Information Security Management

 



Famsoft's Information Security Management course focuses on the common body of knowledge (CBK) as defined by the International Information Systems Security Certification Consortium (ISC)2. The following modules make up the Famsoft's Information Security Management career track:

1. Access Control Systems & Methodology

2. Risk Mgmt & Business Continuity Planning

3. Cryptography

4. Policy, Standards & Organization

5. Law, Investigation & Ethics

6. Computer Architecture & Systems Security

7. Application Security

8. Security Management Practices

9. Security Architecture & Models

10. Telecommunications & Network Security








Access Control Systems & Methodology | Hours: 10 | Sessions: 3

Designed for students with no prior networking knowledge, this course provides students with a introduction to the full range of Access control systems and methodologies. Topics include:


1. Physical mechanisms

2. Logical mechanisms

3. Administrative mechanisms

4. Access control principles and objectives

5. Access control issues

6. Access control administration



Back to Top


Risk Mgmt & Business Continuity Planning | Hours: 10 | Sessions: 3

Topics include:


1. Risk Analysis and Assessment

2. Business Continuity in Distributed Environment

3. The Business Impact assessment process



Back to Top


Cryptography | Hours: 10 | Sessions: 3

This course emphasizes the practical skills required to implement security using Cryptography. Exercises in this section include:


1. Cryptography Applications and Uses

2. Cryptography and Escrowed Encryption



Back to Top


Policy, Standards & Organization | Hours: 10 | Sessions: 3

Topics include :


1. Information Classification

2. Security Awareness

3. Organization Architecture

4. Enterprise Security Architecture

5. Policy Development



Back to Top


Law, Investigation & Ethics | Hours: 10 | Sessions: 3

This module describes legal issues relating computer abuse and their investigation. The topics include:


1. Legal and Regulatory Issues

2. Computer Abuse Methods and Detection

3. Federal and State Computer Crime Laws

4. Investigation

5. Computer Crime Investigation and Computer Forensics

6. Information Ethics



Back to Top


Computer Architecture & System Security | Hours: 10 | Sessions: 3

This course emphasizes the practical skills required to implement Computer Security. Exercises in this section include:


1. Computer Organization and Configuration

2. Secure Systems Architecture

3. Microcomputer and LAN Security

4. System Security

5. Systems Integrity Engineering



Back to Top


Application Security | Hours: 10 | Sessions: 3

The Topics include:


1. Application Security

2. Role-Based Access Control in Real Systems

3. Security Models for Object-Oriented Data Bases



Back to Top


Security Management Practices | Hours: 10 | Sessions: 3

The topics include:


1. Good practices in managing and preserving data

2. Develop contingency plans



Back to Top


Security Architecture & Models | Hours: 10 | Sessions: 3

The topics include:


1. Basic Security Requirement Model

2. Security Architecture Model Components

3. Developing the Security Architecture Model



Back to Top


Telecommunications & Network Security | Hours: 30 | Sessions: 3

This course emphasizes the practical skills required to implement TCP/IP network services on Unix platforms and maintain their integrity and availability. Exercises in this section include:


1. Telecommunications security objectives

2. Telecommunication security threats and counter measures

3. Network security

4. Internet security



Back to Top