T 24v13 - E-Learning - ISO 27001 readiness version 2013
E-Learning (online course) - Implementation, maintenance, certification and improvement of your information security management system ISO 27001 version 2013 - You save 59 euros on the documents provided!
|
||||
![]() |
|
|||
See the online course T 44v13 ISO 27001 Internal audit See the online training package T 74v13 ISO 27001 |
Result of the training satisfaction survey : | 82.4% | Last update on May 08, 2023 |
Description of the online course for your information security management system ISO 27001: 2013
Discover the ISO 27001 standard version 2013 and
- its content
- its principles
- its requirements
- the stakes
Get used to
- information security approach
- information security management system (ISMS)
- process approach
- risk-based thinking
- information security terminology
- continual improvement
The important and fundamental elements of an information security management system
- information security approach (quality management principles, PDCA cycle)
- process approach (definitions, process types, mapping)
- context of the company (customer requirements)
- leadership of top management (commitments, responsibilities)
- planning of the ISMS (risks, actions, objectives)
- product realization and service provision (operational control, risk assessment and treatment)
- performance evaluation (monitoring, measure, analysis, internal audits, management review)
- improvement (nonconformities, corrective actions, continual improvement)
- controls (Annex A)
The menu of the course
- Presentation
- MCT Beginning (10 questions)
- 1 Information security
- 1.1 History
- 1.2 Scope
- 1.3 Principles and steps
- 1.1 History
- 2 Standards, definitions, books
- 2.1 Standards
- 2.2 Definitions
- 2.3 Books
- 2.1 Standards
- MCT Information security (9 questions)
- 3 Process approach
- 3.1 Process
- 3.2 Process map
- 3.3 Process approach
- 3.1 Process
- MCT Process approach (7 questions)
- 4 Context
- 4.1 The organization and its context
- 4.2 Needs and expectations of interested parties
- 4.3 Scope
- 4.4 ISMS
- 4.1 The organization and its context
- Case Interested parties
- Case Customer and need
- Case Priority tasks
- Summary of clause 4
- MCT Context (7 questions)
- 5 Leadership
- 5.1 Leadership and commitment
- 5.2 Policy
- 5.3 Roles, responsibilities and authorities
- 5.1 Leadership and commitment
- Case New line
- Summary of clause 5
- MCT Leadership (7 questions)
- 6 Planning
- 6.1 Actions to address risks
- 6.2 Objectives
- 6.1 Actions to address risks
- Case New risk
- Case Risk treatment
- Case Risk register
- Summary of clause 6
- MCT Planning (9 questions)
- 7 Support
- 7.1 Resources
- 7.2 Competence
- 7.3 Awareness
- 7.4 Communication
- 7.5 Documented information
- 7.1 Resources
- Case Communication
- Summary of clause 7
- MCT Support (7 questions)
- 8 Operation
- 8.1 Operational planning and control
- 8.2 Risk assessment
- 8.3 Risk treatment
- 8.1 Operational planning and control
- Case Design review
- Case Process stability
- Summary of clause 8
- MCT Operation (6 questions)
- 9 Performance
- 9.1 Inspection, analysis and evaluation
- 9.2 Internal audit
- 9.3 Management review
- 9.1 Inspection, analysis and evaluation
- Case Audit readiness
- Case Auditor question
- Case Audit program
- Case Audit report
- Case Management review
- Summary of clause 9
- MCT Performance (7 questions)
- 10 Improvement
- 10.1 Nonconformity and corrective action
- 10.2 Continual improvement
- 10.1 Nonconformity and corrective action
- Case Nonconformities
- Case Kaizen and problem
- Summary of clause 10
- MCT Improvement (8 questions)
- Annex A
- A.5-A.9 Information security organization
- Case Classification of information
- Case Password
- Summary of annexes A.5-A.9
- MCT Annexes A.5-A.9 (9 questions)
- A.10-A.13 Operational security
- Case Incident log
- Summary of annexes A.10-A.13
- MCT Annexes A.10-A.13 (7 questions)
- A.14-A.18 Protection of information systems
- Case Selecting suppliers
- Case Response to an incident
- Summary of annexes A.14-A.18
- MCT Annexes A.14-A.18 (8 questions)
- MCT End (20 questions)
Read more about the online course ISO 27001
Goal of the module:
Readiness for implementation, certification, maintenance and improvement of your information security management system (ISO 27001) in order to:
- guarantee the confidentiality, integrity, availability and traceability of information
- reduce information security risks
- seize opportunities for continual improvement
- improved image of the company
- a step ahead of the competition
- enhanced customer satisfaction
- better economic results
- increased daily efficiency
- staff is aware, consulted, motivated and proud
- high level of risk control
- reduced insurrance costs
- profitable engagement for all
- best practices valorized
- formalization of knowledge
- process control
- legal obligations updated
None
Any person involved in the preparation and implementation of an ISO 27001 information security management system:
- pilot of ISO 27001 certification project
- director
- information security manager
- computer technician
- quality director
- quality manager
- metrology manager
- safety manager
- maintenance manager
- project leader
- quality correspondent
- quality technician
- quality assistant
- quality operator
- quality mission personnel
- internal auditor
- student
21 hours online on average (according to knowledge and aptitudes, this duration can vary individually). One hour of online training is equivalent to at least 2 hours of training on the spot.
At the end of the module, you will be able to:
- interpret the requirements of the ISO 27001 standard
- take part in the development of the information security policy and objectives
- take part in the implementation of the document system
- understand and implement the 7 quality management principles
- evaluate the ISO 27001 certification project
- be familair with the steps and tools for implementation of your ISMS
Methods and tools
- dedicated Internet site
- specific online training module
- Open and Distance Learning (ODL) teaching
- your training history:
- the time you have passed on each clause and subclause of the module
- the record of the score of all your trials of the MCTs (multiple-choice tests)
- level test at beginning of the training
- 13 tests (MCTs) with comments, notes on a 20 point scale and recommendations
- videos
- true stories
- good practices
- bad practices
- case studies
- jokes
- games
- online tutorial :
- a follow up of acquired material and the progress of each trainee
- online or by e-mail within 24 hours
- personalized answers to questions
- advice and recommendations about documents, books and useful links
- delivered certificate of attendance and mastery at the end of the training (example)
Access to the course is 60 days from the date of validation of your order. This period will be renewed for free upon a simple request within 6 months
ISO 27001 requirements version 2013
Test your knowledge of the requirements of ISO 27001 version 2013 in relation to the clauses and sub-clauses of the standard by answering the questions of the:
ISO 27001 Awareness Training 8' 20"
ISMS Based on ISO 27001 as an Information Security Strategy, M V Padmanabhayya, STQC 25' 44"
ISO 27001 Guide To Implementation 33' 30"
How to determine a proper scope selection based on ISO 27001? 46' 14"
Beginners ultimate guide to ISO 27001 Information Security Management Systems WEBINAR 1h 10' 49"
Here is a MCT (Multiple-choice test) to evaluate, before beginning, the level of your knowledge for this course. (One or more correct answers are possible). You can start again as many times you wish.
1. The ISO 27001 standard defines for an information security management system:
2. The statement of applicability (SoA) allows you to:
3. Assessing the risks allows us to:
4. Staff are made aware of, among other things:
5. Examples of processes that can be outsourced:
6. The internal audit:
7. The treatment of nonconformities includes activities such as:
8. Staff are regularly made aware of:
9. Physical and environmental security, among others, includes:
10. Response to an incident includes, among other things: