The background and general introduction to Information Security/ Cyber Security issues, the Challenge of sustainable development and strategic business drivers. The background to development of the Information Security management standards and the current status of the ISO 27001:2022
Course Content & Learning Outcome/ Objective :
The background and general introduction to Information Security/ Cyber Security issues, the Challenge of sustainable development and strategic business drivers.
The background to development of the Information Security management standards and the current status of the ISO 27001:2022
To equip participants with the knowledge and skills needed to assess and report on the conformance and effective implementation of an Information Security management system in accordance with ISO 19011.
Describe the responsibilities of an internal auditor and describe the role of internal audit in the maintenance and improvement of management systems, in accordance with ISO 19011
Risk Management Process
93 Annexure Controls of ISO 27001:2022
Explain the purpose and structure of ISO 27001, and explain the principles, process and selected techniques used for the assignment and management of Information / Cyber security/ Privacy
Plan and prepare for internal audit gather audit evidence through observation, interview and sampling of documents and records.
Write factual audit reports that help to improve the effectiveness of the management system.
Suggest ways in which the effectiveness of corrective action might be verified
Overview of ISO 27001:2022
Purpose and requirements of internal auditing of ISMS
ISMS standards and certification body requirements for internal auditing
Environmental effects and training needs of ISMS auditors
Preparation, performance, objective evidence, questioning and communication
Audit findings, reporting, corrective actions, follow-up and close-out and management review
The background and general introduction to Information Security/ Cyber Security issues, the Challenge of sustainable development and strategic business drivers.
The background to development of the Information Security management standards and the current status of the ISO 27001:2022
Key elements of Information Security standard including 93 Annexure Controls of ISO 27001:2022
Relevant International Accreditation Forum (IAF) and European cooperation for Accreditation (EA) interpretations and guidelines with which certification bodies are required to comply
Types of ISMS audits and assessments including technical, functional and management systems and relevant audit methodologies.
Triennial cycle and stages of the certification process
Cyber Security legislation relevant to international, national, regional and local legislation.
Determination of risk and opportunities for Information Security Management System.
Relevant International Accreditation Forum (IAF) and European cooperation for Accreditation (EA) interpretations and guidelines with which certification bodies are required to comply
Types of ISMS audits and assessments including technical, functional and management systems and relevant audit methodologies.
Triennial cycle and stages of the certification process
Cyber Security legislation relevant to international, national, regional and local legislation.
Determination of risk and opportunities for Information Security Management System.
Mission Statement
“To provide value added certification & training services to organisations globally which empower them to deliver sustained excellence, process improvement & increased profitability”.
Vision Statement
“To be recognised globally as the Certification Body of Choice, helping our customers achieve their goals and objectives while delivering progress through certification and training services”
Our Values
Customer Progress
Strong Supportive Relationships
Work Collaboratively with all stakeholders
Clear and Responsive Communications
Provide Efficient and transparent services through our world class technology systems
The CISSP certification is a way to verify your experience in the eight domains of the Cybersecurity Book of Knowledge. You need five years of paid job experience in two or more of the eight domains to be eligible for the certification.
Certified in Risk and Information Systems Control or CRISC is now one of the most highly sought-after qualifications. It is the only certification that prepares and enables IT professionals for the unique challenges of IT and enterprise risk management, and positions them to become strategic partne...
Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the International Information System Security Certification Consortium, also known as (ISC)².
COBIT® is a framework for the enterprise governance and management of information and technology (I&T) that supports enterprise goal achievement. This foundation course is intended for those new to COBIT who are interested in achieving the latest foundation certificate as well as current COBIT 5
This Certified ISO27001 Practitioners training course will provide delegates with the requirements and principles of ISO/IEC 27001, with an awareness of the issues and challenges involved in implementing an information security management system.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy