CYBER SECURITY METHODOLOGY PROFESSIONAL CSMP COURSE
CYBER SECURITY METHODOLOGY PROFESSIONAL CSMP COURSE // CYBER SECURITY METHODOLOGY PROFESSIONAL CSMP COURSE //
Syllabus+ADVANCED
level/floor
3 Mounts
Duration
88
academic hours
06.02.2025
Course Opening Date
Tue + Thu 17:30-21:00
Days & Hours
- About the course
- Credentials
- Certifications
- Study Divisions
- Lecturers
- Media
- More Courses
01
About the curriculum
The Cyber Methodology and Governance Training Program of See Security College is the most advanced of its kind, and the first of its kind in Israel. The program was originally built for the Israel Defence Ministry and became the standard for GRC studies.
The track will give the graduate the ability to deal with the role of cyber security methodologist in charge of:
Formulation, characterization and implementation of cyber security concepts, methods and methodologies in the organization.
Implementation of local and international regulation and standardization aspects and privacy protection aspects.
Cyber security risk management.
Professional guidance and full responsibility of organizational processes, such as accompanying the establishment of an organizational cyber protection system, professional guidance and accompanying projects in aspects of cyber protection, supply chain security, business continuity, disaster recovery and business impact analysis. This while knowing and understanding the organizational activity, needs and goals.
Responsibility for contacting the organization's management to obtain policy approval, to confirm the backup for the implementation of the concepts, methods, and methodologies for cyber protection in the organization, through an official letter of appointment, internal marketing support, budget.
Read more02
Program Purpose
The CSMP program is designed to train cyber defense experts who can advise, guide and make decisions in data protection tasks, in the administrative field (without the technological-tactical field).
The program will provide students with in-depth knowledge of the international, national, regional, and business standards, understanding of methods for setting organizational policies, procedures, and best practices in these fields, including management techniques. Along with professional knowledge, the program operates to provide ISO 27001 Lead Auditor certification, CGRC certification, CISM certification, and to participate in CISSP certification.
Read more03
Format and nature of studies
Hybrid learning - Two lessons per week from 17:30-21:00, online (live) and frontal lessons, according to each class's schedule.
Read more04
Target Audience
The course is intended for those with a background in infrastructure or for those with an organizational background. Also suitable for students with academic education in the fields of law, accounting, or certified Comptrollers who are proficient in the infrastructure fields.
Read more05
Admission conditions
Organization background. Preferably a background in information security / IT.
Academic degree - advantage.
A personal interview to examine the suitability of the program.
Read more07
Post-course work
Information security methodology in the administrative-governmental aspect.
Read more08
Curriculum Tasks
80% attendance requirement.
Each module must meet an internal test or work score of at least 70%
Read more09
More about the program
The essence of the profession:
Formulating, characterizing, and realizing perceptions, methods, and methodologies for cyber protection in the organization.
Implementation of local and international standards, regulations and privacy protection aspects.
Risk management in cyber protection.
Professional guidance and full responsibility for organizational processes in the field of cyber protection, such as: accompanying the establishment of an organizational cyber defense system, professional guidance, and accompaniment of projects in the aspects of cyber protection, supply chain security, business continuity, disaster recovery and analysis of business impacts, while recognizing and understanding the activity, needs and organizational goals.
Responsibility to contact the organization's management for policy approval, to make sure the backup for implementation of perceptions, methods, and methodologies for cyber protection in the organization through an official letter of appointment, internal marketing support, budget.
This program is part of the CISO program for Cyber Defense Technology and Methodology Administration’s broad curriculum
Read moreCredentials
DIPLOMA
CERTIFICATES
10
The information security world maintains close relationships with the field of government, risk management and corporate compliance, nourishing and nourishing. This is a three-dimensional discipline:
- Managing organizational risk as a result of a cyber event.
- Compliance with management requirements.
- Compliance with legal and regulatory requirements in relevant aspects, such as: Privacy Protection Law, Regulation 7809, 627 and others.
In this section of the course, the organization and methods of the information security world will be reviewed, in accordance with the domain of the ISC2-CISSP, ISACA-CISM; in accordance with the standards: ISO 27000, SOX, DoD, PCI; and based on legislation in Israel and the broad regulations:
- Introduction to Methodology (GOV and CR)
- Cyber Laws
- Governance (Corporate, IT, Security)
- Cyber Compliance
- Cyber Security Framework Introduction
- ISMS - ISO27001
- Privacy in the Digital Age
- Security Policies and Procedures
What does the data security manager do every day? What is the list of his missions and what is the correct order of operations? How does the product of each action become a raw material of the next action? Unwritten Theory of CISO Functions:
- Information System Security Engineering
- Cyber Security Risk Management Framework I + II
- Cyber Security as a Process
- Security Metrics
- Business Continuity Management and Data Recovery Processes
- Data Leakage Prevention Process
- Communication and Awareness
- Cybersecurity Projects Management
- Cyber Security in Real Life
- Introduction to Supply Chain
- CISO Role Seminar