Introduction to information security and ISO/IEC 27001
  • Introduction
  • Information security concept
  • ISO 27k family
Context of the organization
  • Context of the organization
  • Scope of the ISMS
Leadership
  • Leadership and commitment
  • Information security policy
  • Organizational roles, responsibilities and authorities
Planning
  • Information security risk assessment
  • Information security risk treatment
  • Information security objectives
Support
  • Competence and awareness
  • Communication
  • Documented information
Operation
  • Operational planning and control
Performance evaluation
  • Monitoring, measuring, analysis and evaluation
  • Internal audit
  • Management review
Improvement
  • Nonconformity and corrective action
Introduction to the second part of the course
  • Introduction to second part
Information security policies
  • Management direction for information security
Organization of information security
  • Roles, responsibilities and segregation of duties
  • Contract with authorities and special interest groups
  • Mobile devices and teleworking
Human resources security
  • Human resources security - Prior to employment
  • Human resources security - During employment
  • Human resources security - Termination or change of employment
Asset management
  • Responsibility for assets
  • Information classification
  • Media handling
Access control
  • Business requirements for access control
  • User access management
  • User responsibilities
  • System and application access control
Cryptography
  • Cryptographic controls
Physical and environmental security
  • Physical and environmental security - Secure areas
  • Physical and environmental security - Equipment part 1
  • Physical and environmental security - Equipment part 2
Operations security
  • Operational procedures and responsibilities
  • Protection from malware
  • Backup
  • Logging and monitoring
  • Control of operational software
  • Technical vulnerability management
  • Information security audit considerations
Communications security
  • Network security management
  • Information transfer
System acquisition, development and maintenance
  • Security requirements of information systems
  • Security in development and support part 1
  • Security in development and support part 2
Supplier relationships
  • Information security policy for supplier relationships
  • Supplier service delivery management
Information security incident management
  • Management of information security incidents part 1
  • Management of information security incidents part 2
Information security aspects of business continuity management
  • Information security continuity
Compliance
  • Compliance with legal and contractual requirements
  • Information security reviews
Quiz
  • ISO 27001:2013 Quiz