ISO 27001 Cybersecurity manager guidelines

  • Overview
  • Curriculum
  • Instructor
  • Review

About This Course

Application of ISO/IEC 27001 for cybersecurity. Understand and apply the requirements for a cybersecurity program.

The purpose of this course is to provide cybersecurity guidelines for the application of ISO 27001 (the popular standard for information security management systems).

After going through the lessons you will have a good understanding of the concepts, principles and requirements for an organization to design a cybersecurity system.

You will understand what are the typical security threats for different activities and processes and the recommended controls that an organization can implement in order to respond and protect itself.


The structure of the course includes:

- introductory aspects including definitions for the Cyberspace and Cybersecurity.

- the concepts of Confidentiality, Integrity, Authentication and Non-Repudiation as critical elements for any security system;

- information classification - schemes, levels and labeling aspects

- Threats, vulnerability, risk assessment (quantiative and qualitative methods) and the options for an organization to treat security risks.

- Internal organization requirements including support from top management and segregation of duties;

- aspect on mobile devices - like BYOD (Bring Your Own Device) and COPE (Company Owned Personally Enabled)

- human resources security - from screening to employment, the contractual requirements and disciplinary process plus the termination and change of employment

- requirements for the use of removable media

- access controls and authentication aspects plus how to manage privileges so they won't generate security breaches

- cryptography - including basic elements and definitions, digital signature and the public key infrastructure

- a short description of most popular cryptograhpic attacks (brute force, rainbow tables or birthday attacks) and recommended controls

- controls that refer to physical security and equipment

- malware aspects (viruses, logic bombs, worms, trojans, spyware, adware and a detailed presentation of ransomware)

- denial of service attacks

- social engineering and phishing

- password management aspects including common password attacks and controls

- backup aspects

- requirements for the change management process in an organization so that security is not affected

- network security aspects - principles and controls + wireless attacks and how to prevent them

- requirements for email security

- security in development processes

- supplier relationships and risks associated to suppliers' access to information assets of the organization

- capacity management

- managing cybersecurity incidents - from detection to closure and root cause analysis

- business continuity aspects and how an organization should prepare for and respond to crisis situations

- compliance requirements that any organization must repsect.


The course uses easy to follow explanations and examples with a few case studies along the way (about the Barings bank collapse, the Target security breach or Edward Snowden) to illustrate the concepts described.

At the end of the course there is a quiz  - with questions from the subject matter.


Get the information you need to design, coordinate and improve a cybersecurity system or audit organizations as per ISO 27001.


  • Principles and concepts in cybersecurity

  • Threats and vulnerabilities

  • Risks and controls

Instructor

Profile photo of Cristian Vlad Lupa, rigcert.education
Cristian Vlad Lupa, rigcert.education

What I do ?I translate the knowledge and best practices of international standards into common language, to help people and organizations improve. What I am interested in ?My interests cover multipled disciplines including quality management, information security, business continuity, compliance management, occupational health & safety, environmental management, social responsibility, project management, food safety or risk management.Who am I ?I have...

Review
4.9 course rating
4K ratings
ui-avatar of Ahmer Ahmed
Ahmer A.
4.0
7 months ago

Thanks

  • Helpful
  • Not helpful
ui-avatar of Saurabh Kale
Saurabh K.
4.5
7 months ago

nice content

  • Helpful
  • Not helpful
ui-avatar of Milind S. Mhatre
Milind S. M.
4.0
8 months ago

clarity on subject

  • Helpful
  • Not helpful
ui-avatar of Ewomazino Usiobor
Ewomazino U.
5.0
8 months ago

Great course!

  • Helpful
  • Not helpful
ui-avatar of Shashikant Patole
Shashikant P.
5.0
8 months ago

27002 clauses and its compliance requirements explained well!

  • Helpful
  • Not helpful
ui-avatar of Maksym Kreshchyshyn
Maksym K.
3.5
8 months ago

I think the overall course is OK.

  • Helpful
  • Not helpful
ui-avatar of Paras Katiyar
Paras K.
3.5
8 months ago

NA

  • Helpful
  • Not helpful
ui-avatar of Mohammad Rizwan
Mohammad R.
4.5
8 months ago

good

  • Helpful
  • Not helpful
ui-avatar of Asif Mulani
Asif M.
4.5
8 months ago

Good...

  • Helpful
  • Not helpful
ui-avatar of Pappu Tarakaram
Pappu T.
5.0
8 months ago

Good

  • Helpful
  • Not helpful
Leave A Reply

Your email address will not be published. Required fields are marked *

Ratings

Courses You May Like

Lorem ipsum dolor sit amet elit
Show More Courses