Description
Who Should Attend?
This training course is intended for:
- Managers or consultants seeking to enhance their knowledge regarding the implementation of information security controls in an ISMS based on ISO/IEC 27001
- Individuals responsible for maintaining information security, compliance, risk, or governance in an organization
- IT professionals or consultants seeking to enhance their knowledge in information security
- Members of an ISMS implementation or information security team
Learning Objectives
Upon successfully completing the training course, participants will be able to:
- Explain the fundamental concepts of information security, cybersecurity, and privacy based on ISO/IEC 27002
- Acknowledge the relationship between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
- Interpret the ISO/IEC 27002 information security controls in the specific context of an organization
- Support an organization in effectively determining, implementing, and managing information security controls based on ISO/IEC 27002
- Explain the approaches and techniques used for the implementation and effective management of information security controls
Educational Approach
- The training course integrates both theory and practice by guidance and practical examples for the implementation and management of information security controls.
- The training course contains essay-type exercises and multiple-choice quizzes, some of which are scenario-based.
- Participants are encouraged to communicate and discuss with each other while partaking in exercises and quizzes.
- The structure of quizzes is similar to that of the certification exam.
Prerequisites
The main requirements for participating in this training course are having a fundamental understanding of ISO/IEC 27002 and comprehensive knowledge of information security controls.