Introduction
  • Objective and Outcome
  • Features of the course and Instructor
  • Introduction
  • Vulnerability-Exploit and Threat
  • Threat Classification
  • Risk and Introduction to ISMS
  • Insights of ISO 27001:2013
Human Resource Security
  • HR Security
  • HR Security Policy and System Security Policy
  • Social Engineering - Need for Information security awareness program
  • Clear/Clean Desk policy and How to report an incident?
  • Internet usage policy
  • Phishing drill
  • Anti Spam - Cost Vs Benefit analysis
  • Need for Backup and its types
  • Incident response
IT Security Policies
  • Wireless Security policy
  • Remote Access policy
  • Asset Control policy
  • Secure disposal policy
  • Access Control policy
Business continuity planning and Disaster recovery methodology
  • Business continuity planning and Disaster recovery methodology
  • Types of Disaster Recovery sites
  • BCP DR - Sample situation and solution
  • Information Security Myths
COVID-19 response Strategy-Information Security Awareness
  • Medical Condition- Environmental Threat
  • Workforce Management
  • Operational planning & Continual monitoring
  • IT Infrastructure
  • Information security awareness
Scenario based Quiz
  • Video Quiz 1
  • Quiz 1
  • Video Quiz 2
  • Quiz 2
  • Video Quiz 3
  • Quiz 3
  • Video Quiz 4
  • Quiz 4
  • Video Quiz 5
  • Quiz 5
  • Video Quiz 6
  • Quiz 6
  • Video Quiz 7
  • Quiz 7
  • Video Quiz 8
  • Quiz 8
  • Video Quiz 9
  • Quiz 9