Leader in the cybersecurity training sector.

Information Systems Security Manager (ISSM)

Satisfaction rate
4.8
Success rate
4.8

The target audience for training

Anyone required to perform the role of Information Systems Security Manager:

  • CISO,
  • Future CISOs,
  • Deputy CISO, ...

What you will learn

On completion of the course, the trainee will be able to take over the role of IT Security Systems Manager.

Training programme

Day 1

Day 1 - Morning : Information systems security issues

  • Introduction and vocabulary (ISS, cybersecurity, IT, information security)
  • Cybersecurity objectives and strategic alignment with the organisation
  • Criteria (confidentiality, integrity, availability, proof) and notions of incident/risk
  • Activities and role of the CISO in the company
  • Security policy, security programme and associated measures.
  • CISO participation in projects and professional networks.
    • Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.

 

Day 1 - Afternoon: ISS incident management 

  • IS incident management: definitions and examples.
  • Incident management objectives.
  • Key steps in managing IS-related incidents.
  • Common mistakes to avoid.
  • Tools and resources available.
    • Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.

Day 2 - Morning: Introduction to the cyber threat and risk management

  • Introduction to the cyber threat and risk management.
  • Thinking like an attacker: logic and methods.
  • Fundamental good safety practice.
  • Notions of cryptography: concepts and uses.
  • Network security: basic principles, types of attack and protective measures.
  • Filtering and interconnection components: firewall, proxy.
  • Secure network architecture.
    • Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.

 

Day 2 - Afternoon : Application & system security / Protection of workstations / Security audits

  • Application security: memory and web vulnerabilities.
  • Secure development.
  • System security: access control, monitoring, updates, backups, logging.
  • Protection of workstations and mobile equipment.
  • Introduction to IS security audits.
    • Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt

Day 3 - Morning: Processes and Information Security Management System (ISMS) / ISO 27000 standards / Security policies

  • Processes and Information Security Management System (ISMS).
  • Overview of ISO27000-type standards.
  • ISO 27001 and ISO 27002 standards.
  • Use and benefits of standards in an ISMS.
  • Safety policies: definition, hierarchy and usefulness.
  • Policy development, implementation and review.
    • Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.

 

Day 3 - Afternoon : Safety indicators / Audit: types, procedure, corrective actions

  • Safety indicators: principles, sources of collection, specification and examples.
  • Risks associated with indicators and mistakes to avoid.
  • Audit: types, objectives and vocabulary (ISO 19011).
  • Audit stages: preparation, conduct, follow-up and corrective action.
  • Hosting external auditors.
    • Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.

Day 4 - Morning : IS risk management: methods (ISO 27001, EBIOS, Mehari), asset identification, risk assessment

  • SSI risk management.
  • Methods: ISO 27001, EBIOS, Mehari.
  • Identification and valuation of assets.
  • Threats, vulnerabilities, risk assessment and evaluation.
  • Possible treatments: reduction, sharing, maintenance, refusal.
  • Notion of residual risk and acceptance.
    Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.

 

Day 4 - Afternoon : Legal aspects of ISS: obligations, prevention, repression

  • Legal aspects of ISS.
  • General and sectoral obligations: RGS, NIS 2, DORA, ....
  • Prevention: legal rules, logging, supervision of use, contractualisation.
  • Repression: crisis management, characterisation of incidents, penalties.
    • Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.

Day 5 - Morning: Managing IS service providers / Raising awareness of IS security

  • Management of ISS service providers: qualification, expression of requirements, contracting.
  • Monitoring, auditing and control of service providers.
  • Reaction in the event of a crisis involving a service provider.
  • Raising awareness of IS security: objectives, roles, resources, levers and costs.
    • Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.


Day 5 - Afternoon : Final role-play / Feedback, closure, assessment

  • Final simulation.
  • Case studies incorporating the full range of skills.
  • Feedback and debriefing.
  • Closing and final assessment.
  • Attendance certificates are handed out and participants evaluate the course.

Trainer profile

Expert consultant-trainer in safety management, combining technical expertise, field experience and teaching know-how, whose technical, professional and teaching skills have been rigorously assessed and validated as part of our internal selection procedures.

Teaching methods and resources:

The course is based on a balanced combination of theoretical and practical approaches, guaranteeing both the acquisition of knowledge and its operational application:

  • Moderated by a CISO, presenting his or her strategy for taking up the role and providing feedback on concrete, detailed cases of security projects carried out in his or her organisation.
  • Structured theoretical input, illustrated by practical examples tailored to the participants' professional context.
  • Practical exercises at each stage to help you assimilate the knowledge you have acquired.
  • A case study linking the different skill blocks.
  • Strong interaction between trainers and trainees, making exchanges more concrete and in correlation with trainees' expectations.
  • Full educational documentation, supplied in digital format.
  • Course evaluation questionnaire at the end of the course, analysed by our teaching team.
  • Certificate of acquired skills sent to the trainee at the end of the course.
  • End-of-training certificate sent at the same time as the invoice to the company or funding organisation, confirming that the trainee has fully attended the session.

Training objectives

  • Understand the challenges of IT service security within an organisation.
  • Know the basic techniques of the CISO function.
  • Master the ISO 27001 standard and implement an ISMS in your organisation.
  • Knowing the safety policy and auditing safety and indicators.
  • Be familiar with the regulations and legal aspects of IT systems security.
  • Responding to incidents.

Assessment method

  • Practical exercises at every stage of the course.
  • A case study linking the different skill blocks.
  • Quiz at the end of each day's training.
  • Self-assessment of knowledge acquired by the trainee via a questionnaire.

Training prerequisites

  • Experience in an IT department as an IT specialist.
  • Basic knowledge of security applied to information systems and a good command of systems and infrastructures.
Book Now

Important information:

Our courses are not registered with the Répertoire National des Certifications Professionnelles (RNCP), but they do comply with the requirements of the Répertoire Spécifique (RS).

Réserver l’événement

icône Form/calendar icon
icône Form/ticket icon
1 personne
icône Form/up small icon icône Form/down small icon
Billets disponibles: Illimité
Le billet de "1 personne" est épuisé. Vous pouvez essayer un autre billet ou une autre date.

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Information request

I would like more information about your training courses

ACG Cyberacademy collects and uses the data provided via this form in order to process your registration requests. Fields marked with an * are required. The other information enables us to optimise the follow-up of your request and the quality of our customer relations.