Use the code ‘FIREBRAND15’ at checkout for 15% off this month only!

Logo

15% Discount AvailableUse the code ‘FIREBRAND15’ at checkout

ISACA Advanced in AI Security Management™ (AAISM™)

Code: aaism

What you'll learn

On this accelerated ISACA Advanced in AI Security Management™ (AAISM™) course, the industry's first AI-specific security management certification, you’ll gain an understanding of AI governance and program management, AI risk management and AI technologies and controls.

The ISACA Advanced in AI Security Management™ (AAISM™) is an AI-centric security management certification designed to supplement certified security managers with the ability to identify, assess, monitor and mitigate risk associated with enterprise AI solutions.

AI is reshaping the security environment, and your clients need to be ready. To support their journey, we’re excited to introduce the ISACA Advanced in AI Security Management™ (AAISM™), designed specifically to meet the challenges and potential brought by AI.

Experienced IT security professionals who hold CISM® or CISSP certifications are also encouraged to join our Beta Program for this advanced credential.

In just 2 days, you’ll be able to navigate the evolving risks of AI, implement essential controls, and ensure its responsible and effective use across the organisation.

You’ll also:

  • Validate your expertise in addressing AI-specific security issues.
  • Empower yourself to leverage AI for internal growth and innovation.
  • Position your organisation as a leader in AI security training.
  • Meet the ANSI standards and be the highest-quality credential on the market.

At the end of this course, you’ll achieve your ISACA Advanced in AI Security Management Certification (AAISM) certification. Through Firebrand’s Lecture | Lab | Review methodology, you’ll get certified at twice the speed of traditional training and access courseware, learn from certified instructors, and train in a distraction-free environment.

Curriculum

133 modules

Domain 1. AI Governance and Program Management

  • Stakeholder Considerations, Industry Frameworks, and Regulatory Requirements
    • Organizational Structure and Overall Governance
    • Roles and Responsibilities
    • Charter and Steering Committee
    • Identifying Stakeholders
    • Risk Appetite and Tolerance
    • Frameworks, Standards, and Regulations
    • Selecting appropriate Frameworks
    • Business and Use Cases for AI
    • Privacy Considerations
  • AI-related Strategies, Policies, and Procedures
    • AI Strategy
    • Consumer v. Enterprise
    • Buy vs. Build
    • AI Policies
    • Responsible Use
    • Acceptable Use
    • AI Procedures
    • Implementation
    • Manuals
    • Ethic
  • AI Asset and Data Life Cycle Management
    • AI Asset and Data Inventory
    • Inventory management
    • Model cards
    • Data handling, classification, discovery
    • Data Augmentation and Cleaning
    • Data Storage
    • Data Protection
    • Destruction
  • AI Security Program Development and Management
    • Documented Program Plan
    • Security team, roles, responsibilities, and proficiencies
    • Alignment to existing info sec
    • Use of AI-enabled security tools in the program
    • Metrics and management
    • KRIs and KPIs for AI use with regard to the security
    • Management reporting
  • Business Continuity and Incident Response
    • Incident detection
    • Notification
    • Incident classification
    • Criticality and severity
    • Resiliency
    • Business Continuity Plan
    • Red-button requirements for compliance
    • Incident response playbooks specifically for AI
    • Break glass policies/ go no go
    • Authority
    • RTO RPO – AI perspective
    • Disaster recovery
    • Testing

Domain 2. AI Risk Management

  • AI Risk Assessment, Thresholds, and Treatment
    • Impact assessment
    • conformity assessment
    • PIAs
    • Risk documentation
    • Acceptable levels of risk
    • Treatment plans
    • KRIs and KPIs for AI us
  • AI-related Strategies, Policies, and Procedures
    • PEN test
    • Vulnerability tests
    • Red teaming
    • AI related vulnerabilities
    • Adversarial threats
    • Threat intelligence
    • AI-enabled threats/Attack chains
    • Anomalies
    • Threat landscape
    • Deep fakes
    • Insider threat
    • AI agents
  • AI Vendor and Supply Chain Management
    • Dependencies of software packages and libraries
    • Vendor due diligence and contracts
    • SLAs
    • Vendor usage
    • Accountability models
    • Provider vs. deployer
    • Third, fourth, and fifth parties
    • Ownership and intellectual property
    • Access controls
    • Liability
    • Vendor monitoring for risk and change

Domain 3. AI Technologies and Controls

  • AI Security Architecture and Design
    • Change management
    • SDL
    • Secure by design
    • Securing infrastructure as code
    • Data flows
    • Approved base models
    • Interconnectivity and interaction with architecture
  • AI Life Cycle (e.g., model selection, training, and validation)
    • Testing models interconnectivity
    • Linkages between models
    • Regression
    • Model testing
    • Progression
    • TEVV
    • Model accuracy testing and evaluation
  • Data Management Controls
    • Data collection
    • Data control
    • Data Poisoning
    • BIAS
    • Accuracy
    • Data position requirements
  • Privacy, Ethical, Trust and Safety Controls
    • Explainability
    • Privacy controls – like right to be forgotten, data subject rights
    • Consent
    • Transparency
    • Decision making
    • Fairness
    • Ethics
    • Automated decision making
    • Human in the loop
    • Trust and safety - content moderation
    • Potential harm
    • Environmental impacts
    • Data minimization and anonymization
  • Security Controls and Monitoring
    • Security monitoring metrics
    • Selecting the right controls
    • Implementing controls
    • Self-assessment of controls (CSA)
    • Control life cycle
    • Continuous monitoring
    • KPIs and KRIs for security controls and monitoring
    • Technical controls
    • Threat controls mapping
    • Security awareness training

Prerequisites

Before attending this accelerated course, you should have:

  • An active CISM or CISSP certification;
  • Proven experience in security or advisory roles;
  • Some expertise in assessing, implementing, and maintaining AI systems.

Exam info

  • Duration: 150mins
  • Number of questions: 90 Multiple-Choice Questions
  • Passing Score: 450/800
  • Domain Weighting:
    • Domain 1: AI Governance and Program Management (31%)
    • Domain 2: AI Risk Management (31%)
    • Domain 3: AI Technologies and Controls (38%)

Course Dates

Sorry, there are currently no dates available for this course. Please submit an enquiry and one of our team will contact you about potential future dates or alternative options.

FAQs

4 question

Yes, we do provide courses suitable for beginners. However, Firebrand's accelerated courses aren't easy and it's essential that you are interested and actively pursuing a career in IT.

Traditional training providers usually run their courses from 9am to 5pm. At Firebrand Training we maximise the number of learning hours to minimise the number of training days, so you’ll be back to your job as quickly as possible. You don’t waste time travelling to several courses and finding an exam centre after that.

Firebrand's accelerated courses are constantly reviewed. We ask our delegates for feedback after every course. We are official partners with leading vendors and therefore, we're provided with certification changes and updates, which we can then implement in our course delivery at a very early stage. This feedback is then analysed in view of changes or discrepancies. We will then address the topics mentioned and have a panel of subject matter experts provide us with valuable suggestions for improvement and solutions.

If you need to learn new skills and you want to be able to put them into practice quickly, then Firebrand is the right training company for you.

Our unique accelerated training method means that we are your fastest way to learn. By delivering training for up to 12 hours per day, seven days per week, with exam centres on-site, we ensure that you are trained and certified quicker than anywhere else, having spent less time out of the office away from the day job.

Can't find the answer you're looking for?

Our expert learning advisors are ready to help. Whether you need course recommendations, have technical queries, or want to discuss your learning goals, we're just a message away.

Related courses

All ISACA Courses

Train your team

Since 2001 we've trained 134,561 employees from thousands of large and small organisations, saving them more than one million hours in training time.

Learn More