The objective of this training course is to enable participants in understanding the principle and concepts of ISO 27001.
The objective of this training course is to enable participants in understanding the principle and concepts of ISO 27001.
Who Should Attend?
ISO Steering Committee / Management Representative (MR) of the company, Head of Department, IT and security department, and personnel who are keen in understand the ISO 27001.
Course Outlines:
Overview of ISO 27001:2013
Requirement of ISO 27001:2013
Definition of Terms of ISO 27001
Interpretation of Annex A, 14 elements
Always wanted to pick up some dazzling Photoshop skills? Now's the time.
Managing IT as an organisational resource is essential for good business value and risk management. Control Objectives for Information and Related Technology (COBIT) provides best practices in IT governance for IT professionals and managers.
The course offers a job-related approach to the security process, while providing a framework to prepare for CISSP certification. CISSP is the premier certification for today’s information systems security professional.
Through engaging courses led by highly experienced CISA faculty, aspiring entrepreneurs gain the knowledge, technical skills and skills needed to meet the challenging challenges of today’s industry.
How to design and implement an effective information security management system. How to protect your interests and those of your customers. The stages of a formal information risk assessment
Performing IT security audits at the enterprise level can be an overwhelming task. It is difficult to know where to start and which controls should be audited first. Audits often focus on things that are not as important, wasting precious time and resources.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy