Course curriculum

    1. Agenda

      FREE PREVIEW
    1. Overview

    2. Quiz(Chapter 2)

    1. Introduction to the new controls

    2. Threat Intelligence

    3. Information Security for use of cloud services

    4. ICT readiness for Business Continuity

    5. Physical security monitoring

    6. Configuration Management

    7. Information deletion

    8. Data masking

    9. Data leakage prevention

    10. Monitoring activities

    11. Web Filtering

    12. Secure coding

    1. Introduction to consolidated controls

    2. Policies for information security

    3. Information security in project management

    4. Inventory of information and other associated assets

    5. Acceptable use of information and other associated assets

    6. Information transfer

    7. Access control

    8. Authentication information

    9. Access rights​

    10. Monitoring, review and change management of supplier services

    11. Information security during disruption​

    12. Legal, statutory, regulatory and contractual requirements​

    13. Compliance with policies, rules and standards for information security​

    14. Information security event reporting​

    15. Physical entry​

    16. Storage media​

    17. User endpoint devices​

    18. Management of technical vulnerabilities​

    19. Logging​

    20. Installation of software on operational systems​

    21. Use of cryptography​

    22. Application security requirements​

    23. Security testing in development and acceptance​

    24. Separation of development, test and production environments​

    25. Change management​

    1. Steps

    1. Timeline

About this course

  • 46 lessons
  • 2.5 hours of video content
  • Certificate accredited by UKAS
  • £595 £295

Instructor(s)

ERS Academy

Meet our instructor, an experienced professional with over 20 years in the field of ISO Standards. As a member of the ERS Academy team, they have completed advanced auditor training courses and have extensive experience performing audits on behalf of UKAS-accredited certification bodies. With their deep understanding of various ISO Standards, they are well-equipped to provide training courses that cover a wide range of topics, ensuring that students leave with the knowledge and skills they need to succeed in their respective fields.

Benefits of getting a Certificate

A certificate of competence proves that you have attended the eTraining course and passed the exam certified by BCS, which is a UKAS accredited certification body. This ensures that you understand and can apply the knowledge you gained in each of the course's modules.

Benefits

of enrolling to ISO 27k Compliance courses

  • Understanding the changes in the new standard

  • Can be used as a Information Security Awareness course

What you'll get from this course

______

  • Awareness

    Provides security awareness within an organization, employees will be better equipped to identify potential security threats and take appropriate action to protect sensitive information.

  • Knowledge on information security

    ISO 27001 & 27002 provides a framework for managing and protecting sensitive information, which can help organizations reduce the risk of data breaches and protect against cyber threats.

  • Risk management

    The standard provides a framework for identifying, assessing, and mitigating information security risks, which can help organizations make more informed decisions about how to protect their assets.