COURSE OBJECTIVE:
By successfully completing this training course, you will be able to:
• Explain the fundamental concepts of information security, cybersecurity, and privacy based on ISO/IEC 27002
• Discuss the relationship between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
• Support an organization in effectively determining, implementing, and managing information security controls based on ISO/IEC 27002
TARGET AUDIENCE:
This training course is intended for:
• Managers involved in the implementation of an information security management system (ISMS) based on ISO/IEC 27001
• IT professionals and consultants seeking to enhance their knowledge in information security
• Members of an ISMS implementation or information security team
• Individuals responsible for information security in an organization
COURSE PREREQUISITES:
The main requirements for participating in this training course are having a fundamental understanding of ISO/IEC 27002 and comprehensive knowledge of information security.
COURSE CONTENT:
• Day 1: Introduction to ISO/IEC 27002
• Day 2: Information assets, people controls, physical controls, and operational security controls
• Day 3: Information security incident management and monitoring of information security controls and certification exam
FOLLOW ON COURSES:
Not available. Please contact.