Linkedin Learning
Linkedin Learning Logo

ISO 27001:2013-Compliant Cybersecurity: Getting Started 

  • Offered byLinkedin Learning

ISO 27001:2013-Compliant Cybersecurity: Getting Started
 at 
Linkedin Learning 
Overview

Gain a comprehensive overview of the Cybersecurity principles and concepts

Duration

2 hours

Total fee

1,150

Mode of learning

Online

Difficulty level

Beginner

Credential

Certificate

ISO 27001:2013-Compliant Cybersecurity: Getting Started
 at 
Linkedin Learning 
Highlights

  • Earn a certificate upon completion
Details Icon

ISO 27001:2013-Compliant Cybersecurity: Getting Started
 at 
Linkedin Learning 
Course details

What are the course deliverables?
  • Information Security Management
  • Cybersecurity
More about this course
  • In this new two-part course, instructor Marc Menninger takes a closer look at what the ISO 27001 standard is and why it?s used around the world to build information security programs that work
  • Discover why the ISO 27001 standard is one of the most popular frameworks for building effective cybersecurity programs
  • Learn what it takes to comply with and become certified as compliant with the standard
  • Find out how the standard is organized, get a description of the certification process, and explore an easy-to-follow, step-by-step plan for building a cybersecurity program that?s ISO 27001-compliant as defined by clauses four through ten
  • Along the way, Marc gives you handy reference documents and checklists that you can use to retain what you learn and track your compliance progress
Read more

ISO 27001:2013-Compliant Cybersecurity: Getting Started
 at 
Linkedin Learning 
Curriculum

Introduction

The international standard for information security

Who this course is for and prerequisites

1. ISO 27001 Overview

What is the ISO 27001 standard?

Breaking down the ISO 27001 standard

Why build an ISO 27001-compliant cybersecurity program?

ISO 27001 gaps and criticisms

2. Complying with ISO 27001

ISO 27001 compliance and certification

What to expect when getting ISO 27001 certified

Building your ISO 27001 compliance plan

Begin the ISO 27001 compliance process: Introduction to Clauses 4 through 10

3. Context of the Organization (Clause 4)

Context of the organization and needs of interested parties (Clauses 4.1 and 4.2)

The Information security management system (ISMS) and its scope (Clauses 4.3 and 4.4)

4. Leadership (Clause 5)

Leadership and commitment (Clause 5.1)

Policy (Clause 5.2)

Organizational roles, responsibilities, and authorities (Clause 5.3)

5. Planning (Clause 6)

Information security risk assessment (Clause 6.1.2)

Information security risk treatment (Clause 6.1.3)

Information security objectives and planning to achieve them (Clause 6.2)

6. Support and Operation (Clauses 7 and 8)

Resources, competence, and awareness (Clauses 7.1, 7.2, and 7.3)

Communication (Clause 7.4)

Documented information (Clause 7.5)

Operational planning and control, risk assessment, and risk treatment (Clauses 8.1, 8.2, and 8.3)

Other courses offered by Linkedin Learning

– / –
1 hours
Intermediate
899
1 hours
Intermediate
– / –
1 hours
Advanced
1.85 K
1 hours
Intermediate
View Other 504 CoursesRight Arrow Icon
qna

ISO 27001:2013-Compliant Cybersecurity: Getting Started
 at 
Linkedin Learning 

Student Forum

chatAnything you would want to ask experts?
Write here...