Implementation Training
The Salted Hash Security 27001 Implementation Training enables attendees to develop the necessary expertise to support their organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
During this training course, you will also gain a thorough understanding of the best practices of Information Security Management Systems to secure the organization`s sensitive information and improve the overall performance and effectiveness.
The course is delivered through 9 Modules allowing attendees to learn at a pace that works for them with the benefit of an experienced ISO 27001 implementer leading the training sessions.
Course Syllabus
Module 01: Overview
What is information? | What is information Security?
The ISO 27k family | ISO 27001 Overview v ISMS Documentation
The Requirements | The Controls
Module 02: Requirements 4 & 5
4.1 Understanding the organisation and its context
4.2 Understanding the Needs and Expectations of Interested Parties
4.3 Determining The Scope Of The ISMS
4.4 Information security management system
5.2 Information Security Policy
5.3 Organisational roles, responsibilities and authorities
Module 03: Requirements 6 & 7
6.1.1 General | 6.1.2 Information security risk assessment
6.1.3 Information security risk treatment
6.2 Information security objectives and planning to achieve them
7.1 Resources | 7.2 Competence
7.3 Awareness | 7.4 Communication
Module 04: Requirements 8, 9 & 10
8.1 Operational planning and control
8.2 Information security risk assessment
8.3 Information security risk treatment
9.1 Monitoring, measurement, analysis and evaluation
9.2 Internal audit | 9.3 Management review
10 Improvement | 10.1 Nonconformity and corrective action
10.2 Continual improvement and authorities
Module 05: Annex A5, A6 & A7
A.5.1 Management direction for information security
A.6.1 Internal organization
A.6.2 Mobile devices and teleworking
A.7.1 Prior to employment | A.7.2 During employment
A.7.3 Termination and change of employment
Module 06: Annex A8, A9 & A10
A.8.1 Responsibility for assets | A.8.2 Information classification
A.8.3 Media handling
A.9.1 Business requirements of access control
A.9.2 User access management | A.9.3 User responsibilities
A.9.4 System & application access control
A.10.1 Cryptography controls
Module 07: Annex A11 & A12
A.11.1 Secure areas | A.11.2 Equipment
A.12.1 Operational procedures and responsibilities
A.12.2 Protection from malware
A.12.3 Backup | A.12.4 Logging and monitoring
A.12.5 Control of operational software
A.12.6 Technical vulnerability management
A.12.7 Information systems audit considerations
Module 08: Annex A11 & A12
A.13.1 Network security management
A.13.2 Information transfer
A.14.1 Security requirements of information systems
A.14.2 Security in development and support processes
A.14.3 Test data
Module 09: Annex A15, A16, A17 & A18
A.15.1 Information security in supplier relationships
A.15.2 Supplier service delivery management
A.16.1 Management of information security incidents and improvements
A.17.1 Information security continuity
A.17.2 Redundancies
A.18.1 Compliance with legal and contractual requirements
A.18.2 Information
Source:
https://www.infosec.uno/iso27001-training