Skip to main content

Mastering ISO/IEC 27002;2013 - A Step-by-Step Guide to Information Security Management

$199.00
When you get access:
Course access is prepared after purchase and delivered via email
How you learn:
Self-paced • Lifetime updates
Your guarantee:
30-day money-back guarantee — no questions asked
Who trusts this:
Trusted by professionals in 160+ countries
Toolkit Included:
Includes a practical, ready-to-use toolkit with implementation templates, worksheets, checklists, and decision-support materials so you can apply what you learn immediately - no additional setup required.
Adding to cart… The item has been added

Mastering ISO/IEC 27002:2013 - A Step-by-Step Guide to Information Security Management



Course Overview

This comprehensive course provides a step-by-step guide to information security management using the ISO/IEC 27002:2013 standard. Participants will learn how to implement and maintain an effective information security management system (ISMS) that protects their organization's sensitive data and assets.



Course Objectives

  • Understand the principles and concepts of information security management
  • Learn how to implement and maintain an ISMS based on ISO/IEC 27002:2013
  • Develop a comprehensive understanding of the standard's requirements and controls
  • Acquire the skills and knowledge needed to conduct a risk assessment and implement risk treatment plans
  • Understand how to monitor, review, and improve the ISMS


Course Outline

Module 1: Introduction to Information Security Management

  • Defining information security and its importance
  • Understanding the ISO/IEC 27002:2013 standard and its structure
  • Overview of the ISMS and its components
  • Benefits of implementing an ISMS

Module 2: Risk Management

  • Understanding risk management and its importance in ISMS
  • Identifying and assessing risks
  • Risk treatment options and plans
  • Implementing and reviewing risk treatment plans

Module 3: Organizational Context and Stakeholders

  • Understanding the organizational context and its impact on ISMS
  • Identifying stakeholders and their roles and responsibilities
  • Establishing communication channels and awareness programs

Module 4: Information Security Policies

  • Defining information security policies and their importance
  • Developing and implementing policies
  • Reviewing and updating policies

Module 5: Organization of Information Security

  • Defining roles and responsibilities for information security
  • Establishing an information security function
  • Implementing a segregation of duties and access control

Module 6: Human Resource Security

  • Understanding the importance of human resource security
  • Implementing security awareness and training programs
  • Managing employee termination and change

Module 7: Asset Management

  • Defining assets and their importance in ISMS
  • Identifying and classifying assets
  • Implementing asset management controls

Module 8: Access Control

  • Defining access control and its importance
  • Implementing access control policies and procedures
  • Managing access rights and privileges

Module 9: Cryptography

  • Understanding the importance of cryptography in ISMS
  • Implementing cryptographic controls
  • Managing cryptographic keys

Module 10: Physical and Environmental Security

  • Defining physical and environmental security and its importance
  • Implementing physical access controls
  • Managing environmental security

Module 11: Operations Security

  • Defining operations security and its importance
  • Implementing operational procedures and controls
  • Managing change and patch management

Module 12: Communications Security

  • Defining communications security and its importance
  • Implementing network security controls
  • Managing email and internet security

Module 13: System Acquisition, Development and Maintenance

  • Defining system acquisition, development, and maintenance and its importance
  • Implementing security requirements in the system development lifecycle
  • Managing system testing and validation

Module 14: Supplier Relationships

  • Defining supplier relationships and their importance in ISMS
  • Implementing supplier security controls
  • Managing supplier contracts and agreements

Module 15: Information Security Incident Management

  • Defining information security incident management and its importance
  • Implementing incident response procedures
  • Managing incident reporting and communication

Module 16: Information Security Continuity

  • Defining information security continuity and its importance
  • Implementing business continuity management
  • Managing disaster recovery and business continuity plans

Module 17: Compliance

  • Defining compliance and its importance in ISMS
  • Implementing compliance controls
  • Managing audits and reviews


Course Features

  • Interactive and engaging: The course includes interactive lessons, quizzes, and exercises to keep you engaged and motivated.
  • Comprehensive: The course covers all aspects of ISO/IEC 27002:2013 and provides a comprehensive understanding of the standard and its requirements.
  • Personalized: The course allows you to learn at your own pace and provides personalized feedback and assessment.
  • Up-to-date: The course is updated regularly to reflect the latest developments and changes in the field of information security management.
  • Practical: The course provides practical examples and case studies to help you apply the concepts and principles learned in the course.
  • Real-world applications: The course provides real-world examples and applications of the concepts and principles learned in the course.
  • High-quality content: The course is developed by experts in the field of information security management and provides high-quality content and instruction.
  • Expert instructors: The course is taught by experts in the field of information security management who have years of experience and knowledge.
  • Certification: Participants receive a certificate upon completion of the course, issued by The Art of Service.
  • Flexible learning: The course is available online and can be accessed from anywhere, at any time.
  • User-friendly: The course is designed to be user-friendly and easy to navigate.
  • Mobile-accessible: The course is accessible on mobile devices, allowing you to learn on-the-go.
  • Community-driven: The course provides a community-driven learning environment where you can interact with other participants and instructors.
  • Actionable insights: The course provides actionable insights and practical advice that can be applied in the workplace.
  • Hands-on projects: The course includes hands-on projects and exercises that allow you to apply the concepts and principles learned in the course.
  • Bite-sized lessons: The course is divided into bite-sized lessons that are easy to digest and understand.
  • Lifetime access: Participants receive lifetime access to the course materials and resources.
  • Gamification: The course includes gamification elements that make learning fun and engaging.
  • Progress tracking: The course provides progress tracking and feedback to help you stay on track and motivated.


Certification

Upon completion of the course, participants receive a certificate issued by The Art of Service. The certificate is recognized internationally and provides evidence of your knowledge and skills in information security management.

,