Skip to main content

Mastering ISO 27002; A Step-by-Step Guide to Information Security Management

$199.00
When you get access:
Course access is prepared after purchase and delivered via email
How you learn:
Self-paced • Lifetime updates
Your guarantee:
30-day money-back guarantee — no questions asked
Who trusts this:
Trusted by professionals in 160+ countries
Adding to cart… The item has been added

Mastering ISO 27002: A Step-by-Step Guide to Information Security Management

Mastering ISO 27002: A Step-by-Step Guide to Information Security Management

This comprehensive course is designed to provide participants with a thorough understanding of the principles and practices of information security management, as outlined in the ISO 27002 standard. Upon completion of this course, participants will receive a certificate issued by The Art of Service.



Course Overview

This course is interactive, engaging, comprehensive, personalized, up-to-date, practical, and focused on real-world applications. Our expert instructors will guide you through the course material, providing high-quality content, actionable insights, and hands-on projects.



Course Features

  • Interactive: Engage with the course material through interactive lessons and activities.
  • Engaging: Learn through real-world examples and case studies.
  • Comprehensive: Cover all aspects of information security management, as outlined in the ISO 27002 standard.
  • Personalized: Receive personalized feedback and support from our expert instructors.
  • Up-to-date: Stay current with the latest developments in information security management.
  • Practical: Apply your knowledge through hands-on projects and real-world applications.
  • Real-world applications: Learn how to apply the principles of information security management in real-world scenarios.
  • High-quality content: Receive high-quality course materials, including video lessons, readings, and activities.
  • Expert instructors: Learn from experienced instructors with expertise in information security management.
  • Certification: Receive a certificate upon completion of the course, issued by The Art of Service.
  • Flexible learning: Access the course material at any time, from any location.
  • User-friendly: Navigate the course material with ease, using our user-friendly online platform.
  • Mobile-accessible: Access the course material on your mobile device, at any time.
  • Community-driven: Connect with other participants and instructors through our online community.
  • Actionable insights: Receive actionable insights and feedback from our expert instructors.
  • Hands-on projects: Apply your knowledge through hands-on projects and real-world applications.
  • Bite-sized lessons: Learn through bite-sized lessons, designed to fit your busy schedule.
  • Lifetime access: Access the course material for a lifetime, at no additional cost.
  • Gamification: Engage with the course material through interactive games and activities.
  • Progress tracking: Track your progress through the course material, at any time.


Course Outline

Module 1: Introduction to Information Security Management

  • Defining information security management
  • Understanding the importance of information security management
  • Overview of the ISO 27002 standard

Module 2: Information Security Policies

  • Defining information security policies
  • Developing information security policies
  • Implementing information security policies

Module 3: Organization of Information Security

  • Defining the organization of information security
  • Establishing an information security management system
  • Defining roles and responsibilities

Module 4: Human Resource Security

  • Defining human resource security
  • Screening and hiring employees
  • Training and awareness programs

Module 5: Asset Management

  • Defining asset management
  • Identifying and classifying assets
  • Protecting assets

Module 6: Access Control

  • Defining access control
  • Implementing access control measures
  • Managing access control

Module 7: Cryptography

  • Defining cryptography
  • Types of cryptography
  • Implementing cryptography

Module 8: Physical and Environmental Security

  • Defining physical and environmental security
  • Securing the physical environment
  • Protecting against environmental threats

Module 9: Operations Security

  • Defining operations security
  • Managing operations security
  • Implementing operations security measures

Module 10: Communications Security

  • Defining communications security
  • Securing communications
  • Implementing communications security measures

Module 11: System Acquisition, Development and Maintenance

  • Defining system acquisition, development and maintenance
  • Securing system development
  • Implementing system acquisition, development and maintenance measures

Module 12: Supplier Relationships

  • Defining supplier relationships
  • Managing supplier relationships
  • Implementing supplier relationship measures

Module 13: Information Security Incident Management

  • Defining information security incident management
  • Managing information security incidents
  • Implementing information security incident management measures

Module 14: Information Security Aspects of Business Continuity Management

  • Defining business continuity management
  • Managing business continuity
  • Implementing business continuity measures

Module 15: Compliance

  • Defining compliance
  • Managing compliance
  • Implementing compliance measures


Certification

Upon completion of this course, participants will receive a certificate issued by The Art of Service.

,