ISO 27001 2022 Information Security Management Systems (ISMS) - Awareness Course

- Description
- Curriculum

ISO/IEC 27001 information security management system (ISMS) specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. It also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in ISO/IEC 27001 are generic and are intended to be applicable to all organizations, regardless of type, size or nature. ISO 27001 2022 awareness course teaches you the process approach and the requirements and benefits of ISO 27001 2022. The essential objective of ISO 27001 2022 foundations course is to create awareness for participants regarding various basic requirements of the ISO 27001 2022 standard & impart working knowledge on how these requirements can be interpreted to suit the organization’s processes, products, people & customers.
Who Should Attend?
- Anyone involved in the planning, implementing, maintaining, supervising or auditing of an ISO 27001 2022 information security management systems
- Jobseekers interested in understanding the best information security management practices followed by the organizations
- Anyone looking to gain skills and knowledge to improve their organisation’s information security management systems
Key Benefits
- Understand the structure of ISO 27001 2022 standard
- Learn importance and benefits of an ISO 27001 2022 information security management system
- Understand key requirements, terms and definitions of ISO 27001 2022
- Understand main concepts such as risk-based thinking, process approach and Plan-Do-Check-Act
- Prepare yourself to participate in ISO 27001 2022 standards implementation process
- Understand the method of managing information security aspects, its impact and drive continual improvement
- Understand documents and records relevant to ISO 27001 2022 information security management system , critical to the products and services delivered and those required to meet customer and regulatory requirements
- Fill gaps in your professional knowledge
Learning & Evaluation Method
This is a live and interactive course. Once you purchase the course, our team will contact you to plan the training. No matter where you are located, we schedule the classes based on your convenience and time zone. You can plan to attend the training in sessions of 4 or 8 hr duration, based on how much time you can spend in a day.
Certification
There are increasing numbers of organizations, who prefer candidates those who have certain certifications from recognized programs. Certification demonstrates your commitment to superior professionalism, upholding industry standards, and continued learning. These merits can help boost your professional credibility and prestige within your own network, in your organisation, with your current clients, and when pursuing new business opportunities. After the successful completion of the course and final exam, you will be awarded with a certificate of completion issued by QGlobal. Your credentials will be made available in the global online directory and can be verified by anyone searching with the certificate number. Without doubt we can say that our training courses are well recognized and sought after by organizations across various geographies.
Buy for group Are you planning to buy this course for a group? We have the best prices for you! Select ‘Buy for Group’ option and add to the cart. You will get a discount of 60 – 75% for a group of up to 10 participants. To make a group purchase, create your group name and add individual emails of up to 10 participants. Each participant will get the access to the course materials, exam and the certificate. We will arrange one live-online session for the entire group.
Total: 205 Courses View all
Total: 205 Courses View all
-
1Introduction to standards and certification
- Purpose of standardization
- Benefits of certification
-
2Introduction to ISO 27001 2022 standards
1 Introduction to ISO 27001 standards
2 Scope of ISO 27001 standards
3 Key benefits of implementing ISO 27001 standards
-
3ISO 27001 Context of the organization
Understanding the organization and its context
Understanding the needs and expectations of interested parties
Determining the scope of the information security management system
Information security management system and its processes
-
4ISO 27001 Leadership
- Leadership and commitment
- Policy
- Organizational roles, responsibilities and authorities
-
5ISO 27001 Planning
Actions to address risks and opportunities
Information security objectives and planning to achieve them
-
6ISO 27001 Support
Resources
Competence
Awareness
Communication
Documented information
-
7ISO 27001 Operation
Operational planning and control
Information security risk assessment
Information security risk treatment
-
8ISO 27001 Performance evaluation
Monitoring, measurement, analysis and evaluation
Internal audit
Management review
-
9ISO 27001 Improvement
Nonconformity and corrective action
Continual improvement
-
10ISO 27001A5 Organizational controls
ISO 27001 2022 A5 Organizational controls
ISO 27001 2022 A5.1 Policies for information security
