Information Technology Programs (IT)
Certified ISO/IEC 27002 Lead Manager Program
Select Other "city & date"
Certified ISO/IEC 27002 Lead Manager Program Course
Introduction:
Course Objectives:
By the end of the training, participants will be able to:
- Master the implementation of Information Security controls by adhering to the framework and principles of ISO/IEC 27002
- Master the concepts, approaches, standards, methods, and techniques required for the implementation and effective management of Information Security controls
- Comprehend the relationship between the components of Information Security controls, including responsibility, strategy, acquisition, performance, conformance, and human behavior
- Understand the importance of Information Security for the strategy of the organization
- Master the implementation of Information Security management processes
- Master the expertise to support an organization to effectively implement, manage and maintain Information Security Controls
- Master the formulation and implementation of Information Security requirements and objectives
Who Should Attend?
- Managers or consultants seeking to implement an Information Security Management System (ISMS) based on ISO/IEC 27001 and ISO/IEC 27002
- Project managers or consultants seeking to master the Information Security Management System implementation process
- Individuals responsible for Information Security, compliance, risk, and governance in an organization
- Information Security team members
- Expert advisors in information technology
- Information Security officers
- Information Security managers
- Privacy officers
- IT professionals
- CTOs, CIOs and CISOs
Course Outlines:
Introduction to Information Security controls as recommended by ISO/IEC 27002
- Section 1: Course objective and structure
- Section 2: Standard and regulatory framework
- Section 3: Fundamental Principles of Information Security
- Section 4: Information Security Management System
- Section 5: Information security policies
- Section 6: Organization of information security
Information Security requirements and objectives based on ISO/IEC 27002
- Section 7: Human resources security
- Section 8: Asset Management
- Section 9: Access Control
Monitoring, measurement, analysis, and evaluation of Information Security controls
- Section 10: Cryptography
- Section 11: Physical and Environmental Security
- Section 12: Operations Security
- Section 13: Communications security
Continual improvement of an organization's Information Security Management System performance
- Section 14: System acquisition, development, and maintenance
- Section 15: Supplier Relationships
- Section 16: Information security Incident Management
- Section 17: Information security aspects of business continuity management
- Section 18: Compliance
- Section 19: Golden Rules and Conclusion
- Section 20: Lead Manager Certification Scheme
Certification Exam