About this Course
Do you know how to protect and maintain the information security of your organizatoin? Are you interested to know how does the organization protect their information and data? The solutions include:
Overview of ISMS requirements
- ISMS scope, objectives and policy
- Management review, e.g. input and output
- Internal audit(s)
- Monitoring and Review process
- Continual improvement process
Overview to Information Security Risk Management process
Overview to ISMS Control Objectives and Controls to reduce the risk
- Controls for information security policy, e.g. access control policy, password use…
- Controls for organisational information security, e.g internal, 3rd-Party
- Controls for asset management, e.g. customer database
- Controls for human resource security, e.g. personnel screening
- Controls for environmental and physical security, e.g. entrance control,
- Communications and operational security, e.g. network use policy
- Access controls, e.g. accounting, authentication, authorization,
- Controls for information system acquisition, development and maintenance, e.g. software system security requirements, maintenance
- Controls for information security incident management, e.g. event monitoring, reporting and analysis
- Controls for business continuity management, e.g. BCPs (business continuity plan(s)) for IT srevices, recovery exercises
- Controls for legal and technical compliant,e.g. IPR (intellecture property rights), Personal Data Protection Law
This Professional CERT certified course will introduce you ”WHAT” are the best practices of information security management according to latest international standard – ISO/IEC 27001 within ONE day.
COURSE CONTENTS
A combination of tutorials and syndicate exercises including the following topics:
- ISMS framework and requirements
- ISMS related standards and best practices
- How to establish an Information Security Management Systems (ISMS)
- Information security risk management process
- Information security incident handling
- Information security business continuity
- Legal and Technical compliance
BENEFITS TO YOUR ORGANISATION
- Improve the information security management skills
- Improve the overall awareness of information security management on technical and legal compliance
- Improve the overall information security management concept of the organisation
This course is suitable for:
- Those who wish to understand the good practice of Information Security Management System (ISMS) in accordance with ISO/IEC 27001
- Those involve in the usage of IT operations, administration and management
- Consultants who wish to provide advice on ISO/IEC 27001 implementation
- Information security, legal compliance and Management professionals
- No prior knowledge is required.
Course Rating
- /5 from users
Course Enquiry
Course Info
- Course Provider JFAM SYNERGY (PTE.) LIMITED
- Course Category Business
- Course Price n/a
Comments