CYBER SECURITY METHODOLOGY PROFESSIONAL CSMP COURSE

CYBER SECURITY METHODOLOGY PROFESSIONAL CSMP COURSE // CYBER SECURITY METHODOLOGY PROFESSIONAL CSMP COURSE //

Syllabus

+ADVANCED

level/floor

3 Mounts

Duration

88

academic hours

06.10.2024

Course Opening Date

Sun + Wed 17:30-21:00

Days & Hours

  • About the course
  • Credentials
  • Certifications
  • Study Divisions
  • Lecturers
  • Media
  • More Courses

01

About the curriculum

The Cyber Methodology and Governance Training Program of See Security College is the most advanced of its kind, and the first of its kind in Israel. The program was originally built for the Israel Defence Ministry and became the standard for GRC studies.

The track will give the graduate the ability to deal with the role of cyber security methodologist in charge of:

Formulation, characterization and implementation of cyber security concepts, methods and methodologies in the organization.

Implementation of local and international regulation and standardization aspects and privacy protection aspects.

Cyber security risk management.

Professional guidance and full responsibility of organizational processes, such as accompanying the establishment of an organizational cyber protection system, professional guidance and accompanying projects in aspects of cyber protection, supply chain security, business continuity, disaster recovery and business impact analysis. This while knowing and understanding the organizational activity, needs and goals.

Responsibility for contacting the organization's management to obtain policy approval, to confirm the backup for the implementation of the concepts, methods, and methodologies for cyber protection in the organization, through an official letter of appointment, internal marketing support, budget.

Read more

02

Program Purpose

The CSMP program is designed to train cyber defense experts who can advise, guide and make decisions in data protection tasks, in the administrative field (without the technological-tactical field).

The program will provide students with in-depth knowledge of the international, national, regional, and business standards, understanding of methods for setting organizational policies, procedures, and best practices in these fields, including management techniques. Along with professional knowledge, the program operates to provide ISO 27001 Lead Auditor certification, CGRC certification, CISM certification, and to participate in CISSP certification.

Read more

03

Format and nature of studies

Hybrid learning - Two lessons per week from 17:30-21:00, online (live) and frontal lessons, according to each class's schedule.

Read more

04

Target Audience

The course is intended for those with a background in infrastructure or for those with an organizational background. Also suitable for students with academic education in the fields of law, accounting, or certified Comptrollers who are proficient in the infrastructure fields.

Read more

05

Admission conditions

Organization background. Preferably a background in information security / IT.

Academic degree - advantage.

A personal interview to examine the suitability of the program.

Read more

06

Price

8,000NIS + 400NIS  registration fee

Read more

07

Post-course work

Information security methodology in the administrative-governmental aspect.

Read more

08

Curriculum Tasks

80% attendance requirement.

Each module must meet an internal test or work score of at least 70%

Read more

09

More about the program

The essence of the profession:

Formulating, characterizing, and realizing perceptions, methods, and methodologies for cyber protection in the organization.

Implementation of local and international standards, regulations and privacy protection aspects.

Risk management in cyber protection.

Professional guidance and full responsibility for organizational processes in the field of cyber protection, such as: accompanying the establishment of an organizational cyber defense system, professional guidance, and accompaniment of projects in the aspects of cyber protection, supply chain security, business continuity, disaster recovery and analysis of business impacts, while recognizing and understanding the activity, needs and organizational goals.

Responsibility to contact the organization's management for policy approval, to make sure the backup for implementation of perceptions, methods, and methodologies for cyber protection in the organization through an official letter of appointment, internal marketing support, budget.

This program is part of the CISO program for Cyber Defense Technology and Methodology Administration’s broad curriculum

Read more

Credentials

DIPLOMA

CERTIFICATES

10

Study Divisions

The information security world maintains close relationships with the field of government, risk management and corporate compliance, nourishing and nourishing. This is a three-dimensional discipline:

  • Managing organizational risk as a result of a cyber event.
  • Compliance with management requirements.
  • Compliance with legal and regulatory requirements in relevant aspects, such as: Privacy Protection Law, Regulation 7809, 627 and others.

In this section of the course, the organization and methods of the information security world will be reviewed, in accordance with the domain of the ISC2-CISSP, ISACA-CISM; in accordance with the standards: ISO 27000, SOX, DoD, PCI; and based on legislation in Israel and the broad regulations:

  • Introduction to Methodology (GOV and CR)
  • Cyber Laws
  • Governance (Corporate, IT, Security)
  • Cyber Compliance
  • Cyber Security Framework Introduction
  • ISMS - ISO27001
  • Privacy in the Digital Age
  • Security Policies and Procedures

 

What does the data security manager do every day? What is the list of his missions and what is the correct order of operations? How does the product of each action become a raw material of the next action? Unwritten Theory of CISO Functions:

  • Information System Security Engineering 
  • Cyber Security Risk Management Framework I + II
  • Cyber Security as a Process
  • Security Metrics
  • Business Continuity Management and Data Recovery Processes
  • Data Leakage Prevention Process
  • Communication and Awareness
  • Cybersecurity Projects Management
  • Cyber Security in Real Life
  • Introduction to Supply Chain
  • CISO Role Seminar

LECTURERES