Information Security Management

Introduction

This training module tacles the security controls that an organization needs to implement to ensure that it is sensibly protecting the confidentiality, availability and integrity of assets from threats and vulnerabilities.

Who should attend

Information Security (IS) and Information Technology (IT) Directors

Networks and Systems Administrators

Information Security Auditors and Internal Auditors

Risk and Compliance Officers

IT Governance Professionals

Prerequisite

A minimum of 6-Months experience in IT or security related background

Basic knowledge on security controls

Knowledge on IT and security operations

Basic knowledge on Microsoft tools like MS word, excel, etc.

Course Description

Information Security Management System (ISMS) is a systematic approach to managing sensitive company information so that it remains secure. It encompasses people, processes, and IT systems. The ISO/IEC 27001 is the most widely used standard for ISMS.

The Course is aimed to bring awareness among the employees in the organization regarding the fundamentals of Information security management System (ISMS). This course helps you to understand the fundamentals and requirements of ISMS.

Course Outline

Introduction to Information Security

Understanding Information Security Management Systems (ISMS)

Benefits of ISMS

Introduction to ISO 27001

History of ISO 27001

ISO 27001 Management Requirements

Understanding Information Security Threats and Vulnerabilities

Risk Assessment and Management

Information Security Controls and Control Objective

Implementing Information Security Management System

Learning Assessments

Multiple choice questions

What do you get from the course?

Upon completion of this course the student will be able to understand the importance of information security in an organization and have the necessary skills and methodologies needed to implement an ISMS that is compliantwith the requirements of ISO 27001.

The Skills You’ll Gain

Management Framework
You will understand the requirements of initiating and establishing your ISMS
Risk Assessment
Learn how to perform risk assessment and risk mitigation
Security Controls
Learn the security controls and control objectives needed to protect the organization
Audit Preparation
Understand the requirements in preparing for the ISO 27001 certification

Looking for Simpler DDoS Protection?

Information Security Management