Appendix A. Syllabus. NIST Cybersecurity Foundation. Syllabus. Status: First Draft

Size: px
Start display at page:

Download "Appendix A. Syllabus. NIST Cybersecurity Foundation. Syllabus. Status: First Draft"

Transcription

1 Appendix A Syllabus NIST Cybersecurity Foundation Syllabus Status: First Draft Version Status Sign off Date / Names V1.0.0 First Draft Content Group Lead Author: Mark E.S. Bernard Copyright 2018 Secure Knowledge Management Inc. All rights reserved. 71

2 NIST Cybersecurity Foundation CONTENTS Scope and Purpose of this Document 3 NIST CyberSecurity Foundation Qualification Scheme 3 Foundation Qualification 3 Level of Difficulty 3 Qualification Objectives 3 Format of the Examination 4 Syllabus Areas NIST CyberSecurity Foundation 4 1. Introduction 4 2. Preliminary Cybersecurity Framework Identify Business Environment (BE) Risk Management Strategy (RM) Governance (GV) Risk Assessment (RA) Asset Management (AM) 5 3. Preliminary CyberSecurity Framework Project Data Security (PR.DS) Protective Technology (PR.PT) Information Protection Processes and Procedures (PR.IP) Access Control (PR.AC) Awareness and Training (PR.AT) Maintenance (PR.MA) 6 4. Preliminary CyberSecurity Framework Detect Anomalies and Events (AE) Security Continuous Monitoring (CM) Detection Processes (DP) 7 5. Preliminary CyberSecurity Framework Respond Response Planning (RP) Communications (CO) Analysis (AN) Mitigation (MI) Improvements (IM) 7 6. Preliminary CyberSecurity Framework Recover Recovery Planning (RP) Improvements (IM) Communications (CO) 8 References 8 Criteria of Training Competence 9 72 Copyright 2018 Secure Knowledge Management Inc. All rights reserved..

3 Course Book Syllabus SCOPE AND PURPOSE OF THIS DOCUMENT Synopsis The purpose of this document is to inform all parties interested in the NIST CyberSecurity Foundation course, of the areas covered in the NIST CyberSecurity Foundation course. The target audience for this document is: (Potential) Examination candidates. (Aspiring) Instructors. Accredited Training Organizations. NIST CYBERSECURIITY FOUNDATION QUALIFICATION SCHEME FOUNDATION QUALIFICATION LEVEL OF DIFFICULTY Bloom Level 1 and 2: Knowledge and Comprehension Qualification objectives Define the business environment, strategize governance and risk management, identify assets and plan a risk assessment. Apply access control techniques. Apply data security techniques. Copyright 2018 Secure Knowledge Management Inc. All rights reserved. 73

4 NIST Cybersecurity Foundation Integrate information protection processes. Initiate sustainable maintenance practices. Tell about different protective technologies. Explain why we must actively monitor various types of CyberSecurity anomalies and events. Execute a response plan including analysis, mitigation, communications and continuous improvement. Design and execute a recovery plan. Explain how to develop communication plans. Explain the strategies of continuous improvement. Format of the examination Exam Format: Closed-book format. Paper based Questions: 40 multiple choice questions Passing Score: 65% Exam Duration: 60 minutes. An additional 15 minutes is available to non-native English speakers Proctoring: Live SYLLABUS AREAS NIST CYBERSECURIITY FOUNDATION 1. INTRODUCTION 1.1 Overview S Course Learning Objectives S Course Agenda S Case Study or Caselets S Module End Questions and Exam S Activities S Module End Questions and Exam S Course Book S Module Summary S Copyright 2018 Secure Knowledge Management Inc. All rights reserved..

5 Course Book Syllabus 2. PRELIMINARY CYBERSECURITY FRAMEWORK IDENTIFY 2.1 Business Environment (BE) Objectives of Business Environment (BE) S Risk Management Strategy (RM) Objectives of Risk Management Strategy (RM) S Governance (GV) Objectives of Governance (GV) S Risk Assessment (RA) Objectives of Risk Assessment (RA) S Asset Management (AM) Objectives of Asset Management (AM) S PRELIMINARY CYBERSECURITY FRAMEWORK PROTECT 3.1 Data Security (PR.DS) Objectives of Data Security (PR.DS) S 7 14 Copyright 2018 Secure Knowledge Management Inc. All rights reserved. 75

6 NIST Cybersecurity Foundation 3.2 Protective Technology (PR.PT) Objectives of Protective Technology (PR.PT) S Information Protection Processes and Procedures (PR.IP) Objectives of Information Protection Processes and Procedures (PR.IP) S ACCESS CONTROL (PR.AC) Objectives of Access Control (PR.AC) S AWARENESS AND TRAINING (PR.AT) Objectives of Awareness and Training (PR.AT) S MAINTENANCE (PR.MA) Objectives of Maintenance (PR.MA) S Copyright 2018 Secure Knowledge Management Inc. All rights reserved..

7 Course Book Syllabus 4. PRELIMINARY CYBERSECURITY FRAMEWORK DETECT 4.1 Anomalies and Events (AE) Objectives of Anomalies and Events (AE) S Security Continuous Monitoring (CM) Objectives of Security Continuous Monitoring (CM) S Detection Processes (DP) Objectives of Detection Processes (DP) S PRELIMINARY CYBERSECURITY FRAMEWORK RESPOND 5.1 Response Planning (RP) Objectives of Response Planning (RP) S Communications (Co) Objectives of Communications (CO) S Copyright 2018 Secure Knowledge Management Inc. All rights reserved. 77

8 NIST Cybersecurity Foundation 5.3 Analysis (An) Objectives of Analysis (AN) S Mitigation (MI) Objectives of Mitigation (MI) S Improvements (IM) Objectives of Improvements (IM) S PRELIMINARY CYBERSECURITY FRAMEWORK RECOVER 6.1 Recovery Planning (RP) Objectives of Recovery Planning (RP) S Improvements (IM) Objectives of Improvements (IM) S Communications (Co) Objectives of Communications (CO) S Copyright 2018 Secure Knowledge Management Inc. All rights reserved..

9 Course Book Syllabus REFERENCES NIST CyberSecurity Framework Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience ISO Information Security Management System ITIL Service Management ISO 9001 Quality Management Systems RCMP HTRA Harmonized Threat Risk Assessment COSO Enterprise Risk Management Integrated Framework Carnegie Mellon CSIRT (Computer Security Incident Response Team) COBIT5 Control Objectives for Information and Related Technology ISO Risk Management Principles and Guidelines ISO Information Technology Service Management Concepts and Terminology ISO Governance Corporate Governance of Information Technology ISO Environmental Management Systems ISO Occupational Health and Safety ISO Requirements for a Food Safety Management System ISO Asset Management and Supply Chain ISO Supply Chain Security Management Standard Carnegie Mellon Defense-in-Depth: Foundations for Secure and Resilient IT Enterprises Carnegie Mellon Software Development Life Cycle BS Business Continuity CRITERIA OF TRAINING COMPETENCE Any provider/instructor delivering the course based on this syllabus must hold the following qualifications to be eligible to provide the course: Minimum 2 years experience as an instructor. Minimum 3 years experience as practitioner or consultant in the field of the subject. He or she must have successfully delivered training programs in the past (minimum 2 years). Copyright 2018 Secure Knowledge Management Inc. All rights reserved. 79

10 NIST Cybersecurity Foundation APPROVED DELIVERY STRUCTURES The course can be delivered in any format, as long as it is covering minimum of 14 hours of learning. Recommended delivery structures are: Classroom Virtual Classroom elearning Blended 80 Copyright 2018 Secure Knowledge Management Inc. All rights reserved..

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS *** Introduction and Bio CyberSecurity Defined CyberSecurity Risks NIST CyberSecurity Framework References *** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS *** Chapter 3. Framework Implementation Relationship

More information

ITIL - Managing Across Lifecycle Course

ITIL - Managing Across Lifecycle Course ITIL - Managing Across the Lifecycle Course Code: ITSM013CL Certification Exam: ITIL MALC Exam Duration: 5 Days Certification Track: N/A Format: Classroom Course Credits: 5 Credits to ITIL expert PMI PDUs:

More information

ITIL 2011 Foundation Course

ITIL 2011 Foundation Course IT SERVICE MANAGEMENT ITIL 2011 Foundation Course CERTIFICATE: DURATION: COURSE DELIVERY: LANGUAGE: ITIL 2011 Foundation 2 or 3 Days Classroom, Live Virtual Classroom English Course Description: This course

More information

COBIT 5 Implementation

COBIT 5 Implementation COBIT 5 Implementation Fifalde Consulting Inc. +1-613-699-3005 2017 Fifalde Consulting Inc. COBIT is a registered Trade Mark of ISACA and the IT Governance Institute. 2 1. Course Description: Get a practical

More information

Securing an IT. Governance, Risk. Management, and Audit

Securing an IT. Governance, Risk. Management, and Audit Securing an IT Organization through Governance, Risk Management, and Audit Ken Sigler Dr. James L. Rainey, III CRC Press Taylor & Francis Group Boca Raton London New York CRC Press Is an imprint cf the

More information

Certificate Software Asset Management Essentials Syllabus. Version 2.0

Certificate Software Asset Management Essentials Syllabus. Version 2.0 Certificate Software Asset Management Essentials Syllabus Version 2.0 June 2010 Certificate in Software Asset Management Essentials Leaning Objectives Holders of the ISEB Certificate in SAM Essentials

More information

Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments

Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments 1 ID.AM-1: Physical devices and systems within the organization are inventoried Asset Management (ID.AM): The

More information

ITIL Service Operation Lifecycle Classroom

ITIL Service Operation Lifecycle Classroom ITIL Service Lifecycle Classroom Certificate: ITIL Service Lifecycle Duration: 3 days Course Delivery: (Virtual) Classroom, Exam, ebook Course ID: ITL9338 Language: English Credits: 3 Credits to ITIL Expert

More information

ITIL Operational Support and Analysis Capability

ITIL Operational Support and Analysis Capability ITIL Operational Support and Analysis Capability Certificate: ITIL OSA Capability Duration: 5 day Course Delivery: (Virtual) Classroom, Exam, ebook Course ID: ITL9333CL Language: English, Japanese, French

More information

SERVICE OPERATION ITIL INTERMEDIATE TRAINING & CERTIFICATION

SERVICE OPERATION ITIL INTERMEDIATE TRAINING & CERTIFICATION SERVICE OPERATION ITIL INTERMEDIATE TRAINING & CERTIFICATION WHAT IS ITIL SO? The intermediate level of ITIL offers a role based hands-on experience and in-depth coverage of the contents. Successful implementation

More information

ITIL Service Transition Lifecycle

ITIL Service Transition Lifecycle ITIL Service Transition Lifecycle Certificate: ITIL Service Transition Lifecycle Duration: 3 days Course Delivery: Classroom, Virtual Classroom, Exam, ebook Course ID: ITL9337 Language: English Credits:

More information

CYBERSECURITY MATURITY ASSESSMENT

CYBERSECURITY MATURITY ASSESSMENT CYBERSECURITY MATURITY ASSESSMENT ANTICIPATE. IMPROVE. PREPARE. The CrowdStrike Cybersecurity Maturity Assessment (CSMA) is unique in the security assessment arena. Rather than focusing solely on compliance

More information

ITIL Service Operation Lifecycle Classroom

ITIL Service Operation Lifecycle Classroom ITIL Service Operation Lifecycle Classroom Certificate: ITIL Service Operation Lifecycle Duration: 3 days Course Delivery: (Virtual) Classroom, Exam, ebook Course ID: ITL9338 Language: English Credits:

More information

COURSE BROCHURE. ITIL - Expert Managing Across Lifecycle Training & Certification

COURSE BROCHURE. ITIL - Expert Managing Across Lifecycle Training & Certification COURSE BROCHURE ITIL - Expert Managing Across Lifecycle Training & Certification What is ITIL MALC? This ITIL training course brings together the full essence of a Lifecycle approach to service management,

More information

COURSE BROCHURE. ITIL - Intermediate SERVICE STRATEGY Training & Certification

COURSE BROCHURE. ITIL - Intermediate SERVICE STRATEGY Training & Certification COURSE BROCHURE ITIL - Intermediate SERVICE STRATEGY Training & Certification What is ITIL SS? The Service Strategy (SS) qualification is one of five ITIL Service Lifecycle modules and provides you with

More information

Improving Critical Infrastructure Cybersecurity Executive Order Preliminary Cybersecurity Framework

Improving Critical Infrastructure Cybersecurity Executive Order Preliminary Cybersecurity Framework 1 Improving Critical Infrastructure Cybersecurity Executive Order 13636 Preliminary Cybersecurity Framework 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35

More information

How to Align with the NIST Cybersecurity Framework

How to Align with the NIST Cybersecurity Framework How to Align with the NIST Cybersecurity Framework 1 Title Table of Contents Identify (ID) 4 Protect (PR) 5 Detect (DE) 6 Respond (RS) 7 Recover (RC) 8 visibility detection control 2 SilentDefense Facilitates

More information

ITIL Managing Across the Lifecycle (MALC)

ITIL Managing Across the Lifecycle (MALC) ITIL Managing Across the Lifecycle (MALC) Course Syllabus (v1.2) Fifalde Consulting Inc. +1-613-699-3005 ITIL is a registered trade mark of AXELOS Limited. 2017 Fifalde Consulting Inc. ITIL MANAGING ACROSS

