Information Security Management Systems Manager (ISO 27001)
This online course allows you to gain the necessary knowledge and skills to develop, implement and maintain the information security management system (ISMS) based on the ISO 27001:2013 standard.
Training participants will gain knowledge about various components of the information security management system (ISMS), including the following: leadership, risk management, necessary procedures, documentation, performance measurement, review by management, continuous development and improvement of the ISMS.

Duration
21 hours

Language
English/Ukrainian/Russia

Format
100% online
Objectives
• Understand the principles of implementing the ISMS in accordance with the requirements of ISO 27001
• Get a complete understanding of the concepts, approaches, methods and techniques necessary for the effective management of ISMS
• Gain knowledge in the scope of identifying risks and opportunities associated with ISMS
• Understand the relationship between ISMS and compliance with the requirements of various stakeholders of the organization
• Develop the knowledge and skills necessary to advise organizations on the best information security management practices
• Get information on carrying out an internal audit
• Understand the operation of ISMS in accordance with ISO 27001
• Improve the ability to analyze internal and external environments of an organization and decision-making in the context of the information security management system
Target audience
• Heads and specialists of the units responsible for information security
• Heads and specialists of IT units
• Project managers and consultants who wish to become familiar with the information security management system implementation and development processes
• Members of the ISMS implementation team at the enterprise
• Professionals who wish to gain in-depth knowledge of the ISMS
• Specialists involved in daily maintenance of the ISMS processes
• Students of specialized faculties
Document on completion
ISMS Manager Certificate, listed in the SIC international register
Evaluation scale
60.0-100.0
0.0-59.9
Complies
Does not comply
Thematic plan
The course program includes:
1 «Information Security Management Systems (ISO 27001)» module
The program is designed for 21 hours, including time for studying theoretical material and taking tests.
Objectives
Module 1 Information Security Management Systems (ISO 27001)
Number of hours
1 |
Introduction |
1,5 |
2 |
General provisions of the standard |
2,5 |
3 |
Organization context |
2 |
4 |
Leadership |
2 |
5 |
Planning |
2,5 |
6 |
Provision (resources) |
2,5 |
7 |
Functioning |
1 |
8 |
Performance evaluation |
3 |
9 |
Improvement |
1 |
10 |
Security measures and their objectives |
2 |
|
Testing |
1 |
Detailed content of the program Module 1Information Security Management Systems (ISO 27001)
1 |
Introduction: – Preface – Security solutions components – The main ways to communicate information – History of the Information Security Management System: Standards – Benefits of implementing ISMS – Basic ISMS diagram |
2 |
General provisions of the standard: – Structure of the standard – Scope of the standard – Terminology |
3 |
Organization context: – Understanding the organization and its context, examples – Understanding needs and expectations of stakeholders, examples – Determining the scope of ISMS, examples – ISMS and its processes |
.4 |
Leadership: – Leadership and obligations – Information security policy, examples of theses – Functions, responsibilities and authorities |
5
|
Planning: – Actions on risks and opportunities, examples – Information security objectives – Planning changes |
6 |
Provision (resources): – Competence – Awareness – Communications – Documented information |
7 |
Functioning: – Operational planning and management – IS risks evaluation – IS risks treatment |
.8 |
Performance evaluation: – Monitoring, measurement, review and evaluation – Internal audit – Review by management |
9 |
Improvement: – Inconsistencies and corrective actions – Continuous improvements – Security measures and their objectives |
10 | Security measures and their objectives |