Course contents
· The role and structure of an information security policy
· How to determine the scope of your ISMS
· How to identify information assets and information asset ownership
· How to carry out the information security risk assessment (the core competence of information security management)
· How to identify threats, vulnerabilities and impacts
· The benefits of, and key issues in selecting a risk assessment tool
· Writing policies and producing other critical documentation
· The importance of staff and general awareness training
· The key elements of management review
· How to manage and drive continual improvement
· How to prepare for your ISO 27001 certification audit
· Understand and the application of ISO27001 Annex Clauses
Delivery method
Presentation, discussion, case study, workshops and group activities
Certificate of attendance
Certificate of Attendance will be issued to participants who have attended more than 90% of the enrolled course hours