Setting up an ISMS can be as simple or as sophisticated as your organization needs it to be. However, even knowing where to start when considering setting up an ISMS can be challenging. In this course, our expert will explain the requirements of the current standard to help you understand how it could apply to your organization and the potential benefits of adopting it. You will therefore be better prepared to carry out an implementation of an ISMS that conforms to the current standard, as the background, updated concepts, principles, terms and definitions used in ISO/IEC 27001:2013 are fully explained and discussed. The requirements course will also help you understand how the standard works in preparation for attending the internal and lead auditing training courses.
Gain an understanding of the fundamental theories
Models practices of information security management for both large and small organization
Understand the risk management process
Possesses good understanding of security planning and incident management process
Possess insight of the technological innovation process in IT security and its effect on security management
Basic knowledge of the standards in information security management
Introduction to System Thinking and Scientific Management
Cultural, Organization and Behavior theories used information security management organization.
Legal and Ethical Aspects of Information and Privacy Management.
Overview of current information security management standards and practices
Basic Micro and Macro Theory of Information Security
Introduction to Risk, Threat and vulnerability Modeling
Information Security Management and Security Awareness education and training
Overview of Security Planning and Incident Management