Skip to main content

Mastering ISO 27002; A Step-by-Step Guide to Implementing Information Security Controls and Managing Risk

$199.00
When you get access:
Course access is prepared after purchase and delivered via email
How you learn:
Self-paced • Lifetime updates
Your guarantee:
30-day money-back guarantee — no questions asked
Who trusts this:
Trusted by professionals in 160+ countries
Adding to cart… The item has been added

Mastering ISO 27002: A Step-by-Step Guide to Implementing Information Security Controls and Managing Risk

Mastering ISO 27002: A Step-by-Step Guide to Implementing Information Security Controls and Managing Risk

This comprehensive course provides a step-by-step guide to implementing information security controls and managing risk, aligned with the international standard ISO 27002. Participants will receive a certificate upon completion, issued by The Art of Service.

This course is designed to be:

  • Interactive and engaging, with hands-on projects and real-world applications
  • Comprehensive, covering all aspects of ISO 27002
  • Personalized, with flexible learning options and progress tracking
  • Up-to-date, with the latest developments in information security
  • Practical, with actionable insights and expert instruction
  • High-quality, with expert instructors and high-quality content
  • Certified, with a certificate issued by The Art of Service upon completion
  • Flexible, with lifetime access and mobile-accessible learning
  • Community-driven, with a community of peers and experts

Chapter 1: Introduction to ISO 27002

  • Overview of ISO 27002
    • History and development of the standard
    • Key concepts and principles
    • Benefits of implementing ISO 27002
  • Understanding the ISO 27002 framework
    • The Plan-Do-Check-Act (PDCA) cycle
    • The ISO 27002 control objectives and controls
    • The role of risk management in ISO 27002

Chapter 2: Information Security Policies and Organization

  • Defining information security policies
    • Purpose and scope of information security policies
    • Key elements of an information security policy
    • Reviewing and updating information security policies
  • Establishing an information security organization
    • Roles and responsibilities in information security
    • Establishing an information security team
    • Defining information security responsibilities

Chapter 3: Human Resource Security

  • Understanding human resource security
    • The importance of human resource security
    • Key elements of human resource security
    • Implementing human resource security controls
  • Screening and background checks
    • Purpose and scope of screening and background checks
    • Key elements of screening and background checks
    • Implementing screening and background checks

Chapter 4: Asset Management

  • Understanding asset management
    • The importance of asset management
    • Key elements of asset management
    • Implementing asset management controls
  • Inventory and classification of assets
    • Purpose and scope of inventory and classification
    • Key elements of inventory and classification
    • Implementing inventory and classification

Chapter 5: Access Control

  • Understanding access control
    • The importance of access control
    • Key elements of access control
    • Implementing access control measures
  • User access management
    • Purpose and scope of user access management
    • Key elements of user access management
    • Implementing user access management

Chapter 6: Cryptography

  • Understanding cryptography
    • The importance of cryptography
    • Key elements of cryptography
    • Implementing cryptographic measures
  • Key management
    • Purpose and scope of key management
    • Key elements of key management
    • Implementing key management

Chapter 7: Physical and Environmental Security

  • Understanding physical and environmental security
    • The importance of physical and environmental security
    • Key elements of physical and environmental security
    • Implementing physical and environmental security measures
  • Secure areas and equipment security
    • Purpose and scope of secure areas and equipment security
    • Key elements of secure areas and equipment security
    • Implementing secure areas and equipment security

Chapter 8: Operations Security

  • Understanding operations security
    • The importance of operations security
    • Key elements of operations security
    • Implementing operations security measures
  • Change management and capacity management
    • Purpose and scope of change management and capacity management
    • Key elements of change management and capacity management
    • Implementing change management and capacity management

Chapter 9: Communications Security

  • Understanding communications security
    • The importance of communications security
    • Key elements of communications security
    • Implementing communications security measures
  • Network security,