Menu Close

ISO 27001 Training | Salted Hash Security

Implementation Training

The Salted Hash Security 27001 Implementation Training enables attendees to develop the necessary expertise to support their organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.

During this training course, you will also gain a thorough understanding of the best practices of Information Security Management Systems to secure the organization`s sensitive information and improve the overall performance and effectiveness.

The course is delivered through 9 Modules allowing attendees to learn at a pace that works for them with the benefit of an experienced ISO 27001 implementer leading the training sessions.

Course Syllabus

Module 01: Overview

What is information? | What is information Security?
The ISO 27k family | ISO 27001 Overview v ISMS Documentation
The Requirements | The Controls

Module 02: Requirements 4 & 5

4.1 Understanding the organisation and its context
4.2 Understanding the Needs and Expectations of Interested Parties
4.3 Determining The Scope Of The ISMS
4.4 Information security management system
5.2 Information Security Policy
5.3 Organisational roles, responsibilities and authorities

Module 03: Requirements 6 & 7

6.1.1 General | 6.1.2 Information security risk assessment
6.1.3 Information security risk treatment

6.2 Information security objectives and planning to achieve them
7.1 Resources | 7.2 Competence
7.3 Awareness | 7.4 Communication

Module 04: Requirements 8, 9 & 10

8.1 Operational planning and control
8.2 Information security risk assessment
8.3 Information security risk treatment
9.1 Monitoring, measurement, analysis and evaluation
9.2 Internal audit | 9.3 Management review
10 Improvement | 10.1 Nonconformity and corrective action
10.2 Continual improvement and authorities

​ Module 05: Annex A5, A6 & A7

A.5.1 Management direction for information security
A.6.1 Internal organization
A.6.2 Mobile devices and teleworking
A.7.1 Prior to employment | A.7.2 During employment
A.7.3 Termination and change of employment

Module 06: Annex A8, A9 & A10

A.8.1 Responsibility for assets | A.8.2 Information classification
A.8.3 Media handling
A.9.1 Business requirements of access control
A.9.2 User access management | A.9.3 User responsibilities
A.9.4 System & application access control
A.10.1 Cryptography controls

Module 07: Annex A11 & A12

A.11.1 Secure areas | A.11.2 Equipment
A.12.1 Operational procedures and responsibilities
A.12.2 Protection from malware
A.12.3 Backup | A.12.4 Logging and monitoring
A.12.5 Control of operational software
A.12.6 Technical vulnerability management
A.12.7 Information systems audit considerations

Module 08: Annex A11 & A12

A.13.1 Network security management
A.13.2 Information transfer
A.14.1 Security requirements of information systems
A.14.2 Security in development and support processes
A.14.3 Test data

Module 09: Annex A15, A16, A17 & A18

A.15.1 Information security in supplier relationships
A.15.2 Supplier service delivery management
A.16.1 Management of information security incidents and improvements
A.17.1 Information security continuity
A.17.2 Redundancies
A.18.1 Compliance with legal and contractual requirements
A.18.2 Information

Source:

https://www.infosec.uno/iso27001-training

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *