- Search BSI
- Verify a Certificate
The cyberspace is a complex environment, involving different types of interactions between people, software, hardware and physical locations. This means the security requirements vary depending upon use, criticality and sensitivity of the information, as well as the level of collaboration between stakeholders.
International Standards such as ISO/IEC 27002 provide some best practice recommendations on information security controls, however risks relating to cybersecurity need extra technical guidance including:
This course will help you:
You will be able to:
Anyone who wants to learn:
The course is applicable to individuals from any size or type of organization who is currently, or will in the future, be involved in planning, implementing, maintaining, supervising or assessing information security, particularly as it relates to cybersecurity.
Prerequisites
You should have a basic knowledge of ISO/IEC 27001:2013 and ISO/IEC 27002:2013, as well as an understanding of the key principles of an information security management system.
It would be advantageous to have a basic understanding of risk management techniques and processes and knowledge of ISO/IEC 27005 or ISO 31000.
We also recommend that you have an awareness of cybersecurity issues and basic understanding of information security principles and terminology.
Some delegates on this course will have already attended our Information Security Management System (ISMS) Requirements of ISO 27001:2013, Information Security Management System (ISMS) Implementing ISO/IEC 27001:2013 course or Information Security Risk Management Training Course ISO/IEC 27005:2011.
We also recommend delegates have an understanding of the risk assessment approach currently employed in their organizations, should one exist.
Reach out and see how we can help guide you on your path to sustainable operational success.