Companies Home Search Profile

ISO/IEC 27001 (ISMS): Full Certification Bootcamp

Focused View

Martin Yanev

5:27:53

185 View
  • 1. What is Information Security.mp4
    05:44
  • 2. How ISO27001 Applies to You.mp4
    09:28
  • 3. What is it Imported to Safeguard Information.mp4
    05:44
  • 4. Safeguarding Summary.mp4
    14:02
  • 1. Assessing Business Needs.mp4
    07:19
  • 2. Scope and High-Level Timeframe for Implementation.mp4
    08:58
  • 3. High-Level Timeframe.mp4
    05:01
  • 1. Project Kick-Off.mp4
    07:40
  • 2. System Admin or Manager.mp4
    02:53
  • 3. Getting Commitment.mp4
    05:42
  • 1. Meeting the Team.mp4
    14:36
  • 2. Preparing the Analysis Report.mp4
    01:58
  • 1. Defining and Finalizing the Risk Assessment Framework.mp4
    04:42
  • 2. What is a Risk Ranking.mp4
    14:20
  • 3. Asset Disposal.mp4
    07:19
  • 4. Managing Risks.mp4
    05:37
  • 1. Information Security Awareness.mp4
    06:09
  • 2. Which Policies and Procedures are Covered.mp4
    10:22
  • 3. Change Management Policy.mp4
    07:39
  • 4. Legal Compliance Policy.mp4
    07:24
  • 5. Understanding and Implementing Controles.mp4
    16:32
  • 6. Mobile Device Policy.mp4
    06:23
  • 7. Asset Management.mp4
    13:02
  • 8. Cryptography.mp4
    05:53
  • 9. Physical and Environment Security.mp4
    06:42
  • 10. Operations Security.mp4
    16:31
  • 11. Network Security Management.mp4
    12:46
  • 12. Security Requirements of Information Systems.mp4
    08:29
  • 13. Information Security in Supplier Relationship.mp4
    17:03
  • 14. Information Security Continuity.mp4
    08:05
  • 1. Internal Audit.mp4
    06:18
  • 2. Audit Plan.mp4
    05:26
  • 3. Closing the Findings and Gaps.mp4
    06:41
  • 1. Plan Management and Review Meeting.mp4
    07:46
  • 2. Conduction the Review Meetings.mp4
    02:37
  • 3. Plan Improvement.mp4
    03:03
  • 1. External Audit.mp4
    08:11
  • 2. Best Practices.mp4
    08:41
  • 3. SWOT Analysis.mp4
    02:30
  • 1. Continual Improvement.mp4
    06:03
  • 2. Execution Plan.mp4
    06:34
  • Description


    Get certified for ISO 27001 and ISO 27002 Information Security Management Standards

    What You'll Learn?


    • Learn what is required for an organization to obtain ISO/IEC 27001 certification
    • Best practices for a successful cybersecurity program
    • To enable the aspirants to plan, conduct and manage ISMS external as well as internal audits
    • Implementation of an Information Security Management Systems
    • Prevent common attacks and learn how they work
    • Get practical auditing skills to become internationally recognized certified Lead
    • Master the requirements of ISO27001 and the information security controls
    • Guidance on Risk Management, Internal Control and Related Financial and Business Reporting
    • Information security controls and return on investment (ROI)
    • Learn risk assessment methodologies to apply to your organization

    Who is this for?


  • Cybersecurity Major Students
  • Everyone who wish to learn Cybersecurity
  • Database Managers
  • Stakeholders
  • IT Managers
  • IT Specialists
  • Business degree students
  • Risk management professionals
  • Business continuity practitioners
  • More details


    Description

    ISO/IEC 27001 is one of the most popular standards in the world. This ISO certification is very popular because it shows that an organization can trust its information because there are good controls in place to protect it.

    Organizations designing and implementing an ISMS according to ISO 27001 may be assessed by an independent certification body and be issued an accredited certificate of compliance if they are found to be ISO 27001 compliant after the audit. can be done.

    The standard is increasingly being recognized as a practical solution to the ever-expanding information-related regulatory requirements, enabling organizations to more cost-effectively address the increasingly complex and diverse information security threats in the modern information economy.  Companies around the world are working towards one ISO 27001 certification to demonstrate their information security commitment and intentions to their customers and other stakeholders.

    The biggest tech giants such as Apple and Google, financial institutions, healthcare providers, insurance companies, educational institutions, manufacturing and service companies, and businesses large and small around the world have implemented this standard and used it as proof. This course describes the requirements of ISO/IEC 27001 and 27002  how to implement an information security management system, what are the requirements of this standard and what solutions are available.

    This course is designed to extend the guidance already provided in other ISO 27001 implementation documents by the same authors. It utilizes new best practices in national and international risk assessment, including British Standard BS 7799-3 2017 (BS 7799-3) was published to align with the 2013 edition of ISO 27001. It also provides BS 7799-3 best practice guidelines and, at the same time, real business benefits.

    Who this course is for:

    • Cybersecurity Major Students
    • Everyone who wish to learn Cybersecurity
    • Database Managers
    • Stakeholders
    • IT Managers
    • IT Specialists
    • Business degree students
    • Risk management professionals
    • Business continuity practitioners

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Martin Yanev
    Martin Yanev
    Instructor's Courses
    My name is Martin Yanev I am internationally acclaimed Software & Aerospace Engineer.I have a Bachelor Degree in Aeronautical Engineering and a Master Degree in Aerospace Dynamics. I am Associate member of the Royal Aeronautical Society in the United Kingdom. I am ISTQB certified with solid experience in systems test/integration. I have gained my solid programming skills in the last 7 years by developing and testing complex software algorithms for Aerospace applications. I am currently involved in the Single European Sky Project that aims to increase the European airspace capacity by applying cutting edge Air Traffic Management Systems. Feel free to contact me on any topic related to Computer Science and Aerospace Engineering as I am truly interested in this fields. I hope you enjoy my courses and improve your career development with them.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 41
    • duration 5:27:53
    • Release Date 2023/02/20