Additional Information

Additional Information
  • Home

Account Navigation

Account Navigation

Currency - All prices are in AUD

Currency - All prices are in AUD
 Loading... Please wait...
  • Call us on 877-SOLARTECH
  • My Account
Solartech

CISMS-LI - Information Security Management Systems Lead Implementer

$2,500.00

CISMS-LI - Information Security Management Systems Lead Implementer

$2,500.00
Quantity:
Share

Product Description

COURSE OVERVIEW

The Certified Information Security Management Systems—Lead Implementer certification 4 day course prepares students to help any organization through the process of implementing an information security management systems (“ISMS”) that is compliant with ISO/IEC 27001:2013 standard. ISO/IEC 27001 was developed to set a higher standard for information security as a result of increased cyber security risk. Students will not only implement the ISO/IEC 27001 standard but also help organizations set up controls, processes, and procedures for using a ISMS that will facilitate enhanced information security.

The C)ISMS-LI is perfect for anyone looking to implement the ISO/IEC 27001 standard or to certify their ISO/IEC 27001 implementation expertise.

UPON COMPLETION

Students will:

• Acquire the necessary knowledge to manage an ISMS implementation
• Be ready to perform an ISO/IEC 27001 ISMS implementation
• Be ready to sit for the C)ISMS-LI exam.

PREREQUISITES

• A basic familiarity with information systems and an interest in implementation.

WHO SHOULD ATTEND

• IT System Implementer
• IT Auditor
• IT Consultant
• Chief Information Officer
• Security Consultant

COURSE CONTENT

Module 1 - Introduction

  • Agenda
  • Housekeeping
  • Exercise 1
  • Agenda
  • Learning objectives
  • Learning objectives
  • Implementation objectives
  • Implementation objectives cont.
  • Course structure
  • Examination
  • Certification

Module 2: History and Development of the ISMS

  • Agenda
  • The ISMS
  • The ISMS
  • Integration
  • Suitable for
  • Organizations of all Sizes
  • Assessment
  • The Evolution of ISO27001, 2
  • Recent Updates
  • ISO27002
  • Control Hierarchy
  • ISO27001
  • The ISMS
  • Constant Change and Improvement
  • Adoption of the ISMS
  • Exclusions

Module 3: Information Security Principles

  • Agenda
  • Key Terms
  • Information
  • Information Security Definition
  • Information Security
  • Context of the Organization
  • Leadership
  • Planning
  • Support
  • Operation
  • Performance evaluation
  • Improvement

Module 4: Risk Management

  • Agenda 
  • Risk 
  • Risk cont. 
  • Risk Management 
  • Define a Risk 
  • Assessment Approach 
  • Identify Risks 
  • What Is the Value of an Asset? 
  • What Is a Threat Source/Agent? 
  • What Is a Threat? 
  • What Is a Vulnerability? 
  • Assess and Evaluate Risk 
  • Risk Definitions 
  • Risk Acceptance 
  • Risk Treatment 
  • Definition of Controls 
  • Examples of Types of Controls 
  • Control Usage 
  • Controls (from Annex A) 
  • Comparing Cost and Benefit 
  • Cost of a Countermeasure 
  • Appropriate Controls 
  • Statement of Applicability

Module 5: Implementing an ISMS

  • Agenda 
  • Clause 4 Context of the Organization 
  • Leadership 
  • Policy 
  • Roles, 
  • Responsibilities and Authorities 
  • Planning 
  • Risk Assessment 
  • Support 
  • Operation 
  • Performance Evaluation 
  • Performance 
  • Evaluation Continued 
  • Management Review 
  • Improvement

Module 6: Auditing an ISMS

  • Agenda
  • Audit 
  • Audit Standards 
  • Nonconformity Report Format 
  • Major nonconformity 
  • Major Nonconformity Examples 
  • Major Nonconformity Examples 
  • Minor Nonconformity 
  • Minor nonconformity examples 
  • Agenda 
  • Summary 
  • The Examination

Product Reviews

Find Similar Products by Category