Начало
Обучение
Методология
Литература
Аналитика
Контакты




Подборка материалов предварительной подготовки и детализация программы курса

Содержание:





Рекомендуемая подборка бесплатных материалов для предварительной подготовки


Нижеперечисленные материалы специально подобраны для желающих начать подготовку, чтобы более плавно распределить усилия и оптимизировать время на подготовку. Материалы дают хорошее введение в специфику дисциплины, терминологию и используемый лексикон. Тексты нужно читать и понимать, желательно без словаря. Материалы для продвинутых.

  1. Information Security Governance: Guidance for Boards of Directors and Executive Management.
  2. Information Security Governance: Guidance for Information Security Managers.
  3. An Introduction to the Business Model for Information Security.
  4. Enterprise Risk: Identify, Govern and Manage Risk The Risk IT Framework (Exposure Draft).
  5. Convergent Security Risks in Physical Security Systems and IT Infrastructures.
  6. Aligning COBIT® 4.1, ITIL® V3 and ISO/IEC 27002 for Business Benefit.
  7. Critical Elements of Information Security Program Success.
  8. Defining Information Security Management Position Requirements.
  9. Следующие извлечения из стандартов аудита ISACA также могут быть полезны:
  10. Материалы журнала ISACA, избранные и архивные.
  11. Model Curriculum for Information Security Management (для преподавателей и студентов).



Детализация учебной программы


CHAPTER 1: INFORMATION SECURITY GOVERNANCE

1.1 Definition

1.2 Objectives

1.3 Tasks

1.3.1 Knowledge Statements

1.3.2 Relationship of Task to Knowledge Statements

1.4 Information Security Governance Overview

1.4.1 Importance of Information Security Governance

1.4.2 Outcomes of Information Security Governance

1.5 Effective Information Security Governance

1.5.1 Business Goals and Objectives

1.5.2 Roles and Responsibilities of Senior Management

Boards of Directors/Senior Management

Executive Management

Steering Committee

CISO

1.5.3 Matrix of Outcomes and Responsibilities

1.6 Information Security Concepts

1.6.1 Technologies

1.7 Information Security Manager

1.7.1 Responsibilities

1.7.2 Senior Management Commitment

Obtaining Senior Management Commitment

1.8 Scope and Charter of Information Security Governance

1.8.1 Assurance Process Integration--Convergence

Convergence

1.9 Information Security Governance Metrics

1.9.1 Effective Security Metrics

1.9.2 Governance Implementation Metrics

1.9.3 Strategic Alignment

1.9.4 Risk Management

1.9.5 Value Delivery

1.9.6 Resource Management

1.9.7 Performance Measurement

1.9.8 Assurance Process Integration (Convergence)

1.10 Information Security Strategy

1.10.1 An Alternate View of Strategy

1.11 Developing an Information Security Strategy

1.11.1 Common Pitfalls

1.12 Information Security Strategy Objectives

1.12.1 The Goal

1.12.2 Defining Objectives

Business Linkages

1.12.3 The Desired State

COBIT

Capability Maturity Model

Balanced Scorecard

SABSA

ISO/IEC 17799/ISO 27001

Other Approaches

GASSP/GAISP

1.12.4 Risk Objectives

1.13 Determining Current State of Security

1.13.1 Current Risk

Business Impact Analysis/Assessment

1.14 Information Security Strategy

1.14.1 Elements of a Strategy

Road Map

1.14.2 Strategy Resources and Constraints--Overview

Resources

Constraints

1.15 Strategy Resources

1.15.1 Policies and Standards

Policies

Standards

Procedures

Guidelines

1.15.2 Architecture(s)

1.15.3 Controls

IT Controls

Non-IT Controls

Layered Defenses

1.15.4 Countermeasures

1.15.5 Technologies

1.15.6 Personnel

1.15.7 Organizational Structure

Centralized and Decentralized Approaches to Coordinating Information Security

1.15.8 Roles and Responsibilities

1.15.9 Skills

1.15.10 Awareness and Education

1.15.11 Audits

1.15.12 Compliance Enforcement

1.15.13 Threat Analysis

1.15.14 Vulnerability Analysis

1.15.15 Risk Assessment

1.15.16 Business Impact Assessment

1.15.17 Resource Dependency Analysis

1.15.18 Outsourced Security Providers

1.15.19 Other Organizational Support and Assurance Providers

1.16 Strategy Constraints

1.16.1 Legal and Regulatory Requirements

Requirements for Content and Retention of Business Records

1.16.2 Physical

1.16.3 Ethics

1.16.4 Culture

1.16.5 Organizational Structure

1.16.6 Costs

1.16.7 Personnel

1.16.8 Resources

1.16.9 Capabilities

1.16.10 Time

1.16.11 Risk Tolerance

1.17 Action Plan for Strategy

1.17.1 Gap Analysis--Basis for an Action Plan

1.17.2 Policy Development

1.17.3 Standards Development

1.17.4 Training and Awareness

1.17.5 Action Plan Metrics

Example

General Metrics Considerations

1.18 Implementing Security Governance-Example

1.18.1 Additional Policy Samples

1.19 Action Plan Intermediate Goals

1.20 Information Security Program Objectives

1.21 Chapter 1 Practice Questions

1.22 Chapter 1 Answers to Practice Questions

1.23 Chapter 1 Suggested Resources for Further Study

 

