Information Security Management
Famsoft's Information Security Management course focuses on the common body of knowledge (CBK) as defined by the International Information Systems Security Certification Consortium (ISC)2. The following modules make up the Famsoft's Information Security Management career track:
1. Access Control Systems & Methodology
2. Risk Mgmt & Business Continuity Planning
4. Policy, Standards & Organization
5. Law, Investigation & Ethics
6. Computer Architecture & Systems Security
8. Security Management Practices
9. Security Architecture & Models
10. Telecommunications & Network Security
Access Control Systems & Methodology | Hours: 10 | Sessions: 3
Designed for students with no prior networking knowledge, this course provides students with a introduction to the full range of Access control systems and methodologies. Topics include:
1. Physical mechanisms
2. Logical mechanisms
3. Administrative mechanisms
4. Access control principles and objectives
5. Access control issues
6. Access control administration
Back to Top
Risk Mgmt & Business Continuity Planning | Hours: 10 | Sessions: 3
Topics include:
1. Risk Analysis and Assessment
2. Business Continuity in Distributed Environment
3. The Business Impact assessment process
Back to Top
Cryptography | Hours: 10 | Sessions: 3
This course emphasizes the practical skills required to implement security using Cryptography. Exercises in this section include:
1. Cryptography Applications and Uses
2. Cryptography and Escrowed Encryption
Back to Top
Policy, Standards & Organization | Hours: 10 | Sessions: 3
Topics include :
1. Information Classification
2. Security Awareness
3. Organization Architecture
4. Enterprise Security Architecture
5. Policy Development
Back to Top
Law, Investigation & Ethics | Hours: 10 | Sessions: 3
This module describes legal issues relating computer abuse and their investigation. The topics include:
1. Legal and Regulatory Issues
2. Computer Abuse Methods and Detection
3. Federal and State Computer Crime Laws
4. Investigation
5. Computer Crime Investigation and Computer Forensics
6. Information Ethics
Back to Top
Computer Architecture & System Security | Hours: 10 | Sessions: 3
This course emphasizes the practical skills required to implement Computer Security. Exercises in this section include:
1. Computer Organization and Configuration
2. Secure Systems Architecture
3. Microcomputer and LAN Security
4. System Security
5. Systems Integrity Engineering
Back to Top
Application Security | Hours: 10 | Sessions: 3
The Topics include:
1. Application Security
2. Role-Based Access Control in Real Systems
3. Security Models for Object-Oriented Data Bases
Back to Top
Security Management Practices | Hours: 10 | Sessions: 3
The topics include:
1. Good practices in managing and preserving data
2. Develop contingency plans
Back to Top
Security Architecture & Models | Hours: 10 | Sessions: 3
The topics include:
1. Basic Security Requirement Model
2. Security Architecture Model Components
3. Developing the Security Architecture Model
Back to Top
Telecommunications & Network Security | Hours: 30 | Sessions: 3
This course emphasizes the practical skills required to implement TCP/IP network services on Unix platforms and maintain their integrity and availability. Exercises in this section include:
1. Telecommunications security objectives
2. Telecommunication security threats and counter measures
3. Network security
4. Internet security
Back to Top