Ict Security Manager ICT Professionals
SaveWhat Does an Ict Security Manager Do?
ICT security managers propose and implement necessary security updates. They advise, support, inform and provide training and security awareness and take direct action on all or part of a network or system.
Resource recommendations may include affiliate links. Learn more
Where Do I Start?
Computer Forensics
The process of examining and recovering digital data from sources for legal evidence and crime investigation.
Sign up to trackReady to go deeper? Pick up to 3 skills to focus on from the list below.
These are common skills for this role. Real-world experience matters more than ticking every box — use this as a guide, not a checklist.
Skills You Need to Become an Ict Security Manager
Essential Skills
Essential Skills
-
EssentialComputer Forensics knowledge
The process of examining and recovering digital data from sources for legal evidence and crime investigation.
Recommended Books
5 books -
EssentialInternet Of Things knowledge
The general principles, categories, requirements, limitations and vulnerabilities of smart connected devices (most of them with intended internet connectivity).
-
EssentialInformation Security Strategy knowledge
The plan defined by a company which sets the information security objectives and measures to mitigate risks, define control objectives, establish metrics and benchmarks while complying with legal, internal and …
Recommended Books
1 book -
EssentialIct Security Standards knowledge
The standards regarding ICT security such as ISO and the techniques required to ensure compliance of the organisation with them.
No book recommendations available yet.
-
EssentialInternet Governance knowledge
The principles, regulations, norms and programs that shape the evolution and use of internet, such as internet domain names management, registries and registrars, according to ICANN/IANA regulations and recommendations, IP …
No book recommendations available yet.
-
EssentialIct Problem Management Techniques knowledge
The techniques related to identifying the solutions of the root cause of ICT incidents.
Recommended Books
1 book -
EssentialInternal Risk Management Policy knowledge
The internal risk management policies that identify, assess and prioritise risks in an IT environment. The methods used to minimise, monitor and control the possibility and the impact of disastrous …
No book recommendations available yet.
-
EssentialLegal Requirements Of Ict Products knowledge
The international regulations related to the development and use of ICT products.
No book recommendations available yet.
-
EssentialIct Project Management knowledge
The methodologies for the planning, implementation, review and follow-up of ICT projects, such as the development, integration, modification and sales of ICT products and services, as well as projects relating …
-
EssentialIct Quality Policy knowledge
The quality policy of the organisation and its objectives, the acceptable level of quality and the techniques to measure it, its legal aspects and the duties of specific departments to …
No book recommendations available yet.
-
EssentialIct System User Requirements knowledge
The process intended to match user and organisation's needs with system components and services, by taking into consideration the available technologies and the techniques required to elicit and specify requirements, …
No book recommendations available yet.
-
EssentialImplement Ict Risk Management skill
Develop and implement procedures for identifying, assessing, treating and mitigating ICT risks, such as hacks or data leaks, according to the company's risk strategy, procedures and policies. Analyse and manage …
Course recommendations coming soon.
-
EssentialManage It Security Compliances skill
Guide application and fulfilment of relevant industry standards, best practices and legal requirements for information security.
Course recommendations coming soon.
-
EssentialSolve Ict System Problems skill
Identify potential component malfunctions. Monitor, document and communicate about incidents. Deploy appropriate resources with minimal outage and deploy appropriate diagnostic tools.
Course recommendations coming soon.
-
EssentialDefine Security Policies skill
Design and execute a written set of rules and policies that have the aim of securing an organisation concerning constraints on behaviour between stakeholders, protective mechanical constraints and data-access constraints.
Course recommendations coming soon.
-
EssentialDevelop Information Security Strategy skill
Create company strategy related to the safety and security of information in order to maximise information integrity, availability and data privacy.
Course recommendations coming soon.
-
EssentialEstablish An Ict Security Prevention Plan skill
Define a set of measures and responsibilities to ensure the confidentiality, integrity and availability of information. Implement policies to prevent data breaches, detect and respond to unathorised access to systems …
Course recommendations coming soon.
-
EssentialLead Disaster Recovery Exercises skill
Head exercises which educate people on what to do in case of an unforeseen disastrous event in the functioning or security of ICT systems, such as on recovery of data, …
Course recommendations coming soon.
-
EssentialMaintain Ict Identity Management skill
Administer identification, authentication and authorisation of individuals within a system and control their access to resources by associating user rights and restrictions with the established identity.
Course recommendations coming soon.
-
EssentialManage Disaster Recovery Plans skill
Prepare, test and execute, when necessary, a plan of action to retrieve or compensate lost information system data.
Course recommendations coming soon.
Optional Skills (5 of 27 displayed)
-
OptionalOrganisational Resilience knowledge
The strategies, methods and techniques that increase the organisation's capacity to protect and sustain the services and operations that fulfil the organisational mission and create lasting values by effectively addressing …
-
OptionalIct Network Security Risks knowledge
The security risk factors, such as hardware and software components, devices, interfaces and policies in ICT networks, risk assessment techniques that can be applied to assess the severity and the …
Recommended Books
1 book -
OptionalDecision Support Systems knowledge
The ICT systems that can be used to support business or organisational decision making.
Recommended Books
1 book -
OptionalHybrid Model knowledge
The hybrid model consists of principles and fundamentals of service-oriented modelling for business and software systems that allow the design and specification of service-oriented business systems within a variety of …
No book recommendations available yet.
-
OptionalIct Security Legislation knowledge
The set of legislative rules that safeguards information technology, ICT networks and computer systems and legal consequences which result from their misuse. Regulated measures include firewalls, intrusion detection, anti-virus software …
No book recommendations available yet.
-
OptionalOpen Source Model knowledge
The open source model consists of principles and fundamentals of service-oriented modelling for business and software systems that allow the design and specification of service-oriented business systems within a variety …
No book recommendations available yet.
-
OptionalOutsourcing Model knowledge
The outsourcing model consists of principles and fundamentals of service-oriented modelling for business and software systems that allow the design and specification of service-oriented business systems within a variety of …
No book recommendations available yet.
-
OptionalSaas (Service-Oriented Modelling) knowledge
The SaaS model consists of principles and fundamentals of service-oriented modelling for business and software systems that allow the design and specification of service-oriented business systems within a variety of …
No book recommendations available yet.
-
OptionalSystems Development Life-Cycle knowledge
The sequence of steps, such as planning, creating, testing and deploying and the models for the development and life-cycle management of a system.
No book recommendations available yet.
-
OptionalMobile Device Management knowledge
The methods for managing the use of mobile devices within an organisation, while ensuring security.
No book recommendations available yet.
-
OptionalAudit Techniques knowledge
The techniques and methods that support a systematic and independent examination of data, policies, operations and performances using computer-assisted audit tools and techniques (CAATs) such as spreadsheets, databases, statistical analysis …
Recommended Books
1 book -
OptionalInformation Confidentiality knowledge
The mechanisms and regulations which allow for selective access control and guarantee that only authorised parties (people, processes, systems and devices) have access to data, the way to comply with …
No book recommendations available yet.
-
OptionalWeb Application Security Threats knowledge
The attacks, vectors, emergent threats on websites, web applications and web services, the rankings of their severity identified by dedicated communities such as OWASP (Open Web Application Security Project).
Recommended Books
1 book -
OptionalIct Encryption knowledge
The conversion of electronic data into a format which is readable only by authorized parties which use key encryption techniques, such as Public Key Infrastructure (PKI) and Secure Socket Layer …
No book recommendations available yet.
-
OptionalIct Process Quality Models knowledge
The quality models for ICT services which address the maturity of the processes, the adoption of recommended practices and their definition and institutionalisation that allow the organisation to reliably and …
No book recommendations available yet.
-
OptionalInvestment Analysis knowledge
The methods and tools for analysis of an investment compared to its potential return. Identification and calculation of profitability ratio and financial indicators in relation to associated risks to guide …
No book recommendations available yet.
-
OptionalCyber Security knowledge
The methods that protect ICT systems, networks, computers, devices, services, digital information and people against illegal or unauthorised use.
No book recommendations available yet.
-
OptionalLevels Of Software Testing knowledge
The levels of testing in the software development process, such as unit testing, integration testing, system testing and acceptance testing.
No book recommendations available yet.
-
OptionalService-Oriented Modelling knowledge
The principles and fundamentals of service-oriented modelling for business and software systems that allow the design and specification of service-oriented business systems within a variety of architectural styles, such as …
No book recommendations available yet.
-
OptionalTools For Ict Test Automation knowledge
The specialised software to execute or control tests and compare predicted testing outputs with actual testing results such as Selenium, QTP and LoadRunner
No book recommendations available yet.
-
OptionalCyber Attack Counter-Measures knowledge
The strategies, techniques and tools that can be used to detect and avert malicious attacks against organisations' information systems, infrastructures or networks.
No book recommendations available yet.
-
OptionalIct Recovery Techniques knowledge
The techniques for recovering hardware or software components and data, after failure, corruption or damage.
No book recommendations available yet.
-
OptionalExecute Ict Audits skill
Organise and execute audits in order to evaluate ICT systems, compliance of components of systems, information processing systems and information security. Identify and collect potential critical issues and recommend solutions …
Course recommendations coming soon.
-
OptionalProvide Technical Documentation skill
Prepare documentation for existing and upcoming products or services, describing their functionality and composition in such a way that it is understandable for a wide audience without technical background and …
Course recommendations coming soon.
-
OptionalUse Ict Ticketing System skill
Utilise a specialised system to track registration, processing and resolution of issues in an organisation by assigning each of these issues a ticket, registering inputs from involved persons, tracking changes …
Course recommendations coming soon.
-
OptionalDefine Technology Strategy skill
Create an overall plan of objectives, practices, principles and tactics related to the use of technologies within an organisation and describe the means to reach the objectives.
Course recommendations coming soon.
-
OptionalIdentify Ict Security Risks skill
Apply methods and techniques to identify potential security threats, security breaches and risk factors using ICT tools for surveying ICT systems, analysing risks, vulnerabilities and threats and evaluating contingency plans.
Course recommendations coming soon.