Cart
Sign In

Sorry! ISO 27001 (e-Certificate Course)-Online Video Training Material, Technical support, Verifiable certificate. is sold out.

Compare Products
Clear All
Let's Compare!

ISO 27001 (e-Certificate Course)-Online Video Training Material, Technical support, Verifiable certificate.

This product has been sold out
(3.3) 3 Ratings 1 Review Have a question?

We will let you know when in stock
notify me

Featured

Highlights

  • Delivery via E-mail
    Non-Cancellable
    No Physical Dispatch
  • Certification:Yes
  • Format:Online Study Material
  • SUPC: SDL288768614

Description


 Syste m (Hardware/Software) Requirements
Operating SoftwareWindows XP or Higher
ProcessorMinim um P4 or Higher
RAM1 GB or Higher
BrowserAny
Recommended Internet SpeedMinimum 1MBPS
Supported Browser Plug-ins* Updated Flash Player, * Update Java
Other RequirementsSpeaker or headphone
Prdocut Description
ISO 27001 defines how to organize information security in an organisation. It is safe to say that this standard is the foundation of information security management. ISO 27001 is for information security the same thing that ISO 9001 is for quality. It is a standard written by the world's best experts in the field of information security and aims to provide a methodology for the implementation of information security in an organisation. It also enables an organisation to get certified, which means that an independent certification body has confirmed that information security has been implemented in the best possible way in the organisation. Given the importance of ISO 27001, many legislatures have taken this standard as a basis for drawing up different regulations in the field of personal data protection, protection of confidential information, protection of information systems, management of operational risks in financial institutions, etc. ISO 27001 prescribes how to manage information security through a system of information security management. Such a management system, just like ISO 9001 or ISO 14001, consists of four phases that should be continuously implemented in order to minimize risks to the confidentiality, integrity and availability of information.

The phases are the following:
  • The Plan Phase - This phase serves to plan the basic organisation of information security, set objectives for information security and choose the appropriate security controls (the standard contains a catalogue of 133 possible controls)
  • The Do Phase - this phase includes carrying out everything that was planned during the previous phase
  • The Check Phase - the purpose of this phase is to monitor the functioning of the ISMS through various channels, and check whether the results meet the set objectives
  • The Act Phase - the purpose of this phase is to improve everything that was identified as non-compliant in the previous phase

    The cycle of these four phases never ends, and all the activities must be implemented cyclically in order to keep the ISMS effective.

    In this course on ISO 27001, we will be covering all the phases comprehensively. At the end of this course, a participant would actually start working on ISO 27001.

    Course Curriculum

    Section1:Introduction of ISO 27001

  • Lecture1:Introduction
  • Lecture2:Reviewing ISO
  • Lecture3:ISO 27001 Overview

    Section2:Information Security

  • Lecture4:Defining Information Security
  • Lecture5:Understanding Information Security
  • Lecture6:Information Security Mechanism Part 1
  • Lecture7:Information Security Mechanism Part 2

    Section3:Information Security Management System

  • Lecture8:Information Security Management System Introduction
  • Lecture9:Overview of ISO 27001 Certification Process
  • Lecture10:Benefits of ISMS Certification
  • Lecture11:Information Security Policy
  • Lecture12:Risk Assessment

    Section4:Risk Assessment

  • Lecture13:Risk Assessment Part 1
  • Lecture14:Risk Assessment Part 2
  • Lecture15:Risk Assessment Part 3
  • Lecture16:Risk Assessment Part 4
  • Lecture17:Risk Assessment Part 5
  • Lecture18:Risk Assessment Part 6
  • Lecture19:Risk Assessment Part 7
  • Lecture20:Risk Assessment Part 8
  • Lecture21:Risk Assessment Part 9

    Section5:Quantative Risk Assessment

  • Lecture22:Quantative Risk Assessment Part 1
  • Lecture23:Quantative Risk Assessment Part 2
  • Lecture24:Quantative Risk Assessment Part 3

    Section6:Risk Communication

  • Lecture25:Risk Communication Part 1
  • Lecture26:Risk Communication Part 2

    Section7:Risk Policy, Roles, Responsibilities

  • Lecture27:Risk Policy, Roles, Responsibilities Part 1
  • Lecture28:Risk Policy, Roles, Responsibilities Part 2
  • Lecture29:Risk Reporting & Communication

    Section8:Qualatative Risk Assement

  • Lecture30:Qualatative Risk Assement Intro
  • Lecture31:Qualatative Risk Assement Part 1
  • Lecture32:Qualatative Risk Assement Part 2
  • Lecture33:Difference between Qualatative and Quantative Risk Assessment Part 1
  • Lecture34:Difference between Qualatative and Quantative Risk Assessment Part 2
  • Lecture35:Conclusion Risk Assessment

    Section9:Risk Assessment Methodology

  • Lecture36:Risk Management Standards Step 1 & 2 Part 1
  • Lecture37:Risk Management Standards Step 1 & 2 Part 2
  • Lecture38:Risk Management Standards Step 1 & 2 Part 3
  • Lecture39:Step 3 Identifying Risk
  • Lecture40:Step 4 & 5 Analyse and Evaluate the Risk
  • Lecture41:Step 6 & 7 Treatment and Monitor the risks
  • Lecture42:Risk Register & Benefits of it

