BCS Practitioner Certificate in Information Assurance Architecture (CIAA) Training Course
Who is it for:
Security professionals looking to understand the technical and business aspects of the profession or anyone looking to work in the field of security architecture.
- System Administrators who wish to become security architects
- Technical architects looking to move into the field of security architecture
This certificate also offers a complimentary certification for those awarded or looking to achieve CCP status in IA.
What will I learn:
Candidates should be able to:
- Describe the business environment and the information risks that apply to the systems.
- Describe and apply security design principles.
- Identify information risks that arise from potential solution architectures.
- Design alternate architectures or countermeasures to mitigate identified information risks.
- Ensure that proposed architectures and countermeasures adequately mitigate identified information risks.
- Apply ‘standard’ security techniques and architectures to mitigate security risks.
- Develop new architectures that mitigate the risks posed by new technologies and business practices.
- Provide consultancy and advice to explain Information Assurance and architectural problems.
- Security configure ICT systems in compliance with their approved security architectures.
Course Outline
The syllabus includes training objectives and details of modules:
Summary outline:
1. Module 1 – The Basics of IA Architecture
- What is IA Architecture?
- The Role of an IA architect
- Security Design Principles
- Conceptual Architectures
2. Module 2 – Advanced Security Architecture Concepts
- Core Security Mechanisms
- Security Services
- Security Design
3. Module 3 – Information Assurance Methodologies
- Information Assurance Frameworks
- Cryptographic Assurance
- Product and Service Assurance
- Vulnerability and Penetration Testing
4. Module 4 – Innovation and Business Improvement
- Business Change, Security Metrics and ROI
- Risk, Security Postures and Security Culture
- Security as a Business Enabler
- IA Maturity Models
5. Module 5 – Security Across the Lifecycle
- Security Across the Lifecycle
6. Module 6 – Preparation for IA Architecture mock and live exam
- Format, structure and scoring of the examination
- Mock examination, using the BCS sample paper
Module Learning Outcomes
- Understand the format and scoring of the examination
- Be prepared to take the IA Architecture examination
NobleProg is a BCS Accredited Training Provider.
This course will be delivered by an expert NobleProg trainer approved by BCS.
The price includes delivery of the full course syllabus by an approved BCS trainer and the BCS CIAA exam (which can be taken remotely in your own time and is invigilated centrally by BCS). Subject to successfully passing the exam (multiple choice, requiring a score of at least 65% to pass) participants will hold the accredited BCS Practitioner Certificate in Information Assurance Architecture (CIAA)
Requirements
There are no formal entry requirements however, candidates will require an understanding of information assurance.
Need help picking the right course?
BCS Practitioner Certificate in Information Assurance Architecture (CIAA) Training Course - Booking
BCS Practitioner Certificate in Information Assurance Architecture (CIAA) Training Course - Enquiry
BCS Practitioner Certificate in Information Assurance Architecture (CIAA) - Consultancy Enquiry
Testimonials (1)
Questions, that helps me a lot to understand the characteristics of CRISC examination.
Masakazu Yoshijima - Bank of Yokohama, Ltd.
Course - CRISC - Certified in Risk and Information Systems Control
Related Courses
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
This class is intended as intense and hard core exam preparation for ISACA’s Certified Information Systems Auditor (CRISC) Examination. The latest four (4) domains of ISACA’s CRISC syllabus will be covered with a big focus on the Examination. The Official ISACA CRISC Review Manual and Question, Answer and Explanation, (Q,A&E), supplements will ALSO be provided when attending. The Q,A&E is exceptional in helping delegates understand the ISACA style of questions, the type of answers ISACA are looking for and it helps rapid memory assimilation of the material.
The technical skills and practices that ISACA promotes and evaluates within the CRISC certification are the building blocks of success in the field. Possessing the CRISC certification demonstrates your skill within the profession. With a growing demand for professionals holding risk and control expertise, ISACA’s CRISC has positioned itself to be the preferred certification program by individuals and enterprises around the world. The CRISC certification signifies commitment to serving an enterprise and the chosen profession with distinction.
Objectives:
- To help you pass the CRISC examination first time.
- Possessing this certification will signify your commitment to serving an enterprise with distinction.
- The growing demand for professionals with risk and control skills will allow holders of this certification to command better positions and salary.
You will learn:
- To help enterprises accomplish business objectives by designing, implementing, monitoring and maintaining risk-based, efficient and effective IS controls.
- The technical skills and practices that CRISC promotes, which are the building blocks of success in the field.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursThis instructor-led, live training in the UK (online or onsite) is aimed at intermediate-level IT professionals who wish to enhance their skills in identifying and managing IT risk and implementing information systems controls, and prepare for the CRISC certification exam.
By the end of this training, participants will be able to:
- Understand the governance and risk management aspects of IT.
- Conduct IT risk assessments and implement risk responses.
- Design and implement information systems controls.
- Prepare effectively for the CRISC certification exam.
IBM Qradar SIEM: Beginner to Advanced
14 HoursThis instructor-led, live training in the UK (online or onsite) is aimed at security engineers who wish to use IBM Qradar SIEM to address pressing security use cases.
By the end of this training, participants will be able to:
- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.
BCS Foundation Level Certificate in DevOps
14 HoursWho is it for:
People involved in or implementing the DevOps process, including roles such as DevOps evangelist; automation architect; cloud infrastructure engineer; software developer; software tester; security engineer; database administrator and product owners. Read the syllabus below for a more complete list of roles.
What will I learn:
By the end of this training, participants will be able to demonstrate knowledge, understanding and some basic application of the following aspects of DevOps:
- Origins
- Benefits
- Culture and teams
- Automation
- Lean
- Measurement
- Sharing
- Common roles
- Practices and techniques
- Methods and approaches for teams
Format of the Course:
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
BCS Foundation Certificate in Data Protection
21 HoursThis course is for anyone who needs to understand data protection and GDPR in particular.
At the end of the course candidates should be able to:
- Hold a recognised qualification in data protection.
- Gain an understanding of the key changes that the GDPR and the Data Protection Act (2018) bring to data protection.
- Gain an understanding of the new rights available to data subjects and the implications of those rights with the GDPR and Data Protection Act (2018).
- Gain an understanding of individual and organisational responsibilities under the GDPR and the Data Protection Act (2018), particularly the need for effectiveness record keeping.
- Gain an understanding of the increased obligations faced by data controllers and data processors as a result of the GDPR coming into force and the Data Protection Act (2018) being enacted.
- Be better placed to support their organisation in processing customer data in compliance with the GDPR and the Data Protection Act (2018).
BCS Practitioner Certificate in Data Protection
35 HoursWho is it for:
- Anyone who has some existing responsibility for data protection within their organisation.
- It’s also useful for those who want to broaden their basic understanding in this area and fully understand the practical applications of data protection laws.
- Whilst this certificate is written to the UK Data Protection Act, many other jurisdictions have enacted broadly similar data protection laws, so international candidates may also find this useful.
What will I learn:
Candidates will be able to:
- Gain an understanding of the key changes and the associated implications that the GDPR and the UK Data Protection Act 2018 introduce to data protection.
- Gain an understanding of individual and organisational responsibilities under the GDPR and the UK Data Protection Act, particularly the need for effective record keeping.
- Be able to apply the new rights available to data subjects and understand the implications of those rights.
- Be able to demonstrate an understanding of the designation, position and role / tasks of a data protection officer.
- Be able to prepare organisations to manage and handle personal data in compliance with the GDPR and the UK Data Protection Act.
BCS Foundation Certificate in Information Security Management Principles (CISMP) 4 day
28 HoursWho is it for:
Anyone with an interest in information security, whether as a career or for general business knowledge.
This certificate is relevant to anyone requiring an understanding of Information Security Management Principles as well as those with an interest in information security either as a potential career or as an additional part of their general business knowledge. It is very much a firm foundation on which other qualifications can be built or which provides a thorough general understanding to enable organisations to begin to ensure their information is protected appropriately.
What will I learn:
Candidates should be able to demonstrate:
- Knowledge of the concepts relating to information security management.
- Understanding of current national legislation and regulations which impact upon information security management.
- Awareness of current national and international standards, frameworks and organisations which facilitate the management of information security.
- Understanding of the current business and common technical environments in which information security management must operate.
- Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.
Note: This is the four day course which adds one additional day to the standard delivery to provide more time for exam preparation and practice exercises.
BCS Foundation Certificate in Information Security Management Principles (CISMP)
21 HoursWho is it for:
Anyone with an interest in information security, whether as a career or for general business knowledge.
This certificate is relevant to anyone requiring an understanding of Information Security Management Principles as well as those with an interest in information security either as a potential career or as an additional part of their general business knowledge. It is very much a firm foundation on which other qualifications can be built or which provides a thorough general understanding to enable organisations to begin to ensure their information is protected appropriately.
