  | 
    
         
        | 
      | 
      | 
    
Курсы по информационной безопасности
           | 
          
         | 
 
 
 
Сертификационная программа "The Certificate in Enterprise Information Security Management" (Управление информационной безопасностью организации)
        Курс: Practice Set for Risk Analysis and Business Continuity Planning (Практический курс по Анализу Рисков и Планированию Непрерывности Бизнеса)
      
      
      Описание: курс является 2-дневной практической частью для курсов “Information Risk Management” и “Business Continuity Planning”. В течение двух дней под  руководством Кена Яворски Вы научитесь применять модели анализа рисков,  гэп-анализа и различные формы анализа последствий для деятельности (BIA).  
Ориентирован на: аудиторов информационных систем, менеджеров по аудиту, планировщиков восстановления после чрезвычайных ситуаций; внешних аудиторов; сотрудников служб поддержки качества; специалистов по защите данных, администраторов безопасности ИС, менеджеров по информационной безопасности; системных программистов и системных аналитиков. 
        Предварительный уровень подготовки: средний. Вы должны прослушать курсы “Information Risk Management” и “Business Continuity Planning”, или иметь соответствующий  опыт. 
        Продолжительность: 2 дня, 16 часов (1 день, 8 часов - в рамках интенсивной программы). 
        Методические материалы: методические материалы учебного центра.
         
Программа курса
Risk Analysis - Investigation
  - How Scope Statements are established for the  Risk Analysis session
 
  - Potential fields (some mandatory) will be  reviewed and a time tested selection process used
 
  - Methods for the prioritization process both assets  and threats and vulnerabilities will be selected
 
  - Investigation section of the risk analysis  (with a facilitator and scribe selection)
 
  - Not only will the model be implemented but  checkpoints will be conducted to determine attendees understanding and ability  to modify
 
 
Risk Analysis – Follow-Up
  - Potential fields will be reviewed and a time  tested selection process used
 
  - Responsibility to answer to all potential  countermeasures offered by the Subject Matter Experts during the investigation  section
 
  - Process to document changes to the action  report
 
  - Method for control prioritization
 
  - Using the Risk Analysis to insure most  critical controls are implemented
 
 
Risk Analysis – General
  - Building a list of Common Findings
 
  - Building a Control List
 
  - Central Control of many Risk Analysis  sessions
 
 
Gap Analysis – Implementation
  - Use of model variations
 
  - How the tools can be used to identify most critical  weaknesses
 
  - Prioritization of spending security dollars
 
 
Business Impact Analysis (BIA) – Production Applications
  - How the BIA model is built (+ list of  potential impact categories)
 
  - Using a selection of impact categories the  attendees will develop an impact scorecard and determine how the categories  will be weighted
 
  - Attendees will implement the model on various  application types.  Identification will include
 
  
    - Critical business function
 
    - Peak activity periods
 
    - Longest tolerable outages
 
    - Impact to the organization when longest  tolerable outages have been exceeded
 
   
  - Attendee will see how a total impact score is  calculated
 
  - Attendees will assist in the creation of a  prioritized applications list to be used in the Data Center Disaster Recovery  Plan.
 
  - For a quick start – a look at an application  BIA Light Process
 
 
Business Impact Analysis – Business Unit Functions
  - How the two different models of how a  Business Unit BIA can be built
 
  - Business Unit BIA will be implemented for a  couple of different business units.
 
  - Attendee will see how a business functions  are prioritized
 
  - Attendees will assist in the creation of a  prioritized business function list for input into the Workspace Recovery Plan
 
 
 |