Information Security Management

by DataCouch Claim Listing

This is an intermediate level course which is a fit for everyone who are part of the IT Infrastructure team, Information Security Management team, project management, centralized corporate teams who manage & monitor different business teams, in-house legal support teams etc.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

DataCouch Logo

img Duration

2 Days

Course Details

This is an intermediate level course which is a fit for everyone who are part of the IT Infrastructure team, Information Security Management team, project management, centralized corporate teams who manage & monitor different business teams, in-house legal support teams etc.

The purpose of this course is to train individuals on information security risk assessment, implementation of  information security management systems as per best practices or as per recommended security standards like ISO 27001, NIST CSF etc and how to conduct information security audits.

This course can be customized as per requirement either as information security implementation or purely on auditing or a combination of both.

 

Curriculum:

  • A unique customized course suitable for both ISMS Implementers and Auditors
  • Risk Management
  • Risk Assessment Frameworks
  • NIST Cyber Security Framework
  • Information Security Audit as per best practices and commonly followed InfoSec standards
  • Mohali Branch

    #7, LOWER GROUND, SBC EL COMMERCIO CITY CENTRE, Mohali

Check out more ISMS (Information Security Management System) courses in India

Smart Tech Junior Logo

Cyber Security

Cyber Security Course is offered by Smart Tech Junior for all skill level. Learn from the best coding experts. We work the professional coders to deliver the best teaching to your kids. 

by Smart Tech Junior [Claim Listing ]
Adroit Information Technology Academy Logo

Check Point Certified Security Administration R81.20 (CCSA)

R80.20 CCSA Provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.  This course is designed for technical professionals, who support, install, deploy, or administer Check Point Software Blades.

by Adroit Information Technology Academy [Claim Listing ]
ABC Training Logo

Cyber Security Analyst

Have you been nurturing a dream of mastering cyber security? Do you wish to be professionally in all the state-of-the-art counter-measure protocols against the most sophisticated of cyber security threats? Then the CompTIA CySA+ course is a certification you cannot afford to miss.

by ABC Training [Claim Listing ]
  • Price
  • Start Date
  • Duration
hint (Institute of Hardware and Network Technology) Logo

CISSP

Certified Information Systems Security Professional (CISSP) Certification is one of the most demanded certifications in information security. It is an independent information security certification governed by the reputed International Information Systems Security Certification Consortium (ISC)2.

by hint (Institute of Hardware and Network Technology) [Claim Listing ]
  • Price
  • Start Date
  • Duration
Blue Shell Technologies Logo

CRISC

Organizations face rising cybersecurity and information system risks in today’s rapidly changing digital environment. Professionals with specialized training and knowledge are in high demand to manage these risks effectively.

by Blue Shell Technologies [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy