Skip to main content

Mastering ISO 27799; A Step-by-Step Guide to Implementing Information Security in Healthcare

USD212.71
When you get access:
Course access is prepared after purchase and delivered via email
How you learn:
Self-paced • Lifetime updates
Your guarantee:
30-day money-back guarantee — no questions asked
Who trusts this:
Trusted by professionals in 160+ countries
Toolkit Included:
Includes a practical, ready-to-use toolkit with implementation templates, worksheets, checklists, and decision-support materials so you can apply what you learn immediately - no additional setup required.
Adding to cart… The item has been added

Mastering ISO 27799: A Step-by-Step Guide to Implementing Information Security in Healthcare

Mastering ISO 27799: A Step-by-Step Guide to Implementing Information Security in Healthcare

This comprehensive course provides a step-by-step guide to implementing information security in healthcare using the ISO 27799 standard. Participants will receive a certificate upon completion issued by The Art of Service.

This course is designed to be interactive, engaging, comprehensive, personalized, up-to-date, practical, and focused on real-world applications. Our expert instructors will guide you through the course material, and you will have access to high-quality content, hands-on projects, and actionable insights.

The course is structured into the following chapters:

Chapter 1: Introduction to ISO 27799

  • Topic 1.1: Overview of ISO 27799 Learn about the purpose and scope of the ISO 27799 standard, and how it applies to healthcare organizations.

  • Topic 1.2: Benefits of Implementing ISO 27799 Understand the benefits of implementing the ISO 27799 standard, including improved patient care, reduced risk, and increased compliance.

  • Topic 1.3: Key Concepts and Terminology Familiarize yourself with key concepts and terminology used in the ISO 27799 standard, including threat, vulnerability, risk, and control.

Chapter 2: Information Security Management System (ISMS)

  • Topic 2.1: Overview of ISMS Learn about the components of an ISMS, including policies, procedures, and controls.

  • Topic 2.2: Establishing an ISMS Understand the steps involved in establishing an ISMS, including defining the scope, establishing policies and procedures, and implementing controls.

  • Topic 2.3: Maintaining and Improving an ISMS Learn about the ongoing activities required to maintain and improve an ISMS, including monitoring, reviewing, and updating policies and procedures.

Chapter 3: Risk Management

  • Topic 3.1: Overview of Risk Management Learn about the risk management process, including risk identification, risk assessment, and risk treatment.

  • Topic 3.2: Risk Identification and Assessment Understand the steps involved in identifying and assessing risks, including identifying threats and vulnerabilities, and assessing the likelihood and impact of risks.

  • Topic 3.3: Risk Treatment and Mitigation Learn about the steps involved in treating and mitigating risks, including implementing controls, transferring risk, and accepting risk.

Chapter 4: Security Controls

  • Topic 4.1: Overview of Security Controls Learn about the different types of security controls, including technical, administrative, and physical controls.

  • Topic 4.2: Implementing Security Controls Understand the steps involved in implementing security controls, including selecting, implementing, and testing controls.

  • Topic 4.3: Maintaining and Reviewing Security Controls Learn about the ongoing activities required to maintain and review security controls, including monitoring, reviewing, and updating controls.

Chapter 5: Incident Response and Management

  • Topic 5.1: Overview of Incident Response and Management Learn about the importance of incident response and management, and the steps involved in responding to and managing incidents.

  • Topic 5.2: Incident Response Planning Understand the steps involved in planning for incident response, including developing an incident response plan, establishing incident response teams, and training personnel.

  • Topic 5.3: Incident Response and Management Learn about the steps involved in responding to and managing incidents, including detecting and reporting incidents, containing and eradicating incidents, and recovering from incidents.

Chapter 6: Compliance and Certification

  • Topic 6.1: Overview of Compliance and Certification Learn about the importance of compliance and certification, and the steps involved in achieving compliance and certification.

  • Topic 6.2: Compliance with ISO 27799 Understand the steps involved in complying with the ISO 27799 standard, including implementing the standard, monitoring and reviewing compliance, and maintaining compliance.

  • Topic 6.3: Certification to ISO 27799 Learn about the steps involved in achieving certification to the ISO 27799 standard, including selecting a certification body, preparing for certification, and maintaining certification.

Chapter 7: Implementation and Maintenance

  • Topic 7.1: Overview of Implementation and Maintenance Learn about the importance of implementation and maintenance, and the steps involved in implementing and maintaining an ISMS.

  • Topic 7.2: Implementing an ISMS Understand the steps involved in implementing an ISMS, including establishing policies and procedures, implementing controls, and training personnel.

  • Topic 7.3: Maintaining an ISMS Learn about the ongoing activities required to maintain an ISMS, including monitoring, reviewing, and updating policies and procedures, and maintaining controls.

Chapter 8: Monitoring and Review

  • Topic 8.1: Overview of Monitoring and Review Learn about the importance of monitoring and review, and the steps involved in monitoring and reviewing an ISMS.

  • Topic 8.2: Monitoring an ISMS Understand the steps involved in monitoring an ISMS, including collecting and analyzing data, and identifying and addressing issues.

  • Topic 8.3: Reviewing an ISMS Learn about the steps involved in reviewing an ISMS, including reviewing policies and procedures, and updating the ISMS.

Chapter 9: Continuous Improvement

  • Topic 9.1: Overview of Continuous Improvement Learn about the importance of continuous improvement, and the steps involved in continuously improving an ISMS.

  • Topic 9.2: Identifying Opportunities for Improvement Understand the steps involved in identifying opportunities for improvement, including collecting and analyzing data, and identifying,