Skip to main content

Mastering ISO/IEC 27002;2013 - A Step-by-Step Guide to Implementing Information Security Controls

$199.00
When you get access:
Course access is prepared after purchase and delivered via email
How you learn:
Self-paced • Lifetime updates
Your guarantee:
30-day money-back guarantee — no questions asked
Who trusts this:
Trusted by professionals in 160+ countries
Toolkit Included:
Includes a practical, ready-to-use toolkit with implementation templates, worksheets, checklists, and decision-support materials so you can apply what you learn immediately - no additional setup required.
Adding to cart… The item has been added

Mastering ISO/IEC 27002:2013 - A Step-by-Step Guide to Implementing Information Security Controls



Course Overview

This comprehensive course provides a step-by-step guide to implementing information security controls based on the ISO/IEC 27002:2013 standard. Participants will learn how to design, implement, and maintain a robust information security management system (ISMS) that protects their organization's sensitive data and assets.



Course Objectives

  • Understand the principles and concepts of information security management
  • Learn how to design and implement an ISMS based on ISO/IEC 27002:2013
  • Understand the requirements and controls of ISO/IEC 27002:2013
  • Develop the skills and knowledge needed to implement and maintain an ISMS
  • Prepare for certification exams related to ISO/IEC 27002:2013


Course Outline

Module 1: Introduction to Information Security Management

  • Defining information security management
  • Understanding the importance of information security
  • Overview of ISO/IEC 27002:2013
  • Key concepts and principles of information security management

Module 2: Information Security Policies and Organization

  • Defining information security policies
  • Establishing an information security organization
  • Roles and responsibilities in information security
  • Information security awareness and training

Module 3: Human Resource Security

  • Pre-employment screening and background checks
  • Employment contracts and confidentiality agreements
  • Information security awareness and training for employees
  • Termination and post-employment procedures

Module 4: Asset Management

  • Defining and classifying assets
  • Asset ownership and responsibility
  • Asset classification and labeling
  • Asset handling and disposal

Module 5: Access Control

  • Defining access control
  • Access control policies and procedures
  • User access management
  • System and application access control

Module 6: Cryptography

  • Defining cryptography
  • Cryptography policies and procedures
  • Key management
  • Data encryption and decryption

Module 7: Physical and Environmental Security

  • Defining physical and environmental security
  • Physical security controls
  • Environmental security controls
  • Equipment security

Module 8: Operations Security

  • Defining operations security
  • Change management
  • Capacity management
  • IT service continuity management

Module 9: Communications Security

  • Defining communications security
  • Network security
  • Internet security
  • Email security

Module 10: System Acquisition, Development and Maintenance

  • Defining system acquisition, development and maintenance
  • System development lifecycle
  • System testing and validation
  • System deployment and maintenance

Module 11: Supplier Relationships

  • Defining supplier relationships
  • Supplier selection and evaluation
  • Supplier contracts and agreements
  • Supplier monitoring and review

Module 12: Information Security Incident Management

  • Defining information security incident management
  • Incident response planning
  • Incident detection and reporting
  • Incident response and recovery

Module 13: Information Security Aspects of Business Continuity Management

  • Defining business continuity management
  • Business impact analysis
  • Business continuity planning
  • Business continuity testing and review

Module 14: Compliance

  • Defining compliance
  • Compliance with laws and regulations
  • Compliance with industry standards
  • Compliance monitoring and review


Course Features

  • Interactive and engaging: The course includes interactive lessons, quizzes, and exercises to keep you engaged and motivated.
  • Comprehensive and personalized: The course covers all aspects of ISO/IEC 27002:2013 and provides personalized feedback and guidance.
  • Up-to-date and practical: The course is updated regularly to reflect the latest developments in information security and provides practical examples and case studies.
  • Real-world applications: The course provides real-world examples and case studies to illustrate the application of ISO/IEC 27002:2013 in different industries and contexts.
  • High-quality content: The course is developed by experienced information security professionals and provides high-quality content that is accurate, relevant, and engaging.
  • Expert instructors: The course is taught by experienced instructors who are experts in information security and ISO/IEC 27002:2013.
  • Certification: Participants receive a certificate upon completion of the course, issued by The Art of Service.
  • Flexible learning: The course is available online and can be completed at your own pace, allowing you to balance your learning with your work and other commitments.
  • User-friendly: The course is designed to be user-friendly and easy to navigate, with clear instructions and minimal technical requirements.
  • Mobile-accessible: The course can be accessed on a variety of devices, including smartphones, tablets, and laptops.
  • Community-driven: The course includes a community forum where you can connect with other participants, ask questions, and share your experiences.
  • Actionable insights: The course provides actionable insights and practical advice that you can apply to your work and organization.
  • Hands-on projects: The course includes hands-on projects and exercises that allow you to apply your knowledge and skills in a practical way.
  • Bite-sized lessons: The course is divided into bite-sized lessons that are easy to complete and allow you to focus on one topic at a time.
  • Lifetime access: You have lifetime access to the course materials and can review them as many times as you need.
  • Gamification: The course includes gamification elements, such as quizzes and challenges, to make learning fun and engaging.
  • Progress tracking: The course includes a progress tracking system that allows you to track your progress and stay motivated.
,