What will I learn:
Candidates should be able to demonstrate:
- Knowledge of the concepts relating to information security management.
- Understanding of current national legislation and regulations which impact upon information security management.
- Awareness of current national and international standards, frameworks and organisations which facilitate the management of information security.
- Understanding of the current business and common technical environments in which information security management must operate.
- Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.
BCS Practitioner Certificate in Business Continuity Management
21 HoursWho is it for:
Anyone who is involved in the areas of information security and information assurance.
The certificate is relevant to anyone requiring an understanding of Business Continuity Management as well as those who are involved in the areas of information security and information assurance.
What will I learn:
Candidates should be able to demonstrate:
- The function of and need for business continuity management within an organisation
- The business continuity management life cycle
- The main components of a business continuity management programme
- The need for risk assessment within business continuity management
- The options for development of a business continuity management strategy
- How to prepare and develop plans for business continuity management response
- The need for exercising, maintenance and review of plans
- The need for embedding business continuity management awareness within the organisation
BCS Practitioner Certificate in Information Risk Management (CIRM)
35 HoursWho is it for:
Anyone who is involved in the areas of information security and information assurance.
What will I learn:
Candidates should be able to demonstrate:
- How the management of information risk will bring about significant business benefits.
- How to explain and make full use of information risk management terminology.
- How to conduct threat and vulnerability assessments, business impact analyses and risk assessments.
- The principles of controls and risk treatment.
- How to present the results in a format which will form the basis of a risk treatment plan.
- The use of information classification schemes.
CISA - Certified Information Systems Auditor
28 HoursDescription:
CISA® is the world-renowned and most popular certification for professionals working in the field of IS audit and IT risk consulting.
Our CISA course is an intense, very competitive and exam focused training course. With experience of delivering more than 150+ CISA trainings in Europe and around the world and training more than 1200+ CISA delegates, the Net Security CISA training material has been developed in house with the top priority of ensuring CISA delegates pass the ISACA CISA® Exam. The training methodology focuses on understanding the CISA IS auditing concepts and practicing large number of ISACA released question banks from the last three years. Over a period, CISA holders have been in huge demand with renowned accountings firms, global banks, advisory, assurance, and internal audit departments.
Delegates may have years of experience in IT auditing but perspective towards solving CISA questionnaires will solely depend on their understanding to globally accepted IT assurance practices. CISA exam is very challenging because the chance of a very tight clash between two possible answers exists and that is where ISACA tests you on your understanding in global IT auditing practices. To address these exam challenges, we always provide the best trainers who have extensive experience in delivering CISA training around the world.
The Net Security CISA manual covers all exam-relevant concepts, case studies, Q&A's across CISA five domains. Further, the Trainer shares the key CISA supporting material like relevant CISA notes, question banks, CISA glossary, videos, revision documents, exam tips, and CISA mind maps during the course.
Goal:
The ultimate goal is to pass your CISA examination first time.
Objectives:
- Use the knowledge gained in a practical manner beneficial to your organisation
- Provide audit services in accordance with IT audit standards
- Provide assurance on leadership and organizational structure and processes
- Provide assurance on acquisition/ development, testing and implementation of IT assets
- Provide assurance on IT operations including service operations and third party
- Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets.
Target Audience:
Finance/CPA professionals, I.T. professionals, Internal & External auditors, Information security, and risk consulting professionals.
Business Continuity Management
35 HoursDescription:
This is a 'Practitioner' course and leans heavily on practical exercises designed to reinforce the concepts being taught and to build the delegates' confidence in implementing business continuity management. The course is also designed to encourage debate, and the sharing of knowledge and experience between students.
Delegates will benefit from the practical and extensive experiences of ours trainers who are practicing business continuity management and ISO 22301:2019 specialists.
Delegates will learn how to:
- Explain the need for business continuity management (BCM) in all organisations
- Define the business continuity lifecycle
- Conducting business continuity programme management
- Understand their organisation sufficiently to identify mission-critical impact areas
- Determine their organisation's business continuity strategy
- Establish a business continuity response
- Exercise, maintain and review plans
- Embed business continuity in an organisation
- Define terms and definitions appropriate to business continuity
By the end of the course, delegates will have a detailed understanding of all the key components of business continuity management and be able to return to their work, making a significant contribution to the business continuity management process.
Building up information security according to ISO 27005
21 HoursThis course will give you the skills to build up information security according to ISO 27005, which is dedicated to information security risk management based on ISO 27001.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in the UK (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.