ISO 27001 2022 A5.2 Information security roles and responsibilities
ISO 27001 2022 A5.3 Segregation of duties
ISO 27001 2022 A5.4 Management responsibilities
ISO 27001 2022 A5.5 Contact with authorities
ISO 27001 2022 A5.6 Contact with special interest groups
ISO 27001 2022 A5.7 Threat intelligence
ISO 27001 2022 A5.8 Information security in project management
ISO 27001 2022 A5.9 Inventory of information and other associated assets
ISO 27001 2022 A5.10 Acceptable use of information and other associated assets
ISO 27001 2022 A5.11 Return of assets
ISO 27001 2022 A5.12 Classification of information
ISO 27001 2022 A5.13 Labelling of information
ISO 27001 2022 A5.14 Information transfer
ISO 27001 2022 A5.15 Access control
ISO 27001 2022 A5.16 Identity management
ISO 27001 2022 A5.17 Authentication information
ISO 27001 2022 A5.18 Access rights
ISO 27001 2022 A5.19 Information security in supplier relationships
ISO 27001 2022 A5.20 Addressing information security within supplier agreements
ISO 27001 2022 A5.21 Managing information security in the ICT supply chain
ISO 27001 2022 A5.22 Monitoring, review and change management of supplier services
ISO 27001 2022 A5.23 Information security for use of cloud services
ISO 27001 2022 A5.24 Information security incident management planning and preparation
ISO 27001 2022 A5.25 Assessment and decision on information security events
ISO 27001 2022 A5.26 Response to information security incidents
ISO 27001 2022 A5.27 Learning from information security incidents
ISO 27001 2022 A5.28 Collection of evidence
ISO 27001 2022 A5.29 Information security during disruption
ISO 27001 2022 A5.30 ICT readiness for business continuity
ISO 27001 2022 A5.31 Legal, statutory, regulatory and contractual requirements
ISO 27001 2022 A5.32 Intellectual property rights
ISO 27001 2022 A5.33 Protection of records
ISO 27001 2022 A5.34 Privacy and protection of PII
ISO 27001 2022 A5.35 Independent review of information security
ISO 27001 2022 A5.36 Compliance with policies, rules and standards for information security
ISO 27001 2022 A5.37 Documented operating procedures
-
11ISO 27001A6 People controls
ISO 27001 2022 A6 People controls
ISO 27001 2022 A6.1 Screening
ISO 27001 2022 A6.2 Terms and conditions of employment
ISO 27001 2022 A6.3 Information security awareness, education and training
ISO 27001 2022 A6.4 Disciplinary process
ISO 27001 2022 A6.5 Responsibilities after termination or change of employment
ISO 27001 2022 A6.6 Confidentiality or non-disclosure agreements
ISO 27001 2022 A6.7 Remote working
ISO 27001 2022 A6.8 Information security event reporting
-
12ISO 27001A7 Physical controls
ISO 27001 2022 A7 Physical controls
ISO 27001 2022 A7.1 Physical security perimeters
ISO 27001 2022 A7.2 Physical entry
ISO 27001 2022 A7.3 Securing offices, rooms and facilities
ISO 27001 2022 A7.4 Physical security monitoring
ISO 27001 2022 A7.5 Protecting against physical and environmental threats
ISO 27001 2022 A7.6 Working in secure areas
ISO 27001 2022 A7.7 Clear desk and clear screen
ISO 27001 2022 A7.8 Equipment siting and protection
ISO 27001 2022 A7.9 Security of assets off-premises
ISO 27001 2022 A7.10 Storage media
ISO 27001 2022 A7.11 Supporting utilities
ISO 27001 2022 A7.12 Cabling security
ISO 27001 2022 A7.13 Equipment maintenance
ISO 27001 2022 A7.14 Secure disposal or re-use of equipment
-
13ISO 27001A8 Technological controls
ISO 27001 2022 A8 Technological controls
ISO 27001 2022 A8.1 User endpoint devices
ISO 27001 2022 A8.2 Privileged access rights
ISO 27001 2022 A8.3 Information access restriction
ISO 27001 2022 A8.4 Access to source code
ISO 27001 2022 A8.5 Secure authentication
ISO 27001 2022 A8.6 Capacity management
ISO 27001 2022 A8.7 Protection against malware
ISO 27001 2022 A8.8 Management of technical vulnerabilities
ISO 27001 2022 A8.9 Configuration management
ISO 27001 2022 A8.10 Information deletion
ISO 27001 2022 A8.11 Data masking
ISO 27001 2022 A8.12 Data leakage prevention
ISO 27001 2022 A8.13 Information backup
ISO 27001 2022 A8.14 Redundancy of information processing facilities
ISO 27001 2022 A8.15 Logging
ISO 27001 2022 A8.16 Monitoring activities
ISO 27001 2022 A8.17 Clock synchronization
ISO 27001 2022 A8.18 Use of privileged utility programs
ISO 27001 2022 A8.19 Installation of software on operational systems
ISO 27001 2022 A8.20 Networks security
ISO 27001 2022 A8.21 Security of network services
ISO 27001 2022 A8.22 Segregation of networks
ISO 27001 2022 A8.23 Web filtering
ISO 27001 2022 A8.24 Use of cryptography
ISO 27001 2022 A8.25 Secure development life cycle
ISO 27001 2022 A8.26 Application security requirements
ISO 27001 2022 A8.27 Secure system architecture and engineering principles
ISO 27001 2022 A8.28 Secure coding
ISO 27001 2022 A8.29 Security testing in development and acceptance
ISO 27001 2022 A8.30 Outsourced development
ISO 27001 2022 A8.31 Separation of development, test and production environments
ISO 27001 2022 A8.32 Change management
ISO 27001 2022 A8.33 Test information
ISO 27001 2022 A8.34 Protection of information systems during audit testing