COURSE OBJECTIVE:
Upon successfully completing the training course, participants will be able to:
• Explain the fundamental concepts of information security, cybersecurity, and privacy based on ISO/IEC 27002
• Acknowledge the relationship between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
• Interpret the ISO/IEC 27002 information security controls in the specific context of an organization
• Support an organization in effectively determining, implementing, and managing information security controls based on ISO/IEC 27002
• Explain the approaches and techniques used for the implementation and effective management of information security controls
TARGET AUDIENCE:
This training course is intended for:
• Managers or consultants seeking to enhance their knowledge regarding the implementation of information security controls in an ISMS based on ISO/IEC 27001
• Individuals responsible for maintaining information security, compliance, risk, or governance in an organization
• IT professionals or consultants seeking to enhance their knowledge in information security
• Members of an ISMS implementation or information security team
COURSE PREREQUISITES:
The main requirements for participating in this training course are having a fundamental understanding of ISO/IEC 27002 and comprehensive knowledge of information security controls.
COURSE CONTENT:
• Day 1: Introduction to ISO/IEC 27002
• Day 2: Information security roles and responsibilities, people controls, and physical controls
• Day 3: Information security assets, access controls, and protection of information systems and networks
• Day 4: Information security incident management and testing and monitoring of information security controls based on ISO/IEC 27002
• Day 5: Certification exam
FOLLOW ON COURSES:
Not available. Please contact.