Skip to main content

Mastering ISO/IEC 27002;2013 - A Step-by-Step Guide to Information Security Management

USD210.97
When you get access:
Course access is prepared after purchase and delivered via email
How you learn:
Self-paced • Lifetime updates
Your guarantee:
30-day money-back guarantee — no questions asked
Who trusts this:
Trusted by professionals in 160+ countries
Toolkit Included:
Includes a practical, ready-to-use toolkit with implementation templates, worksheets, checklists, and decision-support materials so you can apply what you learn immediately - no additional setup required.
Adding to cart… The item has been added

Mastering ISO/IEC 27002:2013 - A Step-by-Step Guide to Information Security Management

Mastering ISO/IEC 27002:2013 - A Step-by-Step Guide to Information Security Management

This comprehensive course is designed to provide participants with a thorough understanding of the principles and practices of information security management, as outlined in the ISO/IEC 27002:2013 standard. Upon completion of this course, participants will receive a certificate issued by The Art of Service.



Course Features

  • Interactive and engaging learning experience
  • Comprehensive and up-to-date content
  • Personalized learning approach
  • Practical and real-world applications
  • High-quality content developed by expert instructors
  • Certificate issued upon completion
  • Flexible learning schedule
  • User-friendly and mobile-accessible platform
  • Community-driven learning environment
  • Actionable insights and hands-on projects
  • Bite-sized lessons and lifetime access
  • Gamification and progress tracking features


Course Outline

Chapter 1: Introduction to Information Security Management

  • Defining information security and its importance
  • Understanding the ISO/IEC 27002:2013 standard
  • Overview of the information security management system (ISMS)

Chapter 2: Risk Management and Assessment

  • Understanding risk management and its importance
  • Identifying and assessing risks
  • Risk treatment and mitigation strategies

Chapter 3: Security Policies and Procedures

  • Developing and implementing security policies
  • Creating and enforcing security procedures
  • Reviewing and updating security policies and procedures

Chapter 4: Asset Management and Control

  • Identifying and classifying assets
  • Implementing asset control measures
  • Maintaining asset inventory and tracking

Chapter 5: Access Control and Authentication

  • Understanding access control and its importance
  • Implementing access control measures
  • Authenticating users and devices

Chapter 6: Incident Response and Management

  • Understanding incident response and its importance
  • Developing and implementing incident response plans
  • Managing and responding to incidents

Chapter 7: Business Continuity and Disaster Recovery

  • Understanding business continuity and disaster recovery
  • Developing and implementing business continuity plans
  • Implementing disaster recovery measures

Chapter 8: Compliance and Regulatory Requirements

  • Understanding compliance and regulatory requirements
  • Implementing compliance measures
  • Maintaining compliance and regulatory requirements

Chapter 9: Security Awareness and Training

  • Understanding security awareness and its importance
  • Developing and implementing security awareness programs
  • Providing security training and education

Chapter 10: Monitoring and Review

  • Understanding monitoring and review requirements
  • Implementing monitoring and review measures
  • Maintaining and improving the ISMS

Chapter 11: Certification and Accreditation

  • Understanding certification and accreditation requirements
  • Preparing for certification and accreditation audits
  • Maintaining certification and accreditation

Chapter 12: Continuous Improvement

  • Understanding continuous improvement requirements
  • Implementing continuous improvement measures
  • Maintaining and improving the ISMS
,