Information Security Management System (ISO 27001:2013) Installation Expertise (Consultancy) Certificate Training

Name of Training Information Security Management System (ISO 27001:2013) Installation Expertise (Consultancy) Certificate Training
Educator’s Name, Surname  
Education Place  
Education History  
Education Time 90 hours or 15 person. day (6 hours / day)
Education Fee
Purpose of Education
  • Learning the Information Security Management System (ISO 27001:2013 – ISMS) at a level that can be installed throughout a large-scale company
  • Learning information security concepts
  • Providing awareness about information security incidents
  • Learning and preparing the necessary documents for the Information Security
  • Management System installation
Benefits of Education
  • Having the knowledge to provide installation consultancy for the Information Security
  • Management System (ISO 27001:2013) throughout a large-scale company
  • Having knowledge of an up-to-date and legally enforced management system
  • Having knowledge about industry experiences
  • To provide added value to people who are in the process of starting business life, at the start of employment
  • To provide people in business life with the opportunity to work in relevant departments and projects within the company
  • Being able to accurately determine personal precautions by learning information security issues
  • Having knowledge about the document structure required for a large-scale company
  • Having knowledge about the document creation process
  • Having the ability to prepare the necessary documents with sample workshops
Destination
  • Information Security Management System (ISO 27001:2013) installation specialist (consultant) certificate
Contents 1.      Basic Concepts

a.      What is information?

b.      Elements that embody knowledge

c.      Information security components

2.      Ensuring Information Security awareness

a.       Information security principles

b.       Information security incidents

3.      ISO 27001:2013 standard articles

a.       Entrance

b.       Scope

c.       Referenced Standards and/or Documents

d.       Terms and Definitions

e.       Context (Framework) of the Organization

f.        Leadership

g.       Planning

h.       Support

i.        Operation (Operation)

j.        Performance Evaluation/Measurement

k.       Improvement

l.        APPENDIX A: Reference Control Objectives/Objectives and Controls

5.       Information security policies

6.       Organization of information security

7.       Human Resources Security

8.       Asset Management

9.       Access Control

10.     Cryptography

11.      Physical and Environmental Security

12.      Operational Safety

13.      Communication Security

14.      System Acquisition, Development and Maintenance

15.      Supplier Relations

16.      Information Security Violation Incident Management

17.      Information Security Issues of Business Continuity Management

18.     Rapport

4.     Project plan preparation

5.     Conducting Current Situation Analysis

6.     Preparation of necessary documents (the following documents are provided for informational purposes, other documents will be created)

a.        Information Security Management System Book

b.        Organization Context Procedure

c.        Process Analyzes

d.        Establishment Purposes Form

e.        BGYS Objectives BGSY Policy Form

f.         Internal and External Matters Form

g.        Interface and Dependencies_Process Analysis Result Form

h.        Written Information Document Management Procedure

i.         Risk, Business Impact Analysis and Business Continuity Procedure

j.         Risk Assessment Results Report

k.        Risk Management and Business Impact Analysis

l.         Business Continuity Plans

m.       Performance Evaluation Procedure

n.        Nonconformity and Incident Management Procedure

o.        Asset Inventory

p.        Backup Procedure

q.        Backup Plan

r.        System Records Management Procedure

s.        Internal audit Plan

t.        Management Review outputs

7.     Exam

 

Related Topics Management System, Internet, Cyber, Information Security, Consultancy, System Setup, Written Information, Document Management, Records, Forms, Roles, Responsibilities, Risk Management, Information Security Threats, ISO27001, ISO27002, Vulnerability, Password management , Network Security, Equipment Security, Legal Compliance, Mobile Devices, Remote Working, Information Transfer, Penetration Tests, Malware, Change Management, Capacity Management, Clean Table Clean Screen, Cable Security, Physical Access Control, Key Management, Access Rights, Portable Media, Classification of Information, Asset Inventory, Conditions of Employment, Training and Awareness of Employees, Information Security Roles, Authorities, Special Interest Groups, Project Management, Systems Engineering, Software Development, Acceptance Testing, Test Data, Backup, Emergency, Business Continuity, Protection of Corporate Records, Archive, Personal Information, Intellectual Property Rights,
Who Can Participate There is no participant prerequisite. Anyone who is interested in the current issues in the content can participate.