A new step-by-step way to get ISO/IEC 27001 certification
A new step-by-step way to get ISO/IEC 27001 certification, available at $49.99, has an average rating of 4.05, with 47 lectures, 8 quizzes, based on 82 reviews, and has 347 subscribers.
You will learn about How to implement sustainable information security management system ready for accredited certification in less than 60 days How to define ISMS scope without errors How to define useful and clear-vision-eye-opening security metrics How to define required level of security What to do with identified risks How to adopt very easy-to-use tools for designing security architecture Which documented information is required for successful certification How to improve information security management system How to pass accredited certification without any hassle What to do after the certification This course is ideal for individuals who are Information security professionals implementing ISO/IEC 27001 or Small business owners willing to implement ISMS them-selves or Information Security professionals willing to improve their knowledge on ISO/IEC 27001 It is particularly useful for Information security professionals implementing ISO/IEC 27001 or Small business owners willing to implement ISMS them-selves or Information Security professionals willing to improve their knowledge on ISO/IEC 27001.
Enroll now: A new step-by-step way to get ISO/IEC 27001 certification
Summary
Title: A new step-by-step way to get ISO/IEC 27001 certification
Price: $49.99
Average Rating: 4.05
Number of Lectures: 47
Number of Quizzes: 8
Number of Published Lectures: 47
Number of Published Quizzes: 8
Number of Curriculum Items: 55
Number of Published Curriculum Objects: 55
Original Price: €22.99
Quality Status: approved
Status: Live
What You Will Learn
- How to implement sustainable information security management system ready for accredited certification in less than 60 days
- How to define ISMS scope without errors
- How to define useful and clear-vision-eye-opening security metrics
- How to define required level of security
- What to do with identified risks
- How to adopt very easy-to-use tools for designing security architecture
- Which documented information is required for successful certification
- How to improve information security management system
- How to pass accredited certification without any hassle
- What to do after the certification
Who Should Attend
- Information security professionals implementing ISO/IEC 27001
- Small business owners willing to implement ISMS them-selves
- Information Security professionals willing to improve their knowledge on ISO/IEC 27001
Target Audiences
- Information security professionals implementing ISO/IEC 27001
- Small business owners willing to implement ISMS them-selves
- Information Security professionals willing to improve their knowledge on ISO/IEC 27001
This course will provide you with methods and techniques which have never been disclosed before, developed by one of the best information security experts – Paulius Petretis. Paulius spent years of his life helping various companies worldwide improving their security posture. After literally hundreds of projects and thousands of consulting hours, he came up with a secret easy-to-follow formula how to implement information security management system (ISMS) within a very limited timeframe and a modest budget.
In this course Paulius shares his SIMPLEISMS implementation formula for a fraction of price you would typically spend on consulting with him to be able to find it out. This formula will enable you to:
· set ISMS scope correctly,
· identify information security related external, internal and business requirements with ease using CLUB method,
· create an amazing information security architecture with TOP-COPIED,
· draft needed documents with PaPeRS,
· add necessary integrity into your ACTIVE security communication,
· constantly IMProve and
· certify your ISO/IEC27001-based ISMS successful.
All with a use of a simple magical formula just in 60 days!
Supported with graphical illustrations you will find out how incident management, risk management and business continuity management processes are related, what is known- and unknown- uncertainty, which levels of risks should be acceptable, how training and education differ, how security management can be measured.
Understanding these principles will get you ready for really exciting more advanced formulas.
Course Curriculum
Chapter 1: Introduction
Lecture 1: Magic Information Security Secrets
Chapter 2: Why You Need ISMS
Lecture 1: What ISO/IEC27001 Is About?
Lecture 2: What Can Be Certified?
Lecture 3: CONs and PROs
Lecture 4: Other Frameworks to Consider
Lecture 5: Business Case
Chapter 3: The story begins
Lecture 1: ISMS Implementation Timeframe
Lecture 2: Scope Definition
Lecture 3: Prepare for Change
Lecture 4: ISMS Roles
Lecture 5: Top Management Support
Chapter 4: Required level of security. Week 1 -2
Lecture 1: CLUB
Lecture 2: Contractual Obligations
Lecture 3: Legislation
Lecture 4: Uncertainty
Lecture 5: Business Intentions
Lecture 6: Risk Management
Lecture 7: Risk Identification and Analysis
Lecture 8: Assets
Lecture 9: Threats
Lecture 10: Risk Evaluation
Lecture 11: Impact Assessment
Lecture 12: Acceptable risk
Lecture 13: Management of Unacceptable Risks
Lecture 14: Management of Acceptable Risks
Chapter 5: Security Architecture. Week 2-3
Lecture 1: TOP architecture
Lecture 2: TOP architecture COPIED
Lecture 3: Shift-ups and Shift-downs in Security Architecture
Lecture 4: à la carte of Controls
Lecture 5: Security Objectives
Lecture 6: Implementation of Security Architecture
Chapter 6: ISMS documentation. Week 2-5
Lecture 1: ISMS PaPeRS
Lecture 2: Mandatory ISMS Documentation
Chapter 7: Spread the news. Week 1-8
Lecture 1: ACTIVE
Lecture 2: ISMS Change Management
Lecture 3: ISMS Project Management
Chapter 8: Improve. Week 7
Lecture 1: Internal Audit
Lecture 2: Management Review
Lecture 3: Evidence
Lecture 4: Everything Put Together
Chapter 9: Certification. Week 8
Lecture 1: Preparation
Lecture 2: Certificate
Lecture 3: DAY ZERO
Lecture 4: DAY ONE
Lecture 5: Surveillance Audits
Lecture 6: Areas of improvement
Lecture 7: BONUS LECTURE. Most asked questions and answers
Instructors
-
Paulius Petretis
Business Resilience Expert
Rating Distribution
- 1 stars: 3 votes
- 2 stars: 0 votes
- 3 stars: 20 votes
- 4 stars: 24 votes
- 5 stars: 35 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Digital Marketing Foundation Course
- Google Shopping Ads Digital Marketing Course
- Multi Cloud Infrastructure for beginners
- Master Lead Generation: Grow Subscribers & Sales with Popups
- Complete Copywriting System : write to sell with ease
- Product Positioning Masterclass: Unlock Market Traction
- How to Promote Your Webinar and Get More Attendees?
- Digital Marketing Courses
- Create music with Artificial Intelligence in this new market
- Create CONVERTING UGC Content So Brands Will Pay You More
- Podcast: The top 8 ways to monetize by Podcasting
- TikTok Marketing Mastery: Learn to Grow & Go Viral
- Free Digital Marketing Basics Course in Hindi
- MailChimp Free Mailing Lists: MailChimp Email Marketing
- Automate Digital Marketing & Social Media with Generative AI
- Google Ads MasterClass – All Advanced Features
- Online Course Creator: Create & Sell Online Courses Today!
- Introduction to SEO – Basic Principles of SEO
- Affiliate Marketing For Beginners: Go From Novice To Pro
- Effective Website Planning Made Simple