Saturday, July 31 2021

T 24v13 - E-Learning - ISO 27001 readiness version 2013

E-Learning (online course) - Implementation, maintenance, certification and improvement of your information security management system ISO 27001 version 2013 - You save 59 euros on the documents provided!

T 24v13 - E-Learning - ISO 27001 readiness version 2013
The quality certification was issued on 09/09/2020 under the following action category : Training courses
$237.34
Ex. VAT
T 24v13 - E-Learning - ISO 27001 readiness version 2013
See other trainings

See the online course T 44v13 ISO 27001 Internal audit

See the online training package T 74v13 ISO 27001

 

  Result of the training satisfaction survey : 80.8% Last update on July 28, 2021

Description of the online course for your information security management system ISO 27001: 2013

Discover the ISO 27001 standard version 2013 and

  • its content
  • its principles
  • its requirements
  • the stakes

Get used to

  • information security approach
  • information security management system (ISMS)
  • process approach
  • risk-based thinking
  • information security terminology
  • continual improvement

The important and fundamental elements of an information security management system

  • information security approach (quality management principles, PDCA cycle)
  • process approach (definitions, process types, mapping)
  • context of the company (customer requirements)
  • leadership of top management (commitments, responsibilities)
  • planning of the ISMS (risks, actions, objectives)
  • product realization and service provision (operational control, risk assessment and treatment)
  • performance evaluation (monitoring, measure, analysis, internal audits, management review)
  • improvement (nonconformities, corrective actions, continual improvement)
  • controls (Annex A)

The menu of the course

    • Presentation
    • MCT Beginning (10 questions)
    • 1 Information security
      • 1.1 History
      • 1.2 Scope
      • 1.3 Principles and steps
    • 2 Standards, definitions, books
      • 2.1 Standards
      • 2.2 Definitions
      • 2.3 Books
    • MCT Information security (9 questions)
    • 3 Process approach
      • 3.1 Process
      • 3.2 Process map
      • 3.3 Process approach
    • MCT Process approach (7 questions)
    • 4 Context
      • 4.1 The organization and its context
      • 4.2 Needs and expectations of interested parties
      • 4.3 Scope
      • 4.4 ISMS
    • Case Interested parties
    • Case Customer and need
    • Case Priority tasks
    • Summary of clause 4
    • MCT Context (7 questions)
    • 5 Leadership
      • 5.1 Leadership and commitment
      • 5.2 Policy
      • 5.3 Roles, responsibilities and authorities
    • Case New line
    • Summary of clause 5
    • MCT Leadership (7 questions)
    • 6 Planning
      • 6.1 Actions to address risks
      • 6.2 Objectives
    • Case New risk
    • Case Risk treatment
    • Case Risk register
    • Summary of clause 6
    • MCT Planning (9 questions)
    • 7 Support
      • 7.1 Resources
      • 7.2 Competence
      • 7.3 Awareness
      • 7.4 Communication
      • 7.5 Documented information
    • Case Communication
    • Summary of clause 7
    • MCT Support (7 questions)
    • 8 Operation
      • 8.1 Operational planning and control
      • 8.2 Risk assessment
      • 8.3 Risk treatment
    • Case Design review
    • Case Process stability
    • Summary of clause 8
    • MCT Operation (6 questions)
    • 9 Performance
      • 9.1 Inspection, analysis and evaluation
      • 9.2 Internal audit
      • 9.3 Management review
    • Case Audit readiness
    • Case Auditor question
    • Case Audit program
    • Case Audit report
    • Case Management review
    • Summary of clause 9
    • MCT Performance (7 questions)
    • 10 Improvement
      • 10.1 Nonconformity and corrective action
      • 10.2 Continual improvement
    • Case Nonconformities
    • Case Kaizen and problem
    • Summary of clause 10
    • MCT Improvement (8 questions)
    • Annex A
    • A.5-A.9 Information security organization
    • Case Classification of information
    • Case Password
    • Summary of annexes A.5-A.9
    • MCT Annexes A.5-A.9 (9 questions)
    • A.10-A.13 Operational security
    • Case Incident log
    • Summary of annexes A.10-A.13
    • MCT Annexes A.10-A.13 (7 questions)
    • A.14-A.18 Protection of information systems
    • Case Selecting suppliers
    • Case Response to an incident
    • Summary of annexes A.14-A.18
    • MCT Annexes A.14-A.18 (8 questions)
    • MCT End (20 questions)

Read more about the online course ISO 27001

 Goal of the module:

Readiness for implementation, certification, maintenance and improvement of your information security management system (ISO 27001) in order to:

  • guarantee the confidentiality, integrity, availability and traceability of information
  • reduce information security risks
  • seize opportunities for continual improvement
  • improved image of the company
  • a step ahead of the competition
  • enhanced customer satisfaction
  • better economic results
  • increased daily efficiency
  • staff is aware, consulted, motivated and proud
  • high level of risk control
  • reduced insurrance costs
  • profitable engagement for all
  • best practices valorized
  • formalization of knowledge
  • process control
  • legal obligations updated

None


Any person involved in the preparation and implementation of an ISO 27001 information security management system:

  • pilot of ISO 27001 certification project
  • director
  • information security manager
  • computer technician
  • quality director
  • quality manager
  • metrology manager
  • safety manager
  • maintenance manager
  • project leader
  • quality correspondent
  • quality technician
  • quality assistant
  • quality operator
  • quality mission personnel
  • internal auditor
  • student

21 hours online on average (according to knowledge and aptitudes, this duration can vary individually). One hour of online training is equivalent to at least 2 hours of training on the spot.


At the end of the module, you will be able to:

  • interpret the requirements of the ISO 27001 standard
  • take part in the development of the information security policy and objectives
  • take part in the implementation of the document system
  • understand and implement the 7 quality management principles
  • evaluate the ISO 27001 certification project
  • be familair with the steps and tools for implementation of your ISMS


Methods and tools

  • dedicated Internet site
  • specific online training module
  • Open and Distance Learning (ODL) teaching
  • your training history:
    • the time you have passed on each clause and subclause of the module
    • the record of the score of all your trials of the MCTs (multiple-choice tests)
  • level test at beginning of the training
  • 13 tests (MCTs) with comments, notes on a 20 point scale and recommendations
  • videos
  • true stories
  • good practices
  • bad practices
  • case studies
  • jokes
  • games
  • online tutorial :
    • a follow up of acquired material and the progress of each trainee
    • online or by e-mail within 24 hours
    • personalized answers to questions
    • advice and recommendations about documents, books and useful links
  • delivered certificate of attendance and mastery at the end of the training (example)

Access to the course is 60 days from the date of validation of your order. This period will be renewed for free upon a simple request within 6 months

Test your knowledge of the requirements of ISO 27001 version 2013 in relation to the clauses and sub-clauses of the standard by answering the questions of the:

quiz ISO 27001 version 2013

Here is a MCT (Multiple-choice test) to evaluate, before beginning, the level of your knowledge for this course. (One or more correct answers are possible). You can start again as many times you wish.

None 1. The ISO 27001 standard defines for an information security management system:

None 2. The statement of applicability (SoA) allows you to:

None 3. Assessing the risks allows us to:

None 4. Staff are made aware of, among other things:

None 5. Examples of processes that can be outsourced:

None 6. The internal audit:

None 7. The treatment of nonconformities includes activities such as:

None 8. Staff are regularly made aware of:

None 9. Physical and environmental security, among others, includes:

None 10. Response to an incident includes, among other things: