وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

ISO 27001:2022 Complete Training – Implement and Audit ISMS

سرفصل های دوره

Mastering ISO 27001: Become a Lead Auditor and Lead Implementer for ISO/IEC 27001 " Cyvitrix Learning ISO Training


1 - Introduction to ISO 27001
  • 1 -Course Introduction
  • 2 -Introduction to ISO 27001 Standard
  • 3 -Inter-relation between ISO 27000 Family of Standards
  • 4 -Key ISO Standards
  • 5 -What is the Management System

  • 2 - The Management System Implementation Journey
  • 1 -STEP 1 # Obtaining Management Support, Setting up the Project Management
  • 2 -STEP 2 # Define the Scope, Develop the HLP, and Risk Assessment and RTP
  • 3 -STEP 3 # Writing the SoA (Statement of Applicability)
  • 4 -STEP 4 # Control Evaluation & Implementation and Awareness
  • 5 -STEP 5 # Operating and Monitoring the Management System
  • 6 -STEP 6 # Internal Audit, Management Review and Addressing Nonconformities

  • 3 - Understanding the ISMS (Information Security Management System)
  • 1 -Information Security, Confidentiality, Integrity, and Availability (CIA Triad)
  • 2 -Key Security Principals
  • 3 -Why Security Governance is Crucial
  • 4 -Clause 4 Context of the Organization
  • 5 -Organizational Structure
  • 6 -Relation between Departments
  • 7 -Separation of Duties
  • 8 -Strategy and Plans
  • 9 -Legal and Regulatory Requirements
  • 10 -Security Standards and Regulations
  • 12 -Governance and Management
  • 13 -Management Buy-In
  • 14 -Clause 6 Planning
  • 15 -Gap Analysis
  • 16 -Project Managment and PMO
  • 17 -Project Scheduling Tools
  • 18 -RACI Matrix
  • 19 -Owner, Custodian

  • 4 - Risk Assessment and Risk Management
  • 1 -Risk Management
  • 2 -Risk Terminologies
  • 3 -Risk Identification
  • 4 -Risk Analysis
  • 5 -Risk Evaluation and Response
  • 6 -ISO 31K & 27005
  • 7 -Security Controls Overview
  • 8 -Acquiring New Control, Process and Procedures and POC
  • 9 -Control Objective
  • 10 -Control Selection & Implementation
  • 11 -Control Documentation
  • 12 -Asset Management
  • 13 -Asset Lifecycle

  • 5 - Support and Documentation Requirements
  • 1 -Clause 7 Support
  • 2 -Policies
  • 3 -Standards
  • 4 -Procedures and Guidelines
  • 5 -Development and Review of Policies
  • 6 -Importance of resources, competence, and awareness
  • 7 -ISMS Documentation
  • 8 -Documented information and control of documents
  • 9 -Communication requirements within the organization
  • 10 -Structure and requirements for Management System documentation

  • 6 - Operational Planning and Control
  • 1 -Clause 8 Operation of the Management System
  • 2 -Managing external vendors and service providers
  • 3 -Supply Chain Risk Management
  • 4 -Personnel Security - HR Security
  • 5 -Security Awareness Training
  • 6 -HR Policy
  • 7 -Building Incident Response Program
  • 8 -Operational Logs Management
  • 9 -Threat Intelligence and CERT
  • 10 -Network Security Management Policies
  • 11 -Network Segmenation
  • 12 -Firewalls
  • 13 -Sandbox
  • 14 -Content Filtering
  • 15 -WAF
  • 16 -SSL Decryption
  • 17 -Network Access and BYOD Policies
  • 18 -Internet Access, Email & Remote access Policy
  • 19 -Patch Management
  • 20 -Configuration Management
  • 21 -Change Management
  • 22 -Financial, Portfolio and Capacity Management
  • 23 -Server, Software, Backup Policies
  • 24 -Identity Access Management
  • 25 -Privileged Access Management
  • 26 -User Account, Password and Access Control Policies
  • 27 -Data Lifecycle
  • 28 -Data Classification
  • 29 -Building Data Governance Program
  • 30 -Data Protection Measures
  • 31 -Data Leakage Prevention
  • 32 -Digital Rights Management
  • 33 -Data Protection, Encryption, Classification Policies
  • 34 -Data Disposal
  • 35 -Data Privacy Overview
  • 36 -Privacy Policy

  • 7 - Business Continuity and Resiliency and Incident Response
  • 1 -What is BIA, DRP, BCP
  • 2 -Understand RPO & RTO
  • 3 -Recovery Sites
  • 4 -Business Continuity Policy

  • 8 - Physical Security
  • 1 -Physical Security
  • 2 -Data Center Security
  • 3 -Environmental Controls
  • 4 -Clear Desk, AUP & Physical Security Policy

  • 9 - Software Development Security
  • 1 -Software Development Process
  • 2 -Software Development Methodologies
  • 3 -Use Case, Abuse Case and SRTM
  • 4 -Software Functional Testing
  • 5 -Software Security Testing

  • 10 - Module 6 Performance Evaluation and Continuous Monitoring
  • 1 -Clause 9 Performance Evaluation
  • 2 -Information System Auditing
  • 3 -Internal and External Auditing
  • 4 -Audit Committee and Charter
  • 5 -Audit Process
  • 6 -Conducting Audit
  • 7 -Collecting Evidences
  • 8 -Evaluation of Controls
  • 9 -Sampling
  • 10 -Audit Reporting
  • 11 -Certification vs Accreditation

  • 11 - Continual Improvement and Corrective Actions
  • 1 -Clause 10 Improvement
  • 2 -Understanding nonconformities and corrective actions
  • 3 -Control Monitoring and Evaluation
  • 4 -Identifying and monitoring KPIs
  • 5 -Risk Monitoring and Reporting
  • 6 -The Continues Monitoring Program
  • 7 -Quality Controls and Quality Assurance
  • 8 -Performance Evaluation and PDCA
  • 9 -Preparing for certification audits
  • 10 -Navigating certification stages and maintaining compliance
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 43748
    حجم: 5289 مگابایت
    مدت زمان: 931 دقیقه
    تاریخ انتشار: ۸ اسفند ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید