Information Security Management Systems Manager (ISO 27001)

This online course allows you to gain the necessary knowledge and skills to develop, implement and maintain the information security management system (ISMS) based on the ISO 27001:2013 standard.

Training participants will gain knowledge about various components of the information security management system (ISMS), including the following: leadership, risk management, necessary procedures, documentation, performance measurement, review by management, continuous development and improvement of the ISMS.

 

Duration

21 hours

Language

English/Ukrainian/Russia

Format

100% online

Objectives

• Understand the principles of implementing the ISMS in accordance with the requirements of ISO 27001

• Get a complete understanding of the concepts, approaches, methods and techniques necessary for the effective management of ISMS

• Gain knowledge in the scope of identifying risks and opportunities associated with ISMS

• Understand the relationship between ISMS and compliance with the requirements of various stakeholders of the organization

• Develop the knowledge and skills necessary to advise organizations on the best information security management practices

• Get information on carrying out an internal audit

• Understand the operation of ISMS in accordance with ISO 27001

• Improve the ability to analyze internal and external environments of an organization and decision-making in the context of the information security management system

Target audience

• Heads and specialists of the units responsible for information security

• Heads and specialists of IT units

• Project managers and consultants who wish to become familiar with the information security management system implementation and development processes

• Members of the ISMS implementation team at the enterprise

• Professionals who wish to gain in-depth knowledge of the ISMS

• Specialists involved in daily maintenance of the ISMS processes

• Students of specialized faculties

Document on completion

ISMS Manager Certificate,  listed in the SIC international register

Evaluation scale

60.0-100.0 

0.0-59.9

Complies

Does not comply

Thematic plan

The course program includes:

1 «Information Security Management Systems (ISO 27001)» module

The program is designed for 21 hours, including time for studying theoretical material and taking tests.

Objectives

Module 1 Information Security Management Systems (ISO 27001)

Number of hours

 1

Introduction

1,5

 2

General provisions of the standard

2,5

 3

Organization context

2

 4

Leadership

2

 5

Planning

2,5

 6

Provision (resources)

2,5

 7

Functioning

1

8

Performance evaluation

3

 9

Improvement

1

10

Security measures and their objectives

2

 

Testing

1

Detailed content of the program Module 1Information Security Management Systems (ISO 27001)
 1

Introduction:

–       Preface

–       Security solutions components

–       The main ways to communicate information

–       History of the Information Security Management System: Standards

–       Benefits of implementing ISMS

–       Basic ISMS diagram

2

General provisions of the standard:

–       Structure of the standard

–       Scope of the standard

–       Terminology

3

Organization context:

–       Understanding the organization and its context, examples

–       Understanding needs and expectations of stakeholders, examples

–       Determining the scope of ISMS, examples

–       ISMS and its processes

 .4

Leadership:

–       Leadership and obligations

–       Information security policy, examples of theses

–       Functions, responsibilities and authorities

 5

 

Planning:

–       Actions on risks and opportunities, examples

–       Information security objectives

–       Planning changes

  6

Provision (resources):

–       Competence

–       Awareness

–       Communications

–       Documented information

 7

Functioning:

–       Operational planning and management

–       IS risks evaluation

–       IS risks treatment

 .8

Performance evaluation:

–       Monitoring, measurement, review and evaluation

–       Internal audit

–       Review by management

  9

Improvement:

–       Inconsistencies and corrective actions

–       Continuous improvements

–       Security measures and their objectives

 10 Security measures and their objectives