• Classroom
  • Online, Instructor-Led
  • Online, Self-Paced
Course Description

Proactively implement sound security protocols to mitigate security risks

Learning Objectives

  1. Best practice in Information Security Management and how to apply this within your organization.
  2. Scope & purpose of the ISO/IEC 27001 standard and how it can be implemented within an organization.
  3. Understand the key terms & definitions used in ISO/IEC 27001 to effectively roll out the principles.
  4. Leverage the fundamental ISO/IEC 27001 requirements for an ISMS to address the need to continually improve.
  5. Recognize the purpose of internal audits & external certification audits, their operation and the associated terminology.
  6. Apply your knowledge to business scenarios to enhance control of information.
  7. Establish a structured approach to information security management to secure information assets.
  8. Improve information security through adoption of best practices.
  9. Understand how ISO/IEC 27001 provides a competitive differentiator when tendering for business contracts.
  10. Build reputation with the secure management of confidential & sensitive information.
  11. Demonstrate compliance with an internationally recognized standard & the ability to satisfy customer security requirements

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Operations
  • Incident Response
  • Software Development
  • Systems Requirements Planning
  • Training, Education, and Awareness

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.