Information Security Management System
Impact_Analytics
About This Course
Module 1. Introduction to ISMS (1 Hour)
-
-
- Overview of Information Security Management Systems
-
- Definition and purpose
- Importance of ISMS in Organizations
-
- Overview of Information Security Management Systems
-
Module 2. Core Concepts and Principles (1.5 Hours)
-
-
- Core Principles of ISMS
-
- Confidentiality, Integrity, and Availability (CIA Triad)
- Risk Management Approach
-
- Key Concepts
-
- Information Security Objectives
- Security Policies and Procedures
-
- Legal and Regulatory Considerations
-
- ISO27001, GDPR, SOC2 etc.
- Compliance and Implications
-
- Core Principles of ISMS
-
Module 3. ISO/IEC 27001 Standard Overview (2 Hours)
-
-
- Introduction to ISO/IEC 27001
-
- Structure and Key Clauses
- Requirements for Certification
-
- Introduction to ISO/IEC 27001
-
Module 4. Risk Management in ISMS (1.5 Hours)
-
-
- Risk Assessment Process
-
- Identifying and Evaluating Risks
- Risk Treatment and Mitigation Strategies
-
- Risk Management Framework
-
- Risk Register and Risk Mitigation Plans
- Monitoring and Review
-
- Risk Assessment Process
-
Module 5. Phishing Awareness
-
-
- Different types of phishing attacks
- Mitigation steps for the phishing attacks
- Some real examples of phishing attacks
-
Module 6. Monitoring, Review, and Improvement (1 Hour)
-
-
- Monitoring ISMS Performance
-
- Internal Audits and Reviews
- Performance Metrics and Indicators
-
- Continuous Improvement
-
- Corrective and preventive actions
- Updating ISMS Based on Feedback
-
- Monitoring ISMS Performance
-
Module 7. Wrap-Up and Q&A (0.5 Hours)
-
-
- Recap of Key Points
-
- Summary of ISMS Principles and Best Practices
-
- Questions and Answers
-
- Open session for clarifications and discussion
-
- Recap of Key Points
-