Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Chapter 2 Overview (1:03)
- Management Systems (9:37)
- Information Security Management Systems (5:59)
- International Standards (2:55)
- ISO 27000 Family of Standards (8:41)
- Other Frameworks worth knowing (11:52)
- ISO/IEC 27001 Overview (6:46)
- History of ISO/IEC 27001 (2:38)
- Review Questions: Chapter 2
- Chapter 2 Summary (1:36)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Step 2 Overview (2:43)
- Context Analysis Process (2:42)
- Clause 4.1: Understanding the organization and its context (8:57)
- Clause 4.2: Understanding the needs and expectations of interested parties (7:13)
- Control A.5.31: Legal, statutory, regulatory and contractual requirements (5:04)
- Clause 4.3: Determining the scope of the ISMS (6:44)
- Clause 4.4: Information Security Management System (6:06)
- Review Questions: Step 2
- BlitzX Engineering - Company Profile (1:44)
- Case Study: Scope of the ISMS (0:43)
- Step 2 Summary (1:55)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Step 4 Overview (2:30)
- Clause 6.2: Information Security Objectives (10:42)
- Clause 5.2: Policy (6:47)
- Control A.5.1: Policies for Information Security (2:48)
- Policy Management Process (3:38)
- Clause 7.4: Communication (2:40)
- Communication Process (4:05)
- Review Questions: Step 4
- Case Study: Information Security Objectives (1:01)
- Step 4 Summary (3:20)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Step 7 Overview (4:39)
- Risk Management Fundamentals (6:39)
- Risk Management Process (4:26)
- Clause 6.1.1: General (3:43)
- Clause 6.1.2: Information Security Risk Assessment (8:39)
- Risk Assessment Process (3:32)
- Clause 6.1.3: Information Security Risk Treatment (7:19)
- Risk Treatment Process (5:11)
- Resource: Risk Management Procedures
- Review Questions: Step 7
- Step 7 Summary (1:46)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Learning Objectives
- A.5.1 Policies for information security (2:48)
- A.5.2 Information security roles and responsibilities (1:35)
- A.5.3 Segregation of duties (1:20)
- A.5.4 Management responsibilities (1:38)
- A.5.5 Contact with authorities (1:21)
- A.5.6 Contact with special interest groups (1:29)
- A.5.7 Threat intelligence (2:17)
- A.5.8 Information security in project management (2:09)
- A.5.9 Inventory of information and other associated assets (6:01)
- A.5.10 Acceptable use of information and other associated assets (1:22)
- A.5.11 Return of assets (1:34)
- A.5.12 Classification of information (5:26)
- A.5.13 Labelling of information (4:11)
- A.5.14 Information transfer (2:26)
- A.5.15 Access control (1:38)
- A.5.16 Identity management (1:02)
- A.5.17 Authentication information (1:32)
- A.5.18 Access rights (0:58)
- Supplier Management Process (2:40)
- A.5.19 Information security in supplier relationships (2:10)
- A.5.20 Addressing information security within supplier agreements (1:51)
- A.5.21 Managing information security in the information and communication technology (ICT) supply chain (1:05)
- A.5.22 Monitoring, review and change management of supplier services (1:23)
- A.5.23 Information security for use of cloud services (1:50)
- Information Security Incident Management Process (3:02)
- A.5.24 Information security incident management planning and preparation (1:34)
- A.5.25 Assessment and decision on information security events (0:51)
- A.5.26 Response to information security incidents (1:21)
- A.5.27 Learning from information security incidents (1:08)
- A.5.28 Collection of evidence (1:09)
- A.5.29 Information security during disruption (0:49)
- A.5.30 ICT readiness for business continuity (1:53)
- A.5.31 Legal, statutory, regulatory and contractual requirements (5:12)
- A.5.32 Intellectual property rights (1:25)
- A.5.33 Protection of records (1:55)
- A.5.34 Privacy and protection of personal identifiable information (PII) (1:00)
- A.5.35 Independent review of information security (1:09)
- A.5.36 Compliance with policies, rules and standards for information security (1:06)
- A.5.37 Documented operating procedures (0:52)
Available in
days
days
after you enroll
- Learning Objectives
- A.6.1 Screening (7:16)
- A.6.2 Terms and conditions of employment (4:23)
- A.6.3 Information security awareness, education and training (6:33)
- A.6.4 Disciplinary process (4:12)
- A.6.5 Responsibilities after termination or change of employment (4:50)
- A.6.6 Confidentiality or non-disclosure agreements (4:39)
- A.6.7 Remote working (5:38)
- A.6.8 Information security event reporting (4:26)
Available in
days
days
after you enroll
- Learning Objectives
- A.7.1 Physical security perimeters (8:52)
- A.7.2 Physical entry (6:21)
- A.7.3 Securing offices, rooms and facilities (4:14)
- A.7.4 Physical security monitoring (4:12)
- A.7.5 Protecting against physical and environmental threats (3:57)
- A.7.6 Working in secure areas (3:05)
- A.7.7 Clear desk and clear screen (6:34)
- A.7.8 Equipment siting and protection (4:49)
- A.7.9 Security of assets off-premises (5:45)
- A.7.10 Storage media (6:09)
- A.7.11 Supporting utilities (5:30)
- A.7.12 Cabling security (5:53)
- A.7.13 Equipment maintenance (4:36)
- A.7.14 Secure disposal or re-use of equipment (3:34)
Available in
days
days
after you enroll
- Learning Objectives
- A.8.1 User end point devices (1:42)
- A.8.2 Privileged access rights (2:07)
- A.8.3 Information access restriction (1:52)
- A.8.4 Access to source code (1:55)
- A.8.5 Secure authentication (2:34)
- A.8.6 Capacity management (2:47)
- A.8.7 Protection against malware (2:28)
- A.8.8 Management of technical vulnerabilities (2:04)
- A.8.9 Configuration management (2:33)
- A.8.10 Information deletion (3:01)
- A.8.11 Data masking (2:05)
- A.8.12 Data leakage prevention (2:01)
- A.8.13 Information backup (2:17)
- A.8.14 Redundancy of information processing facilities (2:03)
- A.8.15 Logging (2:38)
- A.8.16 Monitoring activities (2:26)
- A.8.17 Clock synchronization (1:42)
- A.8.18 Use of privileged utility programs (1:36)
- A.8.19 Installation of software on operational systems (2:22)
- A.8.20 Networks security (2:03)
- A.8.21 Security of network services (1:35)
- A.8.22 Segregation of networks (2:16)
- A.8.23 Web filtering (1:38)
- A.8.24 Use of cryptography (2:09)
- A.8.25 Secure development life cycle (1:38)
- A.8.26 Application security requirements (1:59)
- A.8.27 Secure system architecture and engineering principles (3:07)
- A.8.28 Secure coding (2:59)
- A.8.29 Security testing in development and acceptance (1:47)
- A.8.30 Outsourced development (1:53)
- A.8.31 Separation of development, test and production environments (2:06)
- A.8.32 Change management (1:42)
- A.8.33 Test information (1:19)
- A.8.34 Protection of information systems during audit testing (1:24)
Available in
days
days
after you enroll
- Step 10 Overview (3:28)
- What is Compliance? (1:30)
- Clause 9.1: Monitoring, Measurement, Analysis and Evaluation (4:09)
- Performance Evaluation Process (2:12)
- Clause 9.2: Internal Audit (5:24)
- Internal Audit Process (3:43)
- Clause 9.3: Management Review (3:19)
- Management Review Process (3:37)
- Review Questions: Performance Evaluation
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll