Course Information

Duration

Minimum of 40 Hours

Exam Time

2 Hours Exam

Course Type

Self Paced / Blended / Classroom

Structure

Curriculum

Day 1

  • Incident Management Awareness Part I – CS00401
  • Incident Management Awareness Part II – CS00402

Day 2

  • Incident Management Cyber Security Incident Response Team (CSIRT) Part III – CS00403
  • Breach Notification Awareness Part I – CS00301

Day 3

  • Breach Notification Advanced Part II – CS00302
  • Problem Management Awareness Part I – CS00601

Day 4

  • Problem Management Advanced Part II – CS00602
  • Security Framework Awareness – CS001086
  • BCP/Disaster Recovery - DR Frameworks and Standards - Part IV Back-up

Day 5

  • Security Framework Awareness – CS001086
  • Information Security and Privacy Awareness CS00101
  • Exam

Course Details

Incident Management Awareness Part I – CS00401


The course includes cybersecurity and privacy knowledge test as users progress through the training. The training is designed to protect and preserve the confidentiality, integrity, and availability of information owned by or in the care of the corporation.


Incident Management Awareness Part II – CS00402


The framework design is the key for organizations to move from their current state to their target state with the ability to identify gaps and prioritize gaps based on risk assessment.


Incident Management Cyber Security Incident Response Team (CSIRT) Part III – CS00403


The course provides in-depth knowledge of risk management concepts and fundamentals. The course improves risk awareness, promotes an open risk culture, and inclusion of risk in the decision-making process.Risk is defined as the potential for loss or damage when a threat exploits a vulnerability.


Breach Notification Awareness Part I – CS00301


The course is designed to educate employees to understand how malware can infect your device, how you can avoid malware, and what action you need to take when you get infected by malware.


Breach Notification Advanced Part II – CS00302


The course is designed for organizations that need to comply with the regulatory requirements, support phishing awareness campaigns, and educate employees about the impact of social engineering attacks, especially those having exposure to private data, financial data, and highly sensitive and confidential data.


Problem Management Awareness Part I – CS00601


Access control is an important security issue for businesses of all sizes. From the largest corporations employing specialized security controls to the salesperson on a service call opening their smartphone with a thumbprint, everyone encounters access control at some time during their workday.


Problem Management Advanced Part II – CS00602


Incident management (IM) is a key component of any business resiliency program. The primary focus of IM is to restore normal operations and services as quickly as possible after an unforeseen event.


Security Framework Awareness – CS001086


This course presents information on how employees can contribute to your organization's security. The course provides a comprehensive review of the knowledge required for understanding workplace security risks and actions that need to be taken by employees.


BCP/Disaster Recovery - DR Frameworks and Standards - Part IV Back-up


This course presents information on how employees can contribute to your organization's security. The course provides a comprehensive review of the knowledge required for understanding workplace security risks and actions that need to be taken by employees.


Security Framework Awareness – CS001086


This BCP and DR awareness course will provide every employee in the organization with basic knowledge about disasters, risks covered by DR, use cases, challenges, DR plans, etc.


Information Security and Privacy Awareness CS00101


Business Process Management (BPM) is a systematic approach to making an organization's processes more efficient and dynamic to meet the business's changing needs.


Exam


You have total 3 attempts for this exam.

Incident management (IM) is a key component of any business resiliency program.

The frequency of data and security breaches in the news grows almost daily, and as a result, there is tremendous job demand for cybersecurity professionals. The many industries have compliance regulations designed to establish the cybersecurity controls framework to protect data and privacy such as PCI, HIPAA, GDPR, CCPA, and many others.

It’s important now, more than ever, to have trained, skilled professionals securing our data and personal information. The 40-hour curriculum is a challenging program that takes a multidisciplinary approach to attain proficiency in relevant domains, and modern information security.

The primary focus of IM is to restore the normal operations and services as quickly as possible after an unforeseen event. IM is the process of managing the lifecycle of all incidents with the objective to ensure smooth business operations with minimal to no downtime. The employees will learn key concepts, understand different terminologies, etc.

A (reportable) breach is the unauthorized acquisition, access, use, or disclosure of sensitive/PII/PHI information in a manner not permitted by law or regulation and which compromises the security and privacy.

The Problem Management Awareness course will enable you to gain and apply the skills and techniques to your own organization to establish problem management best practices. You will learn when and how to implement a problem control process, understand the workarounds, develop policy and procedures, and define critical success factors as well as key performance indicators.

The course is designed to ensure employees understand the importance of acting quickly, make sure they are aware of the basic notification rule requirements, and the penalties for failure to comply.

The primary focus of IM is to restore the normal operations and services as quickly as possible after an unforeseen event.

The course is designed to ensure employees understand the importance of acting quickly, make sure they are aware of the basic notification rule requirements, and the penalties for failure to comply.

  • You are currently studying non-technical field and you want to learn on how to keep data secure (such as corporate information, bank data, personal data, health data, accounts information) by timely reporting of incidents and early understanding what could be breach.
  • Your role in the organization as first cyber defendant requires through understanding of incidents, problem and breach.
  • You are first in the line of defense and need to communicate the breach to the organization and management.
  • You are currently studying technical field such as engineering or anything remotely related to technology then you want to expand your cyber knowledge, protect from hacks, investigate hacks, protect from attacks, protect data and learn hands-on skills to apply on the job.
  • The nature of business you are in, or your corporation handles highly sensitive data, and you wish to learn hands-on skills to protect the data.
  • You are a tech enthusiast looking to start your career in tech and get your foot in the door in the world of networking and security on a stable, safe, and resilient cyberspace.
  • Your company requires every employee to understand their roles, and do’s and don’ts once the breach occurs.
By the time you graduate, you can expect to be able to:

  • The employees will learn key concepts of Incident management, problem management, breach management, and understand different terminologies.
  • Learn to differentiate event, alert, incident, and breach.
  • Enhance your understanding of the incident management process. Learn to identify incidents, critical success factors, and key performance indicators specific to IM.
  • You will also learn about drivers/inputs that trigger the problem management process.
  • Learn the process of breach communication internal to the organization and very importantly communicating with outsiders.
  • Learn about legal responsibilities, applicable laws, and data breach response plan.
  • Learn the Federal and State laws that require timely breach communication.
  • Learn to create effective breach response, document policy, plan and procedure.
  • The advanced course trains candidates on the next steps instead of panicking. You will have better understanding of your roles, and do’s and don’ts once the breach occurs.
  • The course will train you on establishing problem management process roles and responsibilities, step by step approach in implementing key processes, defining process inputs/outputs, and reporting.

Various Job Oppoortunites are :


  • Cybersecurity Consultant/
    Analyst
  • Systems Security Analyst
  • IT Analyst
  • Developers
  • Systems Analyst/
    Managers
  • Architect
  • Cybersecurity Operations Specialist
  • Information Assurance Specialist
  • SOC Analyst
  • Compliance Auditor
  • Incident Response Analyst
  • Network or System Security Administration
  • IT Auditor
  • Vulnerability Assessment Analyst

Eligibility :

The candidate studying in diploma or undergraduate degree course is eligible for the certification course. Its highly recommended that candidate complete basic Cybersecurity and Compliance Foundation course prior to Certificate Course in Incident, Problem and Breach Management (CIPBM -II) – Part II but its not mandatory.

Take Exam

The candidate is eligible for CSC Council exam if he meets the Eligibility criteria listed below :

  • Applicants who do not attend training must prove 1 year of work experience in the compliance area
  • Applicants who are instructors, trainers, and PhDs shall also be eligible if they meet the above criteria.
  • On the application, there is a section for the applicant to list a boss, supervisor, or department lead who will act as their verifier.
  • If further information is requested from the applicant after the application is submitted and 90 days pass with no response from the applicant, the application will be automatically rejected, and a new form will have to be submitted.
  • If application is not approved, the application fee of USD 100 will not be refunded.
  • If the application is approved, then candidate must take exam in 15 working days

Apply Now

CSC - Certified Breach Management Professional (CBMP)

Certified Breach Management Professional (CBMP)

Incident management (IM) is a key component of any business resiliency program. The primary focus of IM is to restore the normal operations and services as quickly as possible after an unforeseen event.

Material of CBMP

IM is the process of managing the lifecycle of all incidents with the objective to ensure smooth business operations with minimal to no downtime. The employees will learn key concepts, understand different terminologies, etc.

A (reportable) breach is the unauthorized acquisition, access, use, or disclosure of sensitive/PII/PHI information in a manner not permitted by law or regulation and which compromises the security and privacy.

Price of the Course CBMP

Blended Course Price

Price: $ 900.00

The course is designed to ensure employees understand the importance of acting quickly, make sure they are aware of the basic notification rule requirements, and the penalties for failure to comply

CBMP Course Details

In this extremely competing world of cloud and complex offerings, one faces unique security challenges on an almost day-to-day basis.

The course is designed to ensure employees understand the importance of acting quickly, make sure they are aware of the basic notification rule requirements, and the penalties for failure to comply

CSC - Certified Breach Management Professional (CBMP)

Certified Breach Management Professional (CBMP)

IM is the process of managing the lifecycle of all incidents with the objective to ensure smooth business operations with minimal to no downtime. The employees will learn key concepts, understand different terminologies, etc.

Material of CBMP

A (reportable) breach is the unauthorized acquisition, access, use, or disclosure of sensitive/PII/PHI information in a manner not permitted by law or regulation and which compromises the security and privacy.

Incident management (IM) is a key component of any business resiliency program. The primary focus of IM is to restore the normal operations and services as quickly as possible after an unforeseen event. IM is the process of managing the lifecycle of all incidents with the objective to ensure smooth business operations with minimal to no downtime. The employees will learn key concepts, understand different terminologies, etc.

Price of the Blended Course CBMP

Price: $ 900.00


The course is designed to pass on the extensive knowledge of the security, risk management, and oversight controls at a service organization relevant to security, availability, processing integrity confidentiality, privacy.

CBMP Course Details

In this extremely competing world of cloud and complex offerings, one faces unique security challenges on an almost day-to-day basis.

The course is designed to ensure employees understand the importance of acting quickly, make sure they are aware of the basic notification rule requirements, and the penalties for failure to comply.


Contact Us for Classroom Course Schedule

Disclaimer

CSC-Council reserves the right to impose additional restriction to comply with the policy.

Failure to act in accordance with this clause shall render the authorized training center in violation of their agreement with EC-Council.

CSC-Council reserves the right to revoke the certification of any person in breach of this requirement.