Coding Kids Logo

Cybersecurity

Security, Linux and Hacking Games is a cyber security course for 14-16 year olds who are interested in learning about security and Linux fundamentals through "hacking" games. This can be attended by beginners new to Linux. No prior experience required.

by Coding Kids [Claim Listing ]
Box Hill Institute Logo

Information Technology

This course is designed to give you the skills you need to begin your career in Information and Communications Technology (ICT). The course has a focus on cyber security. You'll learn a broad range of skills from cyber awareness, teamwork, networking, programming and threat assessments.

by Box Hill Institute [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy