BCS Foundation Certificate in Information Security Management Principles

A foundation-level certificate covering information security management topics including risk management, security standards, legislation and business continuity.

COURSE DELIVERY

Online Live Attended

COURSE LEVEL

Intermediate

COURSE LENGTH

Three day course delivered live online.

PRICE PER PERSON

£1,350.00 excl VAT

BCS Foundation Certificate in Information Security Management Principles

Course Overview

Course Includes 

All course materials (available in digital and hard copy), course handbook (hard copy), BCS registration and assessment fees.

Certification Award

BCS Foundation Certificate

Prerequisites

None
  • Safeguard your brand by improving the competence and confidence of your staff.
  • Enquire about discounts for 5+ team members.
  • Multiple staff members can be booked for a specific date or a date can be arranged to suit your schedule.

ENQUIRE TODAY

  • Quality-assured training to get you feeling confident and competent while boosting your value.
  • Practical online training with a specialist and experienced trainer.
  • Prove your skills development with Tkm Badges and CPD certificates.

REQUEST CPD CERTIFICATE

  • This course can be delivered in-house and can be customised to suit your organisation’s needs.
  • Get training in all information governance disciplines.
  • We offer corporate training options for delivering a full information governance training programme for your team. 

ENQUIRE TODAY

Course Description

This certificate covers the range of concepts, approaches and techniques that are applicable to the BCS Foundation Certificate in Information Security Management Principles. Candidates are required to demonstrate their knowledge and understanding of these aspects, as specified in the learning objectives provided.

The certificate is relevant to anyone requiring an understanding of the BCS Foundation Certificate in Information Security Management Principles including those who have information security responsibilities as part of their day-to-day role, or who are thinking of moving into an information security or related function.

It also provides the opportunity for those already within these roles to enhance or refresh their knowledge and in the process gain a qualification, recognised by industry, which demonstrates the level of knowledge gained.

Book BCS Foundation Certificate in Information Security Management Principles today!

Get started today for yourself or your entire team. See our schedule below.

Find Course Dates

Can't find suitable course dates?

We frequently publish new course dates but if you don’t see any dates that work for you, make a request by getting in touch here.

If you’d like us to deliver this course in-house or in-person for your team, you can request here.

Course Content

Information Security Management Principles

Identify definitions, meanings and use of concepts and terms across information security management. Explain the need for, and the benefits of information security.

Information Risk

Gain an appreciation of risk assessment and management as it applies to information security including how threats and vulnerabilities lead to risks, conducting risk assessments and appropriate risk responses.

Outline the threats to and vulnerabilities of information systems and describe the processes for understanding and managing risk relating to information systems.

Information Security Framework

Explain how risk management should be implemented in an organisation. Interpret general principles of law, legal jurisdiction and associated topics as they affect information security management covering a broad spectrum from the security implications on compliance with legal requirements affecting business (e.g. international electronic commerce) to laws that directly affect the way information can be monitored and copied. Describe the number of common, established standards and procedures that directly
affect information security management. 

Security Lifecycle

Demonstrate an understanding of the importance and relevance of the information lifecycle. Identify the following stages of the information lifecycle. Outline the following concepts of the design process lifecycle including essential and non-functional requirements. Demonstrate an understanding of the importance of appropriate technical audit and review processes, of effective change control and of configuration management. Explain the risks to security brought about by systems development and support.

Procedural/People Security Controls

Explain the risks to information security involving people. Describe user access controls that may be used to manage those risks. Identify the importance of appropriate training for all those involved with information.

Technical Security Controls

Outline the technical controls that can be used to help ensure protection from Malicious Software. Identify information security principles associated with the underlying networks and communications systems. Recognise the information security issues relating to value-added services that use the underlying networks and communications systems. Recall the information security issues relating to organisations that utilise cloud computing facilities. Cloud computing is location-independent computing providing off-site resources, (e.g. services, applications and storage facilities). Define the following aspects of security in information systems, including operating systems, database and file management systems, network systems and applications systems and how they apply to the IT infrastructure.

Physical and Environmental Security Controls

Outline the physical aspects of security available in multi-layered defences and explain how the environmental risks to information in terms of the need, for example, for appropriate power supplies, protection from natural risks (fire, flood, etc.) and in the everyday operations of an organisation.

Disaster Recovery and Business Continuity Management

Describe the differences between and the need for business continuity and disaster recovery.

Tkm & Associates proudly supports palliative care hospices

Throughout 2025, Tkm & Associates will be supporting the palliative care sector as our charity partners.

For every live attended course booking (public and in-house), practitioner and foundation online on-demand courses we receive, Tkm & Associates will credit 10% of the booking value into a pool to support information governance training for practitioners in the palliative care sectors. This will allow data protection officers, Caldicott Guardians, and records managers working in hospices and other parts of third-sector palliative care services to choose and book a range of our live and on-demand training at either heavily subsidised or no cost, depending on course choice.

When you choose Tkm & Associates as your information governance training partner, you are helping a key and under-resourced care sector.