INFORMATION SECURITY

Cryptography
Theory

Banking and Financial
Systems

Network Operations
Security

P2P Payment
Authentication

Cryptographically
Secure PRNGs

Key Exchange
Mechanisms

Applied
Cryptography

Secure Distributed
Architectures

Assurance via
Non Repudiation

Multidimensional
Obfuscation

Advanced Neural
Networks

Computational
Infeasibility

Biometric
Authentication

Application
Security

Disaster Recovery
BCP

Financial Network
Security

Law and Forensic
Investigation

STRATEGY AND ARCHITECTURE

Strategy and Planning

Strategic planning

ITPS

5
6
7
Enterprise & business architecture

STPL

5
6
7
Emerging technology monitoring

EMRG

4
5
6
Investment appraisal

INVA

4
5
6
Sustainability

SUST

4
5
6
Information systems coordination

ISCO

6
7
Solution architecture

ARCH

4
5
6
Research

RSCH

2
3
4
5
6
Financial management

FMIT

4
5
6
Continuity management

COPL

2
3
4
5
6
Information management

IRMG

4
5
6
7
Innovation

INOV

5
6
7
Demand management

DEMM

5
6
Measurement

MEAS

3
4
5
6

Security and privacy

Information security

SCTY

3
4
5
6
7
Vulnerability research

VURE

3
4
5
6
Information assurance

INAS

3
4
5
6
7
Threat intelligence

THIN

2
3
4
5
6
Personal data protection

PEDP

5
6

Governance, risk and compliance

Governance

GOVN

6
7
Quality management

QUMG

3
4
5
6
7
Risk management

BURM

3
4
5
6
7
Quality assurance

QUAS

3
4
5
6
Audit

AUDT

3
4
5
6
7

Advice and guidance

Consultancy

CNSL

4
5
6
7
Specialist advice

TECH

4
5
6
Methods and tools

METL

3
4
5
6

CHANGE & TRANSFORMATION

CHANGE IMPLEMENTATION

Portfolio management

POMG

5
6
7
Portfolio, programme & project support

PROF

2
3
4
5
6
Programme management

PGMG

6
7
Project management

PRMG

4
5
6
7

Change analysis

Business situation analysis

BUSA

3
4
5
6
Business modelling

BSMO

2
3
4
5
6
Feasibility assessment

FEAS

3
4
5
6
Acceptance testing

BPTS

2
3
4
5
6
Requirements definition, management

REQM

2
3
4
5
6

Change planning

Business process improvement

BPRE

5
6
7
Organisational change management

CIPM

3
4
5
6
Organisational capability development

OCDV

5
6
7
Benefits management

BENM

5
6
Organisation design & implementation

ORDI

4
5
6
7

DEVELOPMENT AND IMPLEMENTATION

SYSTEMS DEVELOPMENT

Product management

PROD

3
4
5
6
Systems design

DESN

3
4
5
6
Hardware design

HWDE

3
4
5
6
Testing

TEST

1
2
3
4
5
6
Safety assessment

SFAS

4
5
6
Systems development management

DLMG

5
6
7
Software design

SWDN

2
3
4
5
6
Programming / Software development

PROG

2
3
4
5
6
Real-time/embedded systems devt.

RESD

2
3
4
5
6
Radio frequency engineering

RFEN

2
3
4
5
6
Systems & Software life cycle engineering

SLEN

4
5
6
7
Network design

NTDS

3
4
5
6
Systems integration and build

SINT

2
3
4
5
6
Safety engineering

SFEN

3
4
5
6
Animation development

ADEV

3
4
5
6

Data and analytics

Data management

DATM

4
5
6
Data engineering

DESN

2
3
4
5
6
Machine learning

MLNG

2
3
4
5
6
Data modelling and design

DTAN

2
3
4
5
Database administration

DBAD

2
3
4
5
Business intelligence

BINT

2
3
4
5
Database design

DBDS

3
4
5
Data science

DATS

2
3
4
5
6
7
Data visualisation

VISL

3
4
5

User experience

User research

URCH

3
4
5
6
User experience evaluation

USEV

2
3
4
5
6
User experience analysis

UNAN

3
4
5
User experience design

HCEV

3
4
5
6

Content management

Content authoring

INCA

1
2
3
4
5
6
Content publishing

ICPM

1
2
3
4
5
6
Knowledge management

KNOW

2
3
4
5
6
7

Computational science

Scientific modelling

SCMO

4
5
6
7
Numerical analysis

NUAN

4
5
6
7
High-performance computing

HPCC

4
5
6
7

DELIVERY AND OPERATION

Technology management

Technology service management

ITMG

5
6
7
System software

SYSP

3
4
5
Configuration management

CFMG

2
3
4
5
6
Facilities management

DCMA

2
3
4
5
6
Application support

ASUP

2
3
4
5
Network support

NTAS

2
3
4
5
Release and deployment

RELM

3
4
5
6
IT infrastructure

ITOP

1
2
3
4
5
Systems installation and removal

HSIN

1
2
3
4
5
Storage management

STMG

3
4
5
6

Service management

Service level management

SLMO

2
3
4
5
6
7
Capacity management

CPMG

4
5
6
Change control

CHMG

2
3
4
5
6
Service catalogue management

SCMG

3
4
5
Incident management

USUP

2
3
4
5
6
Asset management

ASMG

2
3
4
5
6
Availability management

AVMT

4
5
6
Problem management

PBMG

3
4
5
Service acceptance

SEAC

4
5
6

SERVICE OPERATION

Security operations

SCAD

1
2
3
4
5
6
Penetration testing

PENT

3
4
5
6
Vulnerability assessment

VUAS

2
3
4
5
Digital forensics

DGFS

3
4
5
6

People and skills

People management

Performance management

PEMT

4
5
6
Professional development

PDSV

4
5
6
Employee experience

EEXP

4
5
6
Workforce planning

WFPL

4
5
6
Organisational facilitation

OFCL

4
5
6
Resourcing

RESC

3
4
5
6

Skills management

Learning & development management

ETMG

3
4
5
6
7
Competency assessment

LEDA

3
4
5
6
Subject formation

SUBF

4
5
6
7
Learning design and development

TMCR

3
4
5
Certification scheme operation

CSOP

2
3
4
5
6
Learning delivery

ETDL

2
3
4
5
Teaching

TEAC

2
3
4
5
6
7

RELATIONSHIPS AND ENGAGEMENT

STAKEHOLDER MANAGEMENT

Sourcing

SORC

2
3
4
5
6
7
Stakeholder relationship management

RLMT

4
5
6
7
Supplier management

SUPP

2
3
4
5
6
7
Customer service support

CSMG

1
2
3
4
5
6
Contract management

ITCM

3
4
5
6
7
Business administration

ADMN

1
2
3
4
5
6

SALES AND MARKETING

Marketing

MKTG

2
3
4
5
6
Selling

SALE

3
4
5
6
Sales support

SSUP

1
2
3
4
5
6