More information

COBIT 5 Assessor Certification Course

COBIT 5 Assessor Certification Course COBIT 5 Assessor Certification Course About COBIT 5.0 Information is created, used, retained, disclosed and destroyed. Technology plays a key role in these actions and technology is becoming pervasive

More information

PRINCE2 FOUNDATION AND PRACTITIONER CERTIFICATION TRAINING COURSE AGENDA

PRINCE2 FOUNDATION AND PRACTITIONER CERTIFICATION TRAINING COURSE AGENDA PRINCE2 FOUNDATION AND PRACTITIONER CERTIFICATION TRAINING COURSE AGENDA This publication has been prepared and written by icert Global and is protected by copyright. Other than for the purposes of and

More information

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY : THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY 18 2017: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) MAY 15 AND 16 o INFORMATION

More information

ITIL 2011 Overview - 1 Day (English and French)

ITIL 2011 Overview - 1 Day (English and French) ITIL 2011 Overview - 1 Day (English and French) Course Overview ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management (ITSM) by many Public &

More information

Effective COBIT Learning Solutions Information package Corporate customers

Effective COBIT Learning Solutions Information package Corporate customers Effective COBIT Learning Solutions Information package Corporate customers Thank you f o r y o u r interest Thank you for showing interest in COBIT learning solutions from ITpreneurs. This document provides

More information

SERVICE TRANSITION ITIL INTERMEDIATE TRAINING & CERTIFICATION

SERVICE TRANSITION ITIL INTERMEDIATE TRAINING & CERTIFICATION SERVICE TRANSITION ITIL INTERMEDIATE TRAINING & CERTIFICATION WHAT IS ITIL ST? The intermediate level of ITIL offers a role based hands-on experience and in-depth coverage of the contents. Successful implementation

More information

ITIL - Lifecycle Service Transition Course

ITIL - Lifecycle Service Transition Course ITIL - Lifecycle Service Transition Course Code: ITSM005CL Certification Exam: ITIL Service Transition Lifecycle Duration: 3 Days Certification Track: N/A Format: Classroom Course Credits: 3 Credits to

More information

"Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary

Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary Course Summary Description ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management by many Public & Private Organizations. Since early 1990, ITIL

More information

"Charting the Course... ITIL 2011 Operations Support Analysis (OSA) Certification Program. Course Summary

Charting the Course... ITIL 2011 Operations Support Analysis (OSA) Certification Program. Course Summary Description Course Summary ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management by many Public & Private Organizations. Since early 1990, ITIL

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

The Road Ahead for Healthcare Sector: What to Expect in Cybersecurity Session CS6, February 19, 2017 Donna F. Dodson, Chief Cybersecurity Advisor,

The Road Ahead for Healthcare Sector: What to Expect in Cybersecurity Session CS6, February 19, 2017 Donna F. Dodson, Chief Cybersecurity Advisor, The Road Ahead for Healthcare Sector: What to Expect in Cybersecurity Session CS6, February 19, 2017 Donna F. Dodson, Chief Cybersecurity Advisor, National Institute of Standards and Technology 1 Speaker

More information

ITIL Service Design Lifecycle

ITIL Service Design Lifecycle ITIL Service Design Lifecycle Certificate: ITIL Service Design Lifecycle Duration: 3 days Course Delivery: Classroom Course ID: ITL9336 Language: English Credits: 3 Credits to ITIL expert PMI PDUs: 24

More information

COURSE BROCHURE. COBIT5 FOUNDATION Training & Certification

COURSE BROCHURE. COBIT5 FOUNDATION Training & Certification COURSE BROCHURE COBIT5 FOUNDATION Training & Certification What is COBIT5? COBIT 5 (Control Objectives for Information and Related Technology) is an international open standard that defines requirements

More information

ITIL Foundation Program Certification Program. The Minimum number of students per session is 6 where the maximum is 25.

ITIL Foundation Program Certification Program. The Minimum number of students per session is 6 where the maximum is 25. 3 Days Course Overview ITIL is a set of best practices guidance that has become a worldwide-adopted framework for Information Technology Services Management (ITSM) by many Public & Private Organizations.

More information

ITIL Intermediate Workshop PLANNING, PROTECTION AND OPTIMIZATION (PPO) Course Outline

ITIL Intermediate Workshop PLANNING, PROTECTION AND OPTIMIZATION (PPO) Course Outline ITIL Intermediate Workshop PLANNING, PROTECTION AND OPTIMIZATION (PPO) Course Outline 1 Planning, Protection, and Optimization (PPO) Program Overview The ITIL Intermediate Qualification: Planning, Protection

More information

ITIL Planning Protection and Optimization Capability

ITIL Planning Protection and Optimization Capability ITIL Planning Protection and Optimization Capability Certificate: ITIL Planning Protection and Optimization Capability Duration: 5 days Course Delivery: (Virtual) Classroom, Exam, ebook Course ID: ITL9331

More information

Opportunities (a.k.a challenges) Interfaces Governance Security boundaries expanded Legacy systems New application Compliance

Opportunities (a.k.a challenges) Interfaces Governance Security boundaries expanded Legacy systems New application Compliance KY HEALTH & NIST CSF 1115 Waiver Involves legacy systems New development Interfaces between systems with and without sensitive information Changes the security boundaries Opportunities (a.k.a challenges)

More information

Document Control Information

Document Control Information Document Control Information Document Details Document Name ITIL v3 Managers Bridge Course Syllabus: ITIL Managers to ITIL v3 Expert_v3.3 Purpose of Document Detailed syllabus for the Bridge Qualification:

More information

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA The African Internet Governance Forum - AfIGF2017 5 Dec 2017, Egypt Agenda Why? Threats Traditional security? What to secure?

More information

NIST Cybersecurity Testbed for Transportation Systems. CheeYee Tang Electronics Engineer National Institute of Standards and Technology

NIST Cybersecurity Testbed for Transportation Systems. CheeYee Tang Electronics Engineer National Institute of Standards and Technology NIST Cybersecurity Testbed for Transportation Systems CheeYee Tang Electronics Engineer National Institute of Standards and Technology National Institute of Standards and Technology (NIST) About NIST NIST

More information

COURSE BROCHURE. ITIL - Intermediate Service Transition. Training & Certification

COURSE BROCHURE. ITIL - Intermediate Service Transition. Training & Certification COURSE BROCHURE ITIL - Intermediate Service Transition. Training & Certification What is ITIL ST? The intermediate level of ITIL offers a role based hands-on experience and in-depth coverage of the contents.

More information

ITIL Managing Across the Lifecycle Course

ITIL Managing Across the Lifecycle Course ITIL Managing Across the Lifecycle Course Duration: 5 Days Course Delivery: Classroom Language: English Course Overview ITIL 2011 edition is comprised of five core publications: Service Strategy, Service

More information

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide

More information

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT

More information

TOGAF 9 Level 1 and 2 Combined Classroom Course

TOGAF 9 Level 1 and 2 Combined Classroom Course TOGAF 9 Level 1 and 2 Combined Classroom Course Certificate: TOGAF 9 Certified Duration: 4 or 5 days Course Delivery: Classroom, Virtual Classroom (Group Live), ebook Course ID: INF1910CL Language: English,

More information

SERVICE DESIGN ITIL INTERMEDIATE TRAINING & CERTIFICATION

SERVICE DESIGN ITIL INTERMEDIATE TRAINING & CERTIFICATION SERVICE DESIGN ITIL INTERMEDIATE TRAINING & CERTIFICATION WHAT IS ITIL SD? This comprehensive official ITIL lifecycle certification course will provide you with critical knowledge and practical guidance

More information

BCS Foundation Certificate in Software Asset Management Essentials Syllabus

BCS Foundation Certificate in Software Asset Management Essentials Syllabus BCS Foundation Certificate in Software Asset Management Essentials Syllabus Version 4.6 March 2017 This qualification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification

More information

BCS Practitioner Certificate in Information Risk Management Syllabus

BCS Practitioner Certificate in Information Risk Management Syllabus BCS Practitioner Certificate in Information Risk Management Syllabus Version 6.5 April 2017 This qualification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification in Wales,

More information

ITIL Service Design Lifecycle

ITIL Service Design Lifecycle ITIL Service Design Lifecycle Certificate: ITIL Service Design Lifecycle Duration: 3 days Course Delivery: (Virtual) Classroom, Exam, ebook Course ID: ITL9336 Language: English Credits: 3 Credits to ITIL

More information

NCSF Foundation Certification

NCSF Foundation Certification NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity

More information

Bonnie A. Goins Adjunct Industry Professor Illinois Institute of Technology

Bonnie A. Goins Adjunct Industry Professor Illinois Institute of Technology Bonnie A. Goins Adjunct Industry Professor Illinois Institute of Technology It s a hot topic!! Executives are asking their CISOs a LOT of questions about it Issues are costly, from a financial and a reputational

More information

BCS EXIN ITAMOrg Software Asset Management Specialist Syllabus Version 1.1 December 2016

BCS EXIN ITAMOrg Software Asset Management Specialist Syllabus Version 1.1 December 2016 BCS EXIN ITAMOrg Software Asset Management Specialist Syllabus Version 1.1 December 2016 This professional certification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification

More information

Professional Qualifications for ITIL PRACTICES FOR SERVICE MANAGEMENT. The ITIL Foundation Certificate in IT Service Management SYLLABUS

Professional Qualifications for ITIL PRACTICES FOR SERVICE MANAGEMENT. The ITIL Foundation Certificate in IT Service Management SYLLABUS Professional Qualifications for ITIL PRACTICES FOR SERVICE MANAGEMENT The ITIL Foundation Certificate in IT Service Management SYLLABUS The Swirl logo is a trade mark of the Cabinet Office ITIL is a registered

More information

Document Control Information

Document Control Information Document Control Information Document Details Document Name Purpose of Document Document Version Number 3.1 Document Status Document Owner Prepared By The ITIL Intermediate Qualification: Service Operation

More information

ITIL Service Lifecycle Strategy

ITIL Service Lifecycle Strategy ITIL Service Lifecycle Strategy Course Details Course Code: Duration: Notes: ITILSL-Str 5 days This course syllabus should be used to determine whether the course is appropriate for the students, based

More information

ITSM Training Solution

ITSM Training Solution ITSM Training Solution Roadmap and Related Curriculum ITSM Certifications and Workshops Programs ITIL and PRINCE2 are registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All

More information

ITIL - Lifecycle Service Design Course

ITIL - Lifecycle Service Design Course ITIL - Lifecycle Service Design Course Code: ITSM008CL Certification Exam: ITIL Service Design Lifecycle Duration: 3 Days Certification Track: N/A Format: Classroom Course Credits: 3 Credits to ITIL expert

More information

TIPA Lead Assessor for ITIL

TIPA Lead Assessor for ITIL TIPA Lead Assessor for ITIL Course Syllabus Fifalde Consulting Inc. +1-613-699-3005 ITIL is a Registered Trade Mark of the Office of Government Commerce in the United Kingdom and other countries 2017 Fifalde

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity November 2017 cyberframework@nist.gov Supporting Risk Management with Framework 2 Core: A Common Language Foundational for Integrated Teams

More information

"Charting the Course... ITIL 2011 Service Offerings & Agreement (SOA) Certification Program. Course Summary

Charting the Course... ITIL 2011 Service Offerings & Agreement (SOA) Certification Program. Course Summary Course Summary Description ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management by many public and private organizations. Since early 1990, ITIL

More information

Exam Requirements v4.1

Exam Requirements v4.1 COBIT Foundation Exam Exam Requirements v4.1 The purpose of this document is to provide information to those interested in participating in the COBIT Foundation Exam. The document provides information

More information

PMP Exam Prep Classroom Course Fact Sheet

PMP Exam Prep Classroom Course Fact Sheet ITpreneurs Project and Program Management PMP Exam Prep Classroom Course Fact Sheet Certificate: PMP Duration: 4-Days, 35 hours Course Delivery: Classroom, Virtual Classroom, Blended (combined with Classroom)

More information

BCS Specialist Certificate in Change Management Syllabus

BCS Specialist Certificate in Change Management Syllabus BCS Specialist Certificate in Change Management Syllabus Version 2.0 April 2017 This qualification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification in Wales, CCEA or

More information

ITIL v3. Qualification & Certification scheme. itsmf International The IT Service Management Forum 1

ITIL v3. Qualification & Certification scheme. itsmf International The IT Service Management Forum 1 ITIL v3 Qualification & Certification scheme 1 ITIL v3 Certification scheme The ITIL v3 scheme Scope Approach Features of each new certification level Transition scheme Certification scheme structure 2

More information

Foundation. Become a ITIL Foundation Certified Professional from our exclusive 2 full day. conducted by authorized faculties from APMG.

Foundation. Become a ITIL Foundation Certified Professional from our exclusive 2 full day. conducted by authorized faculties from APMG. Certified ITIL Foundation Become a ITIL Foundation Certified Professional from our exclusive 2 full day training Certified program conducted by authorized faculties from APMG. Exclusive Classroom Training

More information

Designing and Building a Cybersecurity Program

Designing and Building a Cybersecurity Program Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity May 2017 cyberframework@nist.gov Why Cybersecurity Framework? Cybersecurity Framework Uses Identify mission or business cybersecurity dependencies

More information

CompTIA Cybersecurity Analyst+

CompTIA Cybersecurity Analyst+ CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity

More information

Course # 55011A. The ITIL Foundation Certificate in IT Service Management

Course # 55011A. The ITIL Foundation Certificate in IT Service Management Course # 55011A The ITIL Foundation Certificate in IT Service Management Duration: 24 Hrs Overview About this Course This 3-day (19 contact hour) instructor-led course provides students with the knowledge

More information

BCS Specialist Certificate in Service Desk and Incident Management Syllabus

BCS Specialist Certificate in Service Desk and Incident Management Syllabus BCS Specialist Certificate in Service Desk and Incident Management Syllabus Version 1.9 April 2017 This qualification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification

More information

Assurance over Cybersecurity using COBIT 5

Assurance over Cybersecurity using COBIT 5 Assurance over Cybersecurity using COBIT 5 Special thanks to ISACA for supplying material for this presentation. Anthony Noble, VP IT Audit, Viacom Inc. Anthony.noble@viacom.com Disclamer The opinions

More information

Document Control Information

Document Control Information Document Control Information Document Details Document Name Purpose of Document Document Version Number 4.2 Document Status Document Owner Prepared By To outline the syllabus for the ITIL v3 Foundation

More information

CBCI Certification Course (GPG)

CBCI Certification Course (GPG) CBCI Certification Course (GPG) 5 Days with Examination Course Description This course offers a solid description of the methods, techniques and approaches used by business continuity (BC) professionals

More information

INTERMEDIATE QUALIFICATION

INTERMEDIATE QUALIFICATION PROFESSIONAL QUALIFICATION SCHEME INTERMEDIATE QUALIFICATION SERVICE LIFECYCLE SERVICE STRATEGY CERTIFICATE SYLLABUS The Swirl logo is a Trade Mark of the Office of Government Commerce ITIL is a Registered

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

THE ITIL MANAGERS BRIDGE CERTIFICATION IN IT SERVICE MANAGEMENT

THE ITIL MANAGERS BRIDGE CERTIFICATION IN IT SERVICE MANAGEMENT THE ITIL MANAGERS BRIDGE CERTIFICATION IN IT SERVICE MANAGEMENT ITIL Service Manager to ITIL V3 Expert The ITIL Expert Certification is the highest certification level available in ITIL V3 today. However,

More information

Project Management Fundamentals

Project Management Fundamentals Project Management Fundamentals Course Brochure and Competency Matrix INDEX: 1. Company Introduction 2. Training Program Description 3. Training Delivery Options 4. Course Syllabus 5. Program Format 6.

More information

FDA & Medical Device Cybersecurity

FDA & Medical Device Cybersecurity FDA & Medical Device Cybersecurity Closing Keynote, February 19, 2017 Suzanne B. Schwartz, M.D., MBA Associate Director for Science & Strategic Partnerships Center for Devices and Radiological Health US

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce

More information

Sample Exam Privacy & Data Protection Foundation

Sample Exam Privacy & Data Protection Foundation Sample Exam Sample Exam Privacy & Data Protection Foundation SECO-Institute issues the official Business Continuity courseware to accredited training centres where students are trained by accredited instructors.

More information

ITIL Managing Across the Lifecycle (MALC) Certification Training - Brochure

ITIL Managing Across the Lifecycle (MALC) Certification Training - Brochure ITIL Managing Across the Lifecycle (MALC) Certification Training - Brochure Integrate ITIL Content and Application Knowledge with an ITIL MALC Certification Course Name : ITIL MALC Version : INVL_ITILMALC_BR_02_018_1.2

More information

NCSF Foundation Certification

NCSF Foundation Certification NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

Acalvio Deception and the NIST Cybersecurity Framework 1.1

Acalvio Deception and the NIST Cybersecurity Framework 1.1 Acalvio Deception and the NIST Cybersecurity Framework 1.1 June 2018 The Framework enables organizations regardless of size, degree of cybersecurity risk, or cybersecurity sophistication to apply the principles

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity Version 1.0 National Institute of Standards and Technology February 12, 2014 Table of Contents Executive Summary...1 1.0 Framework Introduction...3

More information

BCS Level 3 Award in Business Processes Syllabus QAN 603/0297/5

BCS Level 3 Award in Business Processes Syllabus QAN 603/0297/5 Making IT good for society BCS Level 3 Award in Business Processes Syllabus QAN 603/0297/5 Version 2.0 August 2017 This is a United Kingdom government regulated qualification which is administered and

More information

MODERN MALWARE, MODERN DEFENSES AND PROTECTION

MODERN MALWARE, MODERN DEFENSES AND PROTECTION MODERN MALWARE, MODERN DEFENSES AND PROTECTION Mario Chiock, CISSP, CISM, CISA chiock@slb.com TAKEAWAYS Current Cybersecurity Landscape Recent data breaches / incidents Executive Order 13636 / Cybersecurity

More information

Cybersecurity Framework Manufacturing Profile

Cybersecurity Framework Manufacturing Profile Cybersecurity Framework Manufacturing Profile Keith Stouffer Project Leader, Cybersecurity for Smart Manufacturing Systems Engineering Lab, NIST National Institute of Standards and Technology (NIST) NIST

More information

Position Description IT Auditor

Position Description IT Auditor Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership

More information

Practitioner Certificate in Business Continuity Management (PCBCM) Course Description. 10 th December, 2015 Version 2.0

Practitioner Certificate in Business Continuity Management (PCBCM) Course Description. 10 th December, 2015 Version 2.0 Practitioner Certificate in Business Continuity Management (PCBCM) Course Description 10 th December, 2015 Version 2.0 Course The Practitioner Certificate in Business Continuity Management (PCBCM) course

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

PECB Certified ISO Lead Implementer

PECB Certified ISO Lead Implementer PECB Certified ISO 22301 Lead Implementer PECB Certified ISO 22301 Lead Implementer 5 Days with Examination Course Description This five day intensive course enables the participants to develop the necessary

More information

PRINCE UPDATE FOUNDATION & PRACTITIONER CERTIFICATION (5 DAYS) PRINCE2 FOUNDATION (3 DAYS) Workshop Description.

PRINCE UPDATE FOUNDATION & PRACTITIONER CERTIFICATION (5 DAYS) PRINCE2 FOUNDATION (3 DAYS) Workshop Description. PRINCE2 2017 UPDATE FOUNDATION & PRACTITIONER CERTIFICATION (5 DAYS) PRojects IN Controlled Environments is the world s most established method for project management and is globally recognized for delivering

More information

WHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework.

WHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework. Learning Objectives and Course Descriptions: FOUNDATION IN IT SERVICE MANAGEMENT This official ITIL Foundation certification course provides you with a general overview of the IT Service Management Lifecycle

More information

Updates to the NIST Cybersecurity Framework

Updates to the NIST Cybersecurity Framework Updates to the NIST Cybersecurity Framework NIST Cybersecurity Framework Overview and Other Documentation October 2016 Agenda: Overview of NIST Cybersecurity Framework Updates to the NIST Cybersecurity

More information

Cyber Security For Utilities Risks, Trends & Standards. IEEE Toronto March 22, Doug Westlund Senior VP, AESI Inc.

Cyber Security For Utilities Risks, Trends & Standards. IEEE Toronto March 22, Doug Westlund Senior VP, AESI Inc. Cyber Security For Utilities Risks, Trends & Standards IEEE Toronto March 22, 2017 Doug Westlund Senior VP, AESI Inc. Agenda Cyber Security Risks for Utilities Trends & Recent Incidents in the Utility

More information

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive

More information

ITIL 4. Public Frequently Asked Questions (FAQs) AXELOS.com. October 2018 COMMERCIAL IN CONFIDENCE

ITIL 4. Public Frequently Asked Questions (FAQs) AXELOS.com. October 2018 COMMERCIAL IN CONFIDENCE ITIL 4 Public Frequently Asked Questions (FAQs) AXELOS.com October 2018 2 ITIL 4 Table of Contents SECTION 1 ITIL 4 PUBLIC FAQS 3 1.1 What will the new ITIL be called? 3 1.2 What is the ITIL 4 certification

More information

NCSF Practitioner Certification

NCSF Practitioner Certification NCSF Practitioner Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity

More information

Cesium Co. Ltd., Company Profile. Certification. Laboratory. Metrology Standards. When Performance Matters. Testing Quality

Cesium Co. Ltd., Company Profile. Certification. Laboratory. Metrology Standards. When Performance Matters. Testing Quality Cesium Co. Ltd., Quality, Reliability & Excellence Company Profile Certification When Performance Matters Pleasanton, CA USA London UK Al Khobar - KSA Laboratory Metrology Standards Accreditation Process

More information

IT infrastructure Library

IT infrastructure Library IT infrastructure Library Related Certificate Course ID Related Exams Audience Duration ITIL Foundation ITIL v3 ITIL v3 IT management, IT network & System administrators, IT team leaders, IT consultants,

More information

Acknowledgements 5 About this guide 6 1 Introduction to service management 9

Acknowledgements 5 About this guide 6 1 Introduction to service management 9 Contents Acknowledgements 5 About this guide 6 1 Introduction to service 9 1.1 Good practice 9 1.2 The ITIL framework 9 1.3 What is service? ( 2.1 2.2, 2.1 2.2) 11 1.4 Service value creation 13 1.5 The

More information