image
The Ultimate Drawing Course Beginner to Advanced...
$179
$79
image
User Experience Design Essentials - Adobe XD UI UX...
$179
$79
Total:
$659

Description

What is ISO/IEC 27001 and why it matters?
ISO/IEC 27001 is the world's most popular standard for information security management, and certification to this standard is highly sought after. It demonstrates an organization’s ability to safeguard information with robust controls, ensuring trust and reliability.
Global leaders like Google, Apple, Adobe, Oracle, and countless other tech corporations, financial institutions, healthcare providers, insurance companies, educational institutions, manufacturers, service companies, government agencies, and businesses of all sizes have implemented and certified Information Security Management Systems (ISMS) according to ISO/IEC 27001. This showcases their commitment to protecting the confidentiality, integrity, and availability of the information they handle.
Course Overview
My course delves into the management system requirements of ISO/IEC 27001:2022, along with the information security controls from the standard's annex (Annex A). This comprehensive guide will help you understand how to implement an ISMS, meet the necessary requirements and achieve compliance.
The course is structured into 6 sections:
-
the first section is an introduction to the concept of information security and to this standard, ISO/IEC 27001.
Among other aspects the introductive part addresses the following subjects: what represents an ISMS (Information Security Management System), what is the purpose of ISO/IEC 27001 and what is the structure of this standard or what are other standards in the ISO/IEC 27000 family that can be of interest for an information security professional.
- the second section of the course is about the management system requirements of ISO/IEC 27001:2022. 
The course follows the structure of the standard, covering all the requirements in each clause and sub-clause. The context of the organization, the scope of the ISMS, information security risk assessment and risk treatment, the information security objectives, the documentation of the ISMS, the internal audit of the ISMS, the management review, the information security policy or the management of nonconformities are among the subjects covered by this second section of the course.
- the third, fourth, fifth and sixth sections are all about the information security controls from Annex A of ISO/IEC 27001:2022
. There are 93 controls divided into 4 themes: Organizational controls (section 3 of the course), People controls (section 4), Physical controls (section 5) and Technological controls (section 6). The information security controls to be discussed cover, among others, subjects like incident management, supplier relationships, network security, business continuity and ICT readiness, equipment maintenance, storage media, the development of software and systems, the use of cryptography, authentication information, the screening of candidates for employment, the disciplinary process, change management, backup and redundancy, malware protection and technical vulnerability management, logging and monitoring, information security awareness and training, requirements for user end-point devices, capacity management, access privileges, protection against environmental threats, cabling security or secure coding.
If you are interested in the certification to ISO/IEC 27001 for organizations and individuals, there is a video dedicated to this subject at the end of the course.
After going through all the videos of this course you will have a good understanding of what are the requirements for an information security management system and how an organization can apply such a system and claim conformity to ISO/IEC 27001:2022.
The information will be very useful to you if you:
- work as a consultant helping organizations apply standards and implement management systems;
- participate in audits (internal or external audits) in accordance with ISO/IEC 27001:2022;
- work in a company that applies or intends to apply an information security management system;
- have an interest in information security management in general;
- are looking to build a career in information security.
If none of the options above suits your profile you can use the information in my course for awareness on information security and you will have a good image of the requirements that many organizations around the world have decided to adopt.
This course provides 7 hours of condensed information that you can revisit anytime you need and once you finish it you can prove your knowledge in the field of information security management with the certificate issued by Udemy.
*The course is updated to account for the 2024 Amendment to ISO/IEC 27001:2022 about climate change.
Who this course is for:
Information security managers
Information security consultants and auditors
Information security officers
Information security risk specialists
Managers and business owners
People involved in the implementation and administration of information security management systems according to ISO/IEC 27001
Information security management enthusiasts

What you'll learn

Understand what is an ISMS and what are the requirements for an ISMS

Become familiar with ther requirements of ISO/IEC 27001:2022

Understand with the framework for information security management proposed by ISO/IEC 27001

Obtain the required knowledge to participate in ISMS audits and implementation projects

Understand the information security controls that should be addressed by an ISMS

Acquire the necessary knowledge to coordinate information security management activities in an organization

Requirements

  • You will need a copy of Adobe XD 2019 or above. A free trial can be downloaded from Adobe.
  • No previous design experience is needed.
  • No previous Adobe XD skills are needed.

Course Content

27 sections • 95 lectures
Expand All Sections
1-Introductive part
5
1.1-Introduction
1.2-What is information security?
1.3-What is an information security management system (ISMS)?
1.4-The ISO/IEC 27000 series of standards
1.5-About ISO/IEC 27001
2-Management system requirements of ISO/IEC 27001:2022
28
2.1-Understanding the organization and its context
2.2-Understanding the needs and expectations of interested parties
2.3-Determining the scope of the ISMS
2.4-Information security management system
2.5-Information security and climate change
2.6-Leadership and commitment
2.7-Policy
2.8-Organizational roles, responsibilities and authorities
2.9-Actions to address risks and opportunities
2.10-Information security risk assessment (part 1)
2.11-Information security risk assessment (part 2)
2.12-Information security risk treatment (part 1)
2.13-Information security risk treatment (part 2)
2.14-Information security objectives and planning to achieve them
2.15-Planning of changes
2.16-Resources
2.17-Competence
2.18-Awareness
2.19-Communication
2.20-Documented information
2.21-Control of documented information
2.22-Operational planning and control
2.23-Information security risk assessment and treatment
2.24-Monitoring, measurement, analysis and evaluation
2.25-Internal audit
2.26-Management review
2.27-Continual improvement
2.28-Nonconformity and corrective action
3-Organizational controls
20
3.1-Information security controls
3.2-Policies. Roles and responsibilities. Segregation of duties
3.3-Contact with authorities and special interest groups
3.4-Threat intelligence. Information security in project management
3.5-Inventory and acceptable use of information and assets. Return of assets.
3.6-Information classification and labelling
3.7-Information transfer
3.8-Access control
3.9-Identity management. Authentication management. Access rights.
3.10-Information security in supplier relationships and agreements
3.11-Information security in the ICT supply chain
3.12-Monitoring, review and change management of supplier services
3.13-Information security for the use of cloud services
3.14-Information security incident management
3.15-Learning from incidents and collecting evidence
3.16-Information security during disruption and ICT readiness for business continuity
3.17-Legal, statutory, regulatory and contractual requirements
3.18-Intellectual property. Protection of records. Privacy and protection of PII
3.19-Independent review. Compliance with policies, rules and standards
3.20-Documented operating procedures
4-People controls
5
4.1-Screening. Terms and conditions of employment.
4.2-Awareness, training and education. Disciplinary process
4.3-Termination or change of employment
4.4-Remote working
4.5-Information security event reporting
5-Physical controls
7
5.1-Security perimeters. Physical entry. Securing offices, rooms and facilities
5.2-Physical security monitoring. Physical and environmental threats
5.3-Work in secure areas. Clear desk and clear screen
5.4-Equipment siting and protection. Assets off-premises
5.5-Storage media
5.6-Supporting utilities. Cabling security
5.7-Equipment maintenance, disposal or re-use
6-Technological controls
25
6.1-User end point devices
6.2-Privileged access rights. Information access restriction. Access to source code
6.3-Secure authentication
6.4-Capacity management
6.5-Protection against malware. Technical vulnerability management
6.6-Configuration management. Information deletion
6.7-Data masking and data leakage prevention
6.8-Backup and redundancy of information processing facilities
6.9-Logging
6.10-Monitoring activities and clock synchronization
6.11-Privileged utility programs. Software installation on operational systems
6.12-Networks security
6.13-Security of network services and segregation of networks
6.14-Web filtering
6.15-Use of cryptography
6.16-Secure development life cycle. Application security requirements
6.17-Secure system architecture and engineering principles
6.18-Secure coding. Security testing in development and acceptance
6.19-Outsourced development
6.20-Separation of development, test and production environments
6.21-Change management
6.22-Test information and the protection of systems during audit testing
6.23-The certification to ISO/IEC 27001
6.24-Thank you and good bye!
6.25-ISO/IEC 27001:2022 Quiz