Description
Who should attend?
This training course is intended for:
- Managers involved in the implementation of an information security management system (ISMS) based on ISO/IEC 27001
- IT professionals and consultants seeking to enhance their knowledge in information security
- Members of an ISMS implementation or information security team
- Individuals responsible for information security in an organization
Learning objectives
By successfully completing this training course, you will be able to:
- Explain the fundamental concepts of information security, cybersecurity, and privacy based on ISO/IEC 27002
- Discuss the relationship between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
- Support an organization in effectively determining, implementing, and managing information security controls based on ISO/IEC 27002
Educational approach
- This training is based on both theory and best practices used in the implementation and management of information security controls.
- Participants are encouraged to communicate and discuss with each other while partaking in exercises and quizzes.
- The structure of quizzes is similar to that of the certification exam.
Prerequisites
The main requirements for participating in this training course are having a fundamental understanding of ISO/IEC 27002 and comprehensive knowledge of information security.