Protecting information technology (IT) systems is vital, since any disruption to the quality, quantity, distribution or relevance of the data can jeopardize the business. Organizations must manage IT security – especially the protection of business-critical information – both actively and continuously to ensure operational continuity and data integrity.
The course teaches you that ISO 27001:2005 (Information Security Management System) comprises three basic principles: Confidentiality, Integrity, Availability. By the end of the training, you will be able to specify the responsibility and authority required to implement an ISMS. You will also know how to identify, quantify and prioritize the information security risks in any organization, and have the ability to propose concepts associated with information security in general.
Course outline:
- Introduction to information security management
- Concepts and application of information security
- Responsibility and authority of the ISMS – processes involved
- Risk assessment: tools and techniques
- Knowledge and application of ISO 27001
- Planning an ISMS
Find out more about our ISO 27001 ISMS Implementation Training course by contacting SGS today.