    Section10:Risk Mitigation and Risk Mitigation Strategies

  • Lecture43:Risk Mitigation and Strategy Part 1
  • Lecture44:Risk Mitigation and Strategy Part 2
  • Lecture45:Risk Mitigation and Strategy Part 3
  • Lecture46:Risk Mitigation and Strategy Part 4
  • Lecture47:Risk Mitigation and Strategy Part 5

    Section11:Risk Management Tools & ISO STandard Clauses

  • Lecture48:Risk Management Tools & ISO Standard clauses part 1
  • Lecture49:Risk Management Tools & ISO Standard clauses part 2
  • Lecture50:Risk Management Tools & ISO Standard clauses part 3
  • Lecture51:ISO Standard Clauses continue Part 1
  • Lecture52:ISO Standard Clauses continue Part 2
  • Lecture53:ISO 27002 Code of Practice
  • Lecture54:ISO 27002 Code of Practice 2

    Section12:ISO 27002 Introduction & Scope

  • Lecture55:ISO 27002 Introduction & Scope Part 1
  • Lecture56:ISO 27002 Introduction & Scope Part 2
  • Lecture57:ISO 27002

    Section &

    Section 5 Security Policy Part 1

  • Lecture58:ISO 27002

    Section &

    Section 5 Security Policy Part 2

  • Lecture59:ISO 27002

    Section &

    Section 5 Security Policy Part 3

  • Lecture60:ISO 27002

    Section 6 Organization of Information Security Part 1

  • Lecture61:ISO 27002

    Section 6 Organization of Information Security Part 2

    Section13:Asset Management

  • Lecture62:

    Section 8 Human Resources Security Part 1

  • Lecture63:

    Section 8 Human Resources Security Part 2

  • Lecture64:

    Section 9 Physical and Environmental Security Part 1

  • Lecture65:

    Section 9 Physical and Environmental Security Part 2

  • Lecture66:

    Section 10 Communication and operations management Part 1

  • Lecture67:

    Section 10 Communication and operations management Part 2

  • Lecture68:

    Section 10 Communication and operations management Part 3

  • Lecture69:

    Section 10 Communication and operations management Part 4

    Section14:Access Control

  • Lecture70:

    Section 11 Access Control Part 1

  • Lecture71:

    Section 11 Access Control Part 2

  • Lecture72:

    Section 11 Access Control Part 3

  • Lecture73:

    Section 11 Access Control Part 4

  • Lecture74:

    Section 12 Information systems acquisition, development and maintenance PArt 1

  • Lecture75:

    Section 12 Information systems acquisition, development and maintenance PArt 2

  • Lecture76:

    Section 12 Information systems acquisition, development and maintenance PArt 3

  • Lecture77:

    Section 12 Information systems acquisition, development and maintenance PArt 4

    Section15:Information Security Incident Management

  • Lecture78:Information Security Incident Management Part 1
  • Lecture79:Information Security Incident Management Part 2
  • Lecture80:

    Section 14 Business Continuity Management Part 1

  • Lecture81:

    Section 14 Business Continuity Management Part 2

  • Lecture82:

    Section 15 Compliance Part 1

  • Lecture83:ISO 27002

    Section 15 Compliance Part 2 part 1

  • Lecture84:ISO 27002

    Section 15 Compliance Part 2 part 2

    Section16:Certification ISO 27000 in Organization

  • Lecture85:Certification ISO 27000 in Organization Part 1
  • Lecture86:Certification ISO 27000 in Organization Part 2
  • Lecture87:Certification ISO 27000 in Organization Part 3
  • Lecture88:Example of Risks & Drivers Part 1
  • Lecture89:Example of Risks & Drivers Part 2

    Section17:Hazard & Strategic Risk

  • Lecture90:Hazard & Strategic Risk Part 1
  • Lecture91:Hazard & Strategic Risk Part 2
  • Lecture92:Hazard & Strategic Risk Part 3
  • Lecture93:Sample Risk Register Part 1
  • Lecture94:Sample Risk Register Part 2

    Benefits

  • eduCBA e-campus
  • Virtual campus powered by robust LMS which enables to study through internet with cutting edge features
  • Online Video Training Material
  • Presentation Slides

    USP of the product

  • * 24 x 7 online access
  • * Learn from tutorials curated by expert industry professionals and trainers
  • * Certificate of Completion
  • * Practical application oriented skills

    How to use? (Steps to use Study Material)

  • Step 1 - eduCBA sends the redemption coupon along with the registration link.
  • Step 2 - Student will register with his register email id and coupon Step 3 - Student receive the course access and password on his/her email id
  • Step 4 - Login using your email id and password and start learning

    To get more information, you may want to watch the video below


    Learn Everything, Anywhere, Anytime
    India's Largest Online Education Marketplace
  • Terms & Conditions

    The images represent actual product though color of the image and product may slightly differ.