CHAPTER 2: INFORMATION RISK MANAGEMENT

2.1 Definition

2.2 Objective

2.3 Tasks

2.3.1 Knowledge Statements

2.3.2 Relationship of Task to Knowledge Statements

2.4 Risk Management Overview

2.4.1 The Importance of Risk Management

2.4.2 Outcomes of Risk Management

2.5 Risk Management Strategy

2.5.1 Risk Communication, Risk Awareness and Consulting

2.6 Effective Information Security Risk Management

2.6.1 Steps in Developing a Risk Management Program

2.6.2 Roles and Responsibilities

2.7 Information Security Risk Management Concepts

2.7.1 Concepts

2.7.2 Technologies

2.8 Implementing Risk Management

2.8.1 Risk Management Process

Defining a Risk Management Framework

2.8.2 Defining the External Environment

2.8.3 Defining the Internal Environment

2.8.4 Generating the Risk Management Context

2.9 Risk Assessment

2.9.1 Identification of Risks

2.9.2 Threats

2.9.3 Vulnerabilities

2.9.4 Risks

2.9.5 Analysis of Relevant Risks

Qualitative Analysis

Semi-quantitative Analysis

Quantitative Analysis

2.9.6 Evaluation of Risks

2.9.7 Risk Management Options

Terminate the Activity

Transfer the Risk

Treat the Risk

Tolerate/Accept the Risk

2.9.8 Impact

2.10 Controls and Countermeasures

2.10.1 Control Methods

2.10.2 Control Categories

2.10.3 Control Recommendations

2.10.4 Residual Risk

2.10.5 Cost and Benefits

2.11 Information Resource Valuation

2.11.1 Information Resource Valuation Methodologies

2.11.2 Information Asset Classification

2.11.3 Methods to Determine Criticality of Resources and Impact of Adverse Events.

2.11.3 Impact Assessment and Analysis

Quantitative versus Qualitative Assessment

2.12 Recovery Time Objectives

2.12.1 RTO and its Relation to BCP and Contingency Planning Objectives and Processes.

2.12.2 Third-party Service Providers

2.13 Integration With Life Cycle Processes

2.13.1 Life Cycle-based Risk Management Principles and Practices

2.14 IT Control Baselines

2.15 Risk Monitor and Communication

2.15.1 Reporting Significant Changes in Risk

2.16 Training and Awareness

2.17 Documentation

2.18 Chapter 2 Practice Questions

2.19 Chapter 2 Answers to Practice Questions

2.20 Chapter 2 Suggested Resources for Further Study

 

CHAPTER 3: INFORMATION SECURITY PROGRAM DEVELOPMENT.

3.1 Definition

3.2 Objectives

3.3 Tasks

3.3.1 Knowledge Statements

3.3.2 Relationship of Tasks to Knowledge Statements

3.4 1 information Security Program Development Overview

3.4.1 Importance of Information Security Program Development

3.4.2 Outcomes of Information Security Program Development

Strategic Alignment

Risk Management

Value Delivery

Resource Management

Assurance Process Integration

Performance Measurement

3.5 Effective Information Security Program Development

3.5.1 Roles and Responsibilities of Executive Management

3.5.2 Matrix of Outcomes and Responsibilities

3.5.3 Cross-organizational Responsibilities

3.6 Information Security Program Development Concepts

3.6.1 Concepts

3.6.2 Technologies

3.7 Information Security Manager

3.7.1 Responsibilities

3.7.2 Senior Management Commitment

3.8 Scope and Charter of Information Security Program Development

3.8.1 Assurance Function Integration

3.8.2 Challenges in Developing an Information Security Program

3.8.3 Unanticipated Challenges (Pitfalls)

3.9 Information Security Program Development Objectives

3.9.1 The Goal/Desired Outcomes

3.9.2 Defining Objectives

3.9.3 Residual Risks

3.9.4 The Desired State

3.10 Defining an Information Security Program Development Road Map

3.10.1 Developing an Information Security Program Road Map

3.10.2 Elements of a Road Map

3.10.3 Gap Analysis--Basis for an Action Plan

3.11 Information Security Program Resources

3.11.1 Documentation

3.11.2 Architecture

3.11.3 Controls

3.11.4 Countermeasures

3.11.5 Technologies

3.11.6 Personnel, Roles and Responsibilities, and Skills

3.11.7 Training, Awareness and Education

3.11.8 Audits

3.11.9 Compliance Enforcement

3.11.10 Threat Analysis

3.11.11 Vulnerability Analysis

3.11.12 Risk and Business Impact Assessment

3.11.13 Resource Dependency Analysis

3.11.14 External Security Service Providers

3.11.15 Other Organizational Support

3.12 Implementing an Information Security Program

3.12.1 Policy Compliance

3.12.2 Standards Compliance

3.12.3 Training and Awareness

3.12.4 Controls

3.12.5 Countermeasures

3.12.6 Third-party Service Providers

3.12.7 Integration into Life Cycle Processes

3.12.8 Monitoring and Communication

3.12.9 Documentation

3.12.10 Detailed Plan of Action for Information Security Program Development.

3.13 Information Infrastructure and Architecture

3.13.1 Managing Complexity

Providing a Framework and Road Map

Simplicity and Clarity Through Layering and Modularization

Business Focus Beyond the Technical Domain

3.13.2 Objectives of Information Security Architectures

SABSA Framework for Security Service Management

SABSA Development Process

SABSA Lifecycle

SABSA Attributes

3.13.3 Information Security Technologies and Architecture

3.14 Physical and Environmental Controls

3.15 Information Security Program Integration

3.16 Information Security Program Development Metrics

3.16.1 Strategic Alignment

3.16.2 Risk Management

3.16.3 Value Delivery

3.16.4 Resource Management

3.16.5 Assurance Process Integration

3.16.6 Performance Measurement

3.16.7 Security Baselines

3.17 Chapter 3 Practice Questions

3.18 Chapter 3 Answers the Practice Questions

3.19 Chapter 3 Resources for Further Study

 

