Administering Cyber Risk In A Digital Ages (Level 1)

4 (4 Ratings) 54 Students enrolled
Includes

00:59:11 Hours On demand videos

4 Lessons

Full access

Access on mobile and tv

Requirements

There are no pre-requisites for this course although a basic knowledge of Information Security or Service Management concepts is recommended.

+ View more
Description

This program is an international standard that provides the basis for effective management of confidential and sensitive information, and for the application of information security controls. It enables organizations to demonstrate excellence and prove best practice in Information Security management. Conformance with the standard requires commitment to continually improve control of confidential and sensitive information, providing reassurance to sponsors, shareholders and customers alike.

Re-released in 2013, ISO/IEC 27001 builds upon established foundations as the most widely recognized international standard specifically aimed at information security management. The adoption of an Information Security Management System (ISMS) is a strategic decision driving the coordination of operational security controls across all of the organizations electronic and physical information resources. The standard can be integrated with other management system framework standards, such as the quality standard ISO 9001 and ISO/IEC 20000 for IT service management.

ISO/IEC 27001 provides a model to establish, implement, maintain and continually improve a risk-managed ISMS. The design and implementation of the management system is tailored to the organization’s objectives, information assets, operational processes and governing legal and regulatory security requirements. The Foundation level qualification assesses your knowledge of the contents and high-level requirements of the ISO/IEC 27001 standard.

What will i learn

  • Learn about Information Security Management and apply this within your organization
  • Understand the key terms and definitions used in ISO/IEC 27001 to effectively roll out the principles
  • Leverage the fundamental ISO/IEC 27001 requirements for an ISMS
  • Recognize the purpose of internal audits and external certification audits, their operation and the associated terminology
Course content 00:59:11 Hours 4 lessons
Module 1
2 Lessons 00:36:55 Hours
  • Identifying Security Fundamentals 00:36:55
  • Quiz 1.1 00:00:00
  • Analyzing Risk 00:22:16
  • Quiz 1.2 00:00:00

About instructor

+ View more
Description

Has over 3 years of experience in the field of IT Security and Infrastructure. He holds the certification of CEH, CompTIA CSA+, CompTIA Sec+, CISCO CCNA Routing & Switching, COBIT® 5 Foundation, ITIL Foundation, and ISO 27001 Foundation to enhance his expertise.

1 Courses

54 Students

4 Reviews

Student feedback

4

Average rating

  • 0%
  • 25%
  • 0%
  • 25%
  • 50%

Reviews

Tue, 15-Sep-2020

Tue, 20-Oct-2020

good
Arham Muhazzaf

Sun, 16-Jan-2022

Hafidz Ardiansyah

Wed, 18-Dec-2024

Materi yang sangat bermanfaat bagi yang concern terhadap Risiko Cyber.