Iso/Iec 27001:2022. Information Security Management System
Last updated 2/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.81 GB | Duration: 6h 58m
Last updated 2/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.81 GB | Duration: 6h 58m
Learn how your company can protect its information with an ISMS that meets the requirements of ISO/IEC 27001
What you'll learn
Understand what is an ISMS and what are the requirements for an ISMS
Become familiar with ther requirements of ISO/IEC 27001:2022
Understand with the framework for information security management proposed by ISO/IEC 27001
Obtain the required knowledge to participate in ISMS audits and implementation projects
Understand the information security controls that should be addressed by an ISMS
Acquire the necessary knowledge to coordinate information security management activities in an organization
Requirements
No specific prior knowledge required.
Familiarity with management systems and/ or information security management is helpful.
Knowledge about information security principles and concepts is useful.
Description
ISO/IEC 27001 is one of the world's most popular standards and the certification to this standard is very sought after, as it demonstrates that an organization can be trusted with information because it has sufficient controls in place to protect it.Google, Apple, Adobe, Oracle and many other tech corporations, financial institutions, health services providers, insurance companies, education institutions, manufacturing and service companies, state institutions, large and small businesses around the world have implemented an ISMS according to ISO/IEC 27001 and have obtained a certification to demonstrate their capability to protect the confidentiality, integrity and availability of the information they process and store.This course explains the management system requirements of ISO/IEC 27001:2022 along with the information security controls in Annex A of this standard to help you understand how an information security management system can be implemented, what are the requirements that should be met and how compliance can be achieved.The course is structured into 6 sections:- the first section is an introduction to the concept of information security and to this standard, ISO/IEC 27001. Among other aspects the introductive part addresses the following subjects: what represents an ISMS (Information Security Management System), what is the purpose of ISO/IEC 27001 and what is the structure of this standard or what are other standards in the ISO/IEC 27000 family that can be of interest for an information security professional.- the second section of the course is about the management system requirements of ISO/IEC 27001:2022. The course follows the structure of the standard, covering all the requirements in each clause and sub-clause. The context of the organization, the scope of the ISMS, information security risk assessment and risk treatment, the information security objectives, the documentation of the ISMS, the internal audit of the ISMS, the management review, the information security policy or the management of nonconformities are among the subjects covered by this second section of the course.- the third, fourth, fifth and sixth sections are all about the information security controls from Annex A of ISO/IEC 27001:2022. There are 93 controls divided into 4 themes: Organizational controls (section 3 of the course), People controls (section 4), Physical controls (section 5) and Technological controls (section 6). The information security controls to be discussed cover, among others, subjects like incident management, supplier relationships, network security, business continuity and ICT readiness, equipment maintenance, storage media, the development of software and systems, the use of cryptography, authentication information, the screening of candidates for employment, the disciplinary process, change management, backup and redundancy, malware protection and technical vulnerability management, logging and monitoring, information security awareness and training, requirements for user end-point devices, capacity management, access privileges, protection against environmental threats, cabling security or secure coding.If you are interested in the certification to ISO/IEC 27001 for organizations and individuals, there is a video dedicated to this subject at the end of the course. After going through all the videos of this course you will have a good understanding of what are the requirements for an information security management system and how an organization can apply such a system and claim conformity to ISO/IEC 27001:2022.The information will be very useful to you if you:- work as a consultant helping organizations apply standards and implement management systems;- participate in audits (internal or external audits) in accordance with ISO/IEC 27001:2022;- work in a company that applies or intends to apply an information security management system;- have an interest in information security management in general;- are looking to build a career in information security.If none of the options above suits your profile you can use the information in my course for awareness on information security and you will have a good image of the requirements that many organizations around the world have decided to adopt.This course provides 7 hours of condensed information that you can revisit anytime you need and once you finish it you can prove your knowledge in the field of information security management with the certificate issued by Udemy.
Overview
Section 1: Introductive part
Lecture 1 Introduction
Lecture 2 What is information security?
Lecture 3 What is an information security management system (ISMS)?
Lecture 4 The ISO/IEC 27000 series of standards
Lecture 5 About ISO/IEC 27001
Section 2: Management system requirements of ISO/IEC 27001:2022
Lecture 6 Understanding the organization and its context
Lecture 7 Understanding the needs and expectations of interested parties
Lecture 8 Determining the scope of the ISMS
Lecture 9 Information security management system
Lecture 10 Leadership and commitment
Lecture 11 Policy
Lecture 12 Organizational roles, responsibilities and authorities
Lecture 13 Actions to address risks and opportunities
Lecture 14 Information security risk assessment (part 1)
Lecture 15 Information security risk assessment (part 2)
Lecture 16 Information security risk treatment (part 1)
Lecture 17 Information security risk treatment (part 2)
Lecture 18 Information security objectives and planning to achieve them
Lecture 19 Planning of changes
Lecture 20 Resources
Lecture 21 Competence
Lecture 22 Awareness
Lecture 23 Communication
Lecture 24 Documented information
Lecture 25 Control of documented information
Lecture 26 Operational planning and control
Lecture 27 Information security risk assessment and treatment
Lecture 28 Monitoring, measurement, analysis and evaluation
Lecture 29 Internal audit
Lecture 30 Management review
Lecture 31 Continual improvement
Lecture 32 Nonconformity and corrective action
Section 3: Organizational controls
Lecture 33 Information security controls
Lecture 34 Policies. Roles and responsibilities. Segregation of duties
Lecture 35 Contact with authorities and special interest groups
Lecture 36 Threat intelligence. Information security in project management
Lecture 37 Inventory and acceptable use of information and assets. Return of assets.
Lecture 38 Information classification and labelling
Lecture 39 Information transfer
Lecture 40 Access control
Lecture 41 Identity management. Authentication management. Access rights.
Lecture 42 Information security in supplier relationships and agreements
Lecture 43 Information security in the ICT supply chain
Lecture 44 Monitoring, review and change management of supplier services
Lecture 45 Information security for the use of cloud services
Lecture 46 Information security incident management
Lecture 47 Learning from incidents and collecting evidence
Lecture 48 Information security during disruption and ICT readiness for business continuity
Lecture 49 Legal, statutory, regulatory and contractual requirements
Lecture 50 Intellectual property. Protection of records. Privacy and protection of PII
Lecture 51 Independent review. Compliance with policies, rules and standards
Lecture 52 Documented operating procedures
Section 4: People controls
Lecture 53 Screening. Terms and conditions of employment.
Lecture 54 Awareness, training and education. Disciplinary process
Lecture 55 Termination or change of employment
Lecture 56 Remote working
Lecture 57 Information security event reporting
Section 5: Physical controls
Lecture 58 Security perimeters. Physical entry. Securing offices, rooms and facilities
Lecture 59 Physical security monitoring. Physical and environmental threats
Lecture 60 Work in secure areas. Clear desk and clear screen
Lecture 61 Equipment siting and protection. Assets off-premises
Lecture 62 Storage media
Lecture 63 Supporting utilities. Cabling security
Lecture 64 Equipment maintenance, disposal or re-use
Section 6: Technological controls
Lecture 65 User end point devices
Lecture 66 Privileged access rights. Information access restriction. Access to source code
Lecture 67 Secure authentication
Lecture 68 Capacity management
Lecture 69 Protection against malware. Technical vulnerability management
Lecture 70 Configuration management. Information deletion
Lecture 71 Data masking and data leakage prevention
Lecture 72 Backup and redundancy of information processing facilities
Lecture 73 Logging
Lecture 74 Monitoring activities and clock synchronization
Lecture 75 Privileged utility programs. Software installation on operational systems
Lecture 76 Networks security
Lecture 77 Security of network services and segregation of networks
Lecture 78 Web filtering
Lecture 79 Use of cryptography
Lecture 80 Secure development life cycle. Application security requirements
Lecture 81 Secure system architecture and engineering principles
Lecture 82 Secure coding. Security testing in development and acceptance
Lecture 83 Outsourced development
Lecture 84 Separation of development, test and production environments
Lecture 85 Change management
Lecture 86 Test information and the protection of systems during audit testing
Lecture 87 The certification to ISO/IEC 27001
Lecture 88 Thank you and good bye!
Information security managers,Information security consultants and auditors,Information security officers,Information security risk specialists,Managers and business owners,People involved in the implementation and administration of information security management systems according to ISO/IEC 27001,Information security management enthusiasts