CHAPTER 4: INFORMATION SECURITY PROGRAM MANAGEMENT

4.1 Definition

4.2 Objective

4.3 Tasks

4.3.1 Knowledge Statements

4.3.2 Relationship of Tasks to Knowledge Statements

4.4 Information Security Management Overview

4.4.1 Importance of Security Management

4.4.2 Outcomes of Effective Security Management

Strategic Alignment

Risk Management

Value Delivery

Resource Management

Performance Measurement

Business Process Assurance

4.5 Organizational Roles and Responsibilities

4.5.1 Information Security Manager Responsibilities

Utilizing International Security Standards

Risk Management Skills

Technology Skills

Management and Administration Skills

4.5.2 Board of Directors

4.5.3 Executive Management

4.5.4 Information Security Steering Committee

4.5.5 Information Technology Unit

4.5.6 Business Unit Managers

4.5.7 Human Resources

4.5.8 Legal Department

4.6 The Information Security Management Framework

4.6.1 Technical Components and Architecture

Native Control Technologies

Supplemental Control Technologies

Management Support Technologies

Analysis of Technical Components and Architecture

4.6.2 Operational Components

4.6.3 Management Components

4.6.4 Administrative Components

4.6.5 Educational and Informational Components

4.6.6 Assurance Function Integration

4.7 Measuring Information Security Management Performance

4.7.1 Measuring Information Security Risk and Loss

4.7.2 Measuring Support of Organizational Objectives

4.7.3 Measuring Compliance

4.7.4 Measuring Operational Productivity

4.7.5 Measuring Security Cost-effectiveness

4.7.6 Measuring Organizational Awareness

4.7.7 Measuring Effectiveness of Technical Security Architecture

4.7.8 Measuring Effectiveness of Management Framework and Resources

4.7.9 Measuring Operational Performance

4.8 Common Information Security Management Challenges

4.8.1 Inadequate Management Support

4.8.2 Inadequate Funding

4.8.3 Inadequate Staffing

4.9 Determining the State of Information Security Management

4.9.1 Evaluating Program Objectives

4.9.2 Evaluating Compliance Requirements

4.9.3 Evaluating Program Management

4.9.4 Evaluating Security Operations Management

4.9.5 Evaluating Technical Security Management

4.9.6 Evaluating Resource Levels

4.10 Information Security Management Resources

4.10.1 Policies, Standards and Procedures

4.10.2 Information Security Management Framework

4.10.3 Controls

4.10.4 Countermeasures

4.10.5 Supporting Technologies

4.10.6 Personnel

4.10.7 Skills

4.10.8 Awareness and Education

4.10.9 Audits

4.10.10 Compliance Enforcement

4.10.11 Periodic Threat Analysis

4.10.12 Ongoing Technical Vulnerability Analysis

4.10.13 Periodic/Incremental Risk Assessment

4.10.14 Periodic Business Impact Analysis

4.10.15 Periodic Resource Dependency Analysis

4.10.16 Outsourced Security Providers

4.10.17 Other Organizational Support and Assurance Providers

4.11 Other Information Security Management Considerations

4.11.1 Legal and Regulatory Requirements

4.11.2 Physical and Environmental Factors

4.11.3 Ethics

4.11.4 Culture/Regional Variances

4.11.5 Logistics

4.12 Implementing Information Security Management

4.12.1 Review and Modification of Policies and Standards

Policies

Standards

4.12.2 Security Management Metrics and Monitoring

Monitoring Approaches

Monitoring Security Activities in Infrastructure and Business Applications.

Determining Success of Information Security Investments

4.12.3 Control Testing and Modification

4.12.4 Third-party Service Providers

4.12.5 Integration Into Life Cycle Processes

4.12.6 Monitoring and Communication

4.12.7 Documentation

4.12.8 Integrating Assurance Activities

4.12.9 General Rules of Use/Acceptable Use Policy

4.12.10 Assignment of Roles and Responsibilities

4.12.11 Third-party Security Providers

Implementing Information Security Programs Through Third Parties

4.12.12 The Change Management Process

4.12.13 Vulnerability Assessments

 

CHAPTER 5: INCIDENT MANAGEMENT AND RESPONSE

5.1 Definition

5.2 Objective

5.3 Tasks

5.3.1 Knowledge Statements

5.3.2 Relationship of Tasks and Knowledge Statements

5.4 Incident Management and Response Overview

5.4.1 Incident Management and Response

5.4.2 Importance of Incident Management and Response

5.4.3 Outcomes of Incident Management and Response

5.5 Incident Management Concepts

5.5.1 Concepts

5.5.2 Technologies

5.6 Scope and Charter of Incident Management

5.7 Information Security Manager

5.7.1 Responsibilities

5.7.2 Senior Management Commitment

5.8 Incident Management Objectives

5.8.1 Defining Objectives

5.8.2 The Desired State

5.9 Incident Management Metrics and Indicators

5.9.1 Strategic Alignment

5.9.2 Risk Management

5.9.3 Assurance Process Integration

5.9.4 Value Delivery

5.9.5 Resource Management

5.9.6 Performance Measurement

5.10 Defining Incident Management Procedures

5.10.1 Detailed Plan of Action for Incident Management

5.10.2 Challenges in Developing an Incident Management Plan

5.11 Incident Management Resources

5.11.1 Policies and Standards

5.11.2 Technologies

5.11.3 Personnel

5.11.4 Roles and Responsibilities

5.11.5 Skills

5.11.6 Awareness and Education

5.11.7 Audits

5.11.8 Business Impact Analysis/Assessment

Elements of BIAs

Benefits of Conducting BIAs

5.11.9 Outsourced Security Providers

5.12 Current State of Incident Response Capability

5.12.1 History of Incidents

5.12.2 Threats

5.12.3 Vulnerabilities

5.12.4 Risks

5.12.5 Risk Tolerance

5.12.6 Integrating a BIA Into Incident Response

5.12.7 Integrating RTO Into Incident Response

5.12.8 Integrating RPO Into Incident Response

5.13 Developing an Incident Response Plan

5.13.1 Elements of an Incident Response Plan

5.13.2 Gap Analysis-Basis for an Incident Response Plan

5.14 Developing Response and Recovery Plans

5.14.1 Organizing, Training and Equipping the Response Staff

5.14.2 Recovery Planning and Business Recovery Processes

5.14.3 Understand Response and Recovery Practices

5.15 Testing Response and Recovery Plans

5.15.1 Periodic Testing of the Response and Recovery Plans

5.15.2 Testing for Infrastructure and Critical Business Applications

5.16 Executing Response and Recovery Plans

5.16.1 Ensuring Execution as Required

5.16.2 Escalation Process for Effective Incident Management

5.16.3 Intrusion Detection Policies and Processes

5.16.4 Help Desk Processes for Identifying Security Incidents

5.16.5 The Notification Process

5.17 Documenting Events

5.17.1 Establishing Procedures

5.17.2 Requirements for Evidence

5.18 Post-event Reviews

5.18.1 Identifying Causes and Corrective Actions

5.18.2 Post-incident Reviews and Follow-up Procedures

5.19 Chapter 5 Practice Questions

5.20 Chapter 5 Answers to Practice Questions

5.21 Chapter 5 Suggested Resources for Further Study


Начало · Обучение · Методология · Литература · Аналитика · Контакты
PageRank v