This course enables participants to learn about the best practices for implementing and managing an information security management system (ISMS) as specified in ISO/IEC 27001:2013, as well as the best practices for implementing the information security controls of the eleven domains of ISO 27002.
This course enables participants to learn about the best practices for implementing and managing an information security management system (ISMS) as specified in ISO/IEC 27001:2013, as well as the best practices for implementing the information security controls of the eleven domains of ISO 27002.
This training also helps to understand how ISO/IEC 27001 and ISO 27002 relate to ISO 27003 (Guidelines for the Implementation of an ISMS), ISO 27004 (Measurement of Information Security), and ISO 27005 (Risk Management in Information Security).
Who Should Attend?
Members of an information security team
IT Professionals wanting to gain comprehensive knowledge of the main processes of an Information Security Management System (ISMS)
Staff involved in the implementation of the ISO/IEC 27001 standard
Technicians involved in operations related to an ISMS
Auditors
CxO and Senior managers are responsible for the IT governance of an enterprise and the management of its risks
Learning Objectives
Understand the elements and operations of an Information Security Management System (ISMS)
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks
Understand the approaches, standards, methods and techniques used for the implementation and management of an ISMS
At Ferro Technics, Inc., we want to become a global leader in IT security, network, and infrastructure certifications.
We ensure that all our clients are satisfied with the quality of certification training they receive, and we provide all necessary support to ensure they pass the certification exams and move ahead in their careers. We ensure that the training is relevant and includes real-life scenarios and experiences.
We create a friendly workplace for our staff and an exceptional learning environment where our clients can exchange ideas and learn from the experiences of their peers and fellow trainees.
Apart from IT security and project management, we will work with global leaders in IT technology and ensure that we are well equipped to offer training courses for technology leaders like Microsoft, Cisco, VMware, Oracle, and Citrix. We want to be a center of excellence for all major IT technologies and IT security.
Vision Statement
Our vision is to be a global leader in IT certification training, ensuring organizations have qualified employees who are certified to manage their systems efficiently and securely.
The CISA Exam Preparation course is an intensive, four-day review program designed to prepare professionals for the Certified Information Systems AuditorTM (CISA) exam.
Achieving the Certified Information Systems Security Professional (CISSP) designation is proof that the security practitioner has mastered the concepts in the CISSP Common Book of Knowledge, a compendium of best practices in the security field.
The ISI 27001 Lead Auditor training allows you to master the conduct of an audit relating to an information security management system.
Achieving the Certified Information Systems Security Professional (CISSP) designation is proof that the security practitioner has mastered the concepts in the CISSP Common Book of Knowledge, a compendium of best practices in the security field.
This course will provide students with the knowledge and skills necessary to begin the process of preparing for the CISSP exam. The class will cover the ten domains specified by (ISC)² CISSP CBK
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy