0345 4506120

Cyber Security Risk Assessment & Management — GCHQ Certified Training

Course Details

Name Cyber Security Risk Assessment & Management — GCHQ Certified Training
Description
URL
Location:
London - Central
Start Date:
Working Days:
Price:
£1536.00 +vat
was £1846.00
Availability:
Exam:
Residential:
Course ID:
448275
Offer

Overview

Protect your organization from unacceptable losses by employing a standards-based risk management processes. In this risk assessment training course, you will learn about the laws and regulations that impose strict cyber security requirements on all organizations, and gain the skills to develop a compliance assessment plan while maintaining a satisfactory security posture.

Learning Objectives

You Will Learn How To

  • Implement standards-based, proven methodologies for assessing and managing the risks to your organisation's information infrastructure
  • Select and implement security controls that ensure compliance with applicable laws, regulations, policies, and directives
  • Extend security protection to Industrial Control Systems (ICS) and the cloud

Pre-Requisites

Attendees should have a basic knowledge of business processes and technology concepts. No specialised technical knowledge is assumed.

Course Content

Course Outline

Introduction to Risk Assessment and Management

  • Ensuring compliance with applicable regulatory drivers
  • Protecting the organisation from unacceptable losses
  • Describing the Risk Management Framework (RMF)
  • Applying NIST/ISO risk management processes

Characterising System Security Requirements

Defining the system

  • Outlining the system security boundary
  • Pinpointing system interconnections
  • Incorporating the unique characteristics of Industrial Control Systems (ICS) and cloud-based systems

Identifying security risk components

  • Estimating the impact of compromises to confidentiality, integrity and availability
  • Adopting the appropriate model for categorising  system risk

Setting the stage for successful risk management

  • Documenting critical risk assessment and management decisions in the System Security Plan (SSP)
  • Appointing qualified individuals to risk governance roles

Selecting Appropriate Security Controls

Assigning a security control baseline

  • Investigating security control families
  • Determining the baseline from system security risk

Tailoring the baseline to fit the system

  • Examining the structure of security controls, enhancements and parameters
  • Binding control overlays to the selected baseline
  • Gauging the need for enhanced assurance
  • Distinguishing system-specific, compensating and non-applicable controls

Reducing Risk Through Effective  Control Implementation

Specifying the implementation approach

  • Maximising security effectiveness by "building in" security
  • Reducing residual risk in legacy systems via "bolt-on" security elements

Applying NIST/ISO controls

  • Enhancing system robustness through selection of evaluated and validated components
  • Coordinating implementation approaches to administrative, operational and technical controls
  • Providing evidence of compliance through  supporting artefacts

Assessing Compliance Scope and Depth

Developing an assessment plan

  • Prioritising depth of control assessment
  • Optimising validation through sequencing and consolidation
  • Verifying compliance through tests, interviews and examinations

Formulating an authorisation recommendation

  • Evaluating overall system security risk
  • Mitigating residual risks
  • Publishing the Plan of Action and Milestones (POA&M), the risk assessment and recommendation

Authorising System Operation

Aligning authority and responsibility

  • Quantifying organisational risk tolerance
  • Elevating authorisation decisions in high-risk scenarios

Forming a risk-based decision

  • Appraising system operational impact
  • Weighing residual risk against operational utility
  • Issuing Authority to Operate (ATO)

Maintaining Continued Compliance

Justifying continuous reauthorisation

  • Measuring impact of changes on system security posture
  • Executing effective configuration management
  • Performing periodic control reassessment

Preserving an acceptable security posture

  • Delivering initial and routine follow-up security awareness training
  • Collecting on-going security metrics
  • Implementing vulnerability management, incident response and business continuity processes

London - Euston

Description:

This venue, based in Central London, has over 30 fully-equipped classrooms. The classrooms are spread across four floors of Euston House and there are coffee lounges on each floor. 

Registration takes place in the Reception Area on the ground floor and the nearest tube stations are Euston and Euston Square.

Location:

Euston House
24 Eversholt Street
London
NW1 1AD

 

Directions:

From Euston Station
(Northern and Victoria Lines)

Exit into Euston Railway Station. Leave the station through the main doors and turn left immediately. Walk along to stairs leading down to Eversholt Street. Cross the road to Euston House.

For the latest travel information, please visit www.tfl.gov.uk

From Euston Square Underground Station

(Circle, Metropolitan, Hammersmith and City Lines)

Take the exit marked Euston Road (North) and Railway Station. Turn left at the top of the stairs onto Euston Road. Walk past two sets of traffic lights and Euston Railway Station. On the third set of traffic lights turn left into Euston Square. This becomes Eversholt Street. Euston House is on the right past The Royal George Pub.

Parking


All London car parks charge typical city rates.  The closest is the NCP car park at Euston Railway Station.


GCHQ Certified Training and Exam Information:

  • This is a GCHQ Certified Training (GCT) course. GCHQ Certified Training has been recognised for excellence by a UK Government developed cyber security scheme. GCT is part of the UK Government’s initiative to address the shortage of skilled cyber security professionals. The GCT scheme is underpinned by the industry respected IISP framework and assesses the quality of the course materials and the Instructors’ delivery of the course against GCHQ’s exacting standards.
  • Successful completion of the end of course exam will gain you an independent APMG-International GCT certification award.

This course is approved by CompTIA for continuing education units (CEUs).

Digital Badge

Designed to test a candidate’s knowledge and comprehension of the course, those that are successful can now claim a digital badge, in addition to their downloadable certificate. By claiming their digital badge, candidates prove they have studied a GCT course and passed the related APMG exam.

 

Candidates who share their badge online, can showcase their certified skills to the online community. APMG’s COO, Nick Houlton says, "Our badges are secure, digital representations of a person’s credentials. Through a single click, employers can verify a certification and understand the qualification, as well as an element of the process required to earn it. The badge can easily be embedded on a CV or email signature and shared on social networking sites, including Facebook, LinkedIn and Twitter.”

 

GCHQ appointed APMG to create a process for certifying cyber security related courses. Working in partnership with the National Cyber Security Centre (NCSC, a part of GCHQ), strict criteria are adhered to, to assess an organisation for its quality management system, quality of training materials and content and the quality of training that takes place.  By choosing a GCT course, a candidate can be confident that they will receive high quality training and training materials when they study their course.

Our Customers Include