Incidents In Information Security: ISO IEC 27002 Standard
This course is designed for those interested to learn the basics of information security and have a solid foundation of the concepts and knowledge needed to properly manage information security incidents.
About This CourseBeginner
Information security is everyone’s responsibility. Everyone in an organization plays a part in establishing good security practices. However, in your personal life, securing your personal information is completely up to you. Nobody else is going to do it for you.
Therefore, whether you are concerned about protecting your personal information or your business information, a solid awareness of information security incident concepts is an essential place to start.
In this course, you’ll learn about getting prepared for the inevitability of having to manage information security incidents.
First, you’ll learn about building the information security organization, and establishing security policies and a code of conduct concepts. Next, you’ll learn about enabling information security with people, processes, and technology. Finally, you’ll learn about improving security using a formal audit program. After watching this course, you’ll have a solid foundation of the concepts and knowledge needed to properly manage information security incidents.
What you’ll learn:
- By the time you complete this course, you will be well prepared to participate as an active member of any information security team.
Requirements and prerequisites:
- Before beginning the course, you should be familiar with the basic concepts that are outlined in the Information Security Threats and Risks ISO/IEC 27002 course.
Who this course is for:
- This course is designed for business and IT professionals.
Our Promise to You
By the end of this course, you will have learned about information security.
30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about information security.
Section 1 - Introduction
Preparing For Success
Section 2 - Building The Information Security Organization
An Intro To Planning An Information Security Organization
Establishing Key Security Roles
Establishing An Effective Security Practice
Establishing Centralized Governance
Reviewing The Security Organization
Section 3 - Establishing Security Policies And A Code Of Conduct
Establishing The Security Policy
Establishing Security Prior To And During Employment
Establishing A Disciplinary Process
Section 4 - Enabling Information Security With People, Process, And Technology
Establishing The Information Security Management System
Information Security Management System Roles
The Deming Cycle
Section 5 - Using the Security Incident Cycle to Improve Security Response
Establishing An Incident Reporting And Response
Reporting An Incident Or Weakness
Security Incident Examples
Using The Incident Response Cycle
Section 6 - Logging And Managing Security Events And Incidents
Leveraging Incident Management And The Help Desk
The Value Of Establishing Incident Management Procedures
Establishing Incident Categories And Priorities
Implementing An Incident Escalation Process
Section 7 - Complying With Regulatory, Legislative, And Organization Mandates
Managing Statutory, Regulatory, And Contractual Obligations
Securing Intellectual Property
Protecting Organizational Records
Protecting Private Information
Section 8 - Improving Security With A Formal Audit Program
Establishing The Audit Scope
Securing The Audit
No Reviews found for this course.