0% found this document useful (0 votes)
10 views

Course Objectives

Uploaded by

xasoc57433
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Course Objectives

Uploaded by

xasoc57433
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

TRECCERT ISO/IEC 27001 Lead Implementer Exam Preparation Course

Course Objectives

After completing this course, you will be able to:

1. Discuss the fundamental concepts of information security.


2. Describe the importance of information security.
3. Discuss the purpose and scope of management system standards.
4. Explain the purpose and scope of the ISO/IEC 27001 standard.
5. Explain what an information security management system (ISMS) is.
6. Navigate the ISO 27000 family of standards.
7. Discuss other information security standards and best practices.
8. Discuss the legal landscape of information security in the USA and Europe.
9. Implement an ISMS according to ISO/IEC 27001
10. Identify the key requirements and clauses of ISO/IEC 27001.
11. Describe the steps required to achieve ISO/IEC 27001 certification.
12. Outline the business case for ISO/IEC 27001
13. Discuss the audit process and certification maintenance.
14. Determine requirements relevant to information security
15. Draft the scope of an ISMS.
16. Determine information security objectives
17. Establish a structured information security documentation
18. Draft policies, processes and procedures to support the ISMS.
19. Understand the necessary competence and awareness for information security
20. Explain information security risk management methodologies
21. Conduct information security risk assessments
22. Develop and implement risk treatment plans.
23. Describe the planning and execution of internal audits.
24. Discuss how to address findings and implement corrective actions.
25. Apply metrics and KPIs to evaluate ISMS performance.
26. Discuss continual improvement processes for the ISMS.
27. Discuss the role of training in maintaining ISMS effectiveness.

Aron Lange 1

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy