Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Iso/Iec 27001 Lead Auditor For Information Security

    Posted By: ELK1nG
    Iso/Iec 27001 Lead Auditor For Information Security

    Iso/Iec 27001 Lead Auditor For Information Security
    Published 1/2025
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 11.04 GB | Duration: 12h 15m

    Advance your information security career by mastering ISMS auditing to ISO/IEC 27001:2022

    What you'll learn

    Management system auditing principles and basics

    Requirements of ISO/IEC 27001 from the auditor's perspective

    Assessing the information security controls from ISO/IEC 27001

    Formulating findings and conculsions for the ISMS audit

    Requirements

    Familiarity with the framework for information security management proposed by ISO/IEC 27001 is useful but not mandatory

    Description

    This course will help you master Information Security Management System (ISMS) auditing and the requirements of ISO/IEC 27001:2022, equipping you with essential skills to advance your career in the rapidly growing field of information security.Compliance with international standards, such as ISO/IEC 27001, is now a critical requirement for organizations across industries, including finance, engineering, IT, transportation, professional services or manufacturing. Professionals skilled in assessing compliance and in guiding organizations to strengthen their information security are in high demand.By enrolling in this online course, you will gain a solid understanding of auditing fundamentals, the specific requirements of ISO/IEC 27001, the standard's proposed security controls, and how to evaluate compliance during an ISMS audit.The first part of the course introduces the foundational concepts of information security management systems. You will explore what an ISMS is, the standards within the ISO/IEC 27000 series, and the purpose and structure of ISO/IEC 27001:2022.Next, the course provides a comprehensive overview of management system auditing basics. You will learn about the core principles auditors must adhere to, effective methods for collecting audit evidence, and critical documents such as the audit programme, audit plan, and audit report. This section also delves into remote auditing, how to analyze audit findings and conclusions, and the differences between lead auditors and auditors, as well as internal and external audits.The subsequent section focuses on auditing the management system requirements of ISO/IEC 27001. Key topics include auditing the information security risk assessment, assessing the scope of the ISMS, reviewing the information security policy and objectives, evaluating the management reviews and the internal audits of the ISMS, auditing the statement of applicability and the risk treatment plan or reviewing how the organization manages nonconformities. Each topic is analyzed from an auditor's perspective, emphasizing the critical areas to evaluate during compliance assessments.The following four sections of the course address the main themes of information security controls as outlined in ISO/IEC 27001:2022:Organizational Controls, such as policies, supplier relationships, incident management, privacy and protection of personally identifiable information, access control, threat intelligence, information classification and labelling of the inventory of information and assets.People Controls, including screening, disciplinary process, information security education and training, confidentiality and non-disclosure agreements.Physical Controls, focusing on securing the infrastructure, protecting against natural and environmental threats, cabling security, protecting assets off-premises or managing storage media throughout its life cycle.Technological Controls, covering topics like cryptography, malware protection, network security, secure development, capacity management, backups, information deletion, data masking, vulnerability management or system redundancy.This course provides suggestions for assessing during the ISMS audit challenges such as those posed by remote working, or the use of personal devices for work purposes (BYOD) . You will gain actionable insights into how auditors can evaluate compliance with these controls effectively.The final section of the course focuses on closing the ISMS audit, covering how to formulate the audit's findings and conclusions, how to conduct the closing meeting and plan the necessary post-audit activities.This course provides a complete and detailed exploration of ISO/IEC 27001 requirements, with inputs from related standards such as ISO/IEC 27002, ISO/IEC 27005, and ISO/IEC 27035. It combines theoretical knowledge with practical examples, offering auditors valuable guidance on where to focus to gather meaningful evidence.Whether you are a professional aiming to advance your career as an ISMS auditor or preparing for an upcoming audit, this course offers a structured and comprehensive approach to mastering ISO/IEC 27001:2022 ISMS auditing.

    Overview

    Section 1: Introduction

    Lecture 1 Introduction

    Lecture 2 What is an ISMS (Information Security Management System)?

    Lecture 3 The ISO/IEC 27000 series of standards

    Lecture 4 About ISO/IEC 27001:2022

    Lecture 5 Certification to ISO/IEC 27001

    Section 2: Generic aspects about management system auditing

    Lecture 6 What is a management system audit?

    Lecture 7 Principles of management system auditing

    Lecture 8 What is an audit programme?

    Lecture 9 Preparing for an audit

    Lecture 10 The audit team

    Lecture 11 Lead auditor vs. Auditor

    Lecture 12 The audit plan

    Lecture 13 Conducting an audit

    Lecture 14 Collecting and recording evidence

    Lecture 15 Remote auditing

    Lecture 16 Audit findings and conclusions

    Lecture 17 The audit report and post-audit activities

    Section 3: Auditing the management system requirements in ISO/IEC 27001:2022

    Lecture 18 Strategy for auditing an ISMS

    Lecture 19 Audit and documented information

    Lecture 20 Auditing top management

    Lecture 21 Context of the organization

    Lecture 22 The scope of the ISMS

    Lecture 23 Leadership and commitment

    Lecture 24 The information security policy

    Lecture 25 Organizational roles, responsibilities and authorities

    Lecture 26 Addressing risks and opportunities

    Lecture 27 The information security risk assessment

    Lecture 28 Information security risk treatment

    Lecture 29 The Statement of Applicability (SoA)

    Lecture 30 Information security objectives and planning to achieve them

    Lecture 31 Planning of changes

    Lecture 32 Resources

    Lecture 33 Competence and awareness

    Lecture 34 Communication

    Lecture 35 The ISMS documented information

    Lecture 36 Operational planning and control

    Lecture 37 Monitoring, measurement, analysis and evaluation

    Lecture 38 Internal audit

    Lecture 39 Management review

    Lecture 40 Continual improvement

    Lecture 41 Management of nonconformities

    Lecture 42 Recapitulation - Management system requirements of ISO/IEC 27001:2022

    Section 4: Organizational controls

    Lecture 43 Considerations about the organizational controls

    Lecture 44 Policies and procedures for information security

    Lecture 45 Information security roles and responsibilities

    Lecture 46 Segregation of duties

    Lecture 47 Contact with authorities and with special interest groups

    Lecture 48 Threat intelligence

    Lecture 49 Information security in project management

    Lecture 50 Inventory of information and associated assets

    Lecture 51 Acceptable use of information and assets. Return of assets

    Lecture 52 Classification and labelling of information

    Lecture 53 Information transfer

    Lecture 54 Access control and access rights

    Lecture 55 Identity management

    Lecture 56 Authentication information

    Lecture 57 Information security in supplier relationships and agreeements

    Lecture 58 Information security in the ICT supply chain

    Lecture 59 Information security for use of cloud services

    Lecture 60 Information security incident management

    Lecture 61 Information security aspects of business continuity

    Lecture 62 Compliance with legal, statutory and regulatory requirements

    Lecture 63 Privacy and protection of PII

    Lecture 64 Independent review of information security. Compliance with policies and rules

    Lecture 65 Recapitulation - Organizational controls

    Section 5: People controls

    Lecture 66 Considerations about the people controls

    Lecture 67 Screening

    Lecture 68 Terms & conditions of employment. Confidentiality and non-disclosure agreements

    Lecture 69 Information security awareness, education and training

    Lecture 70 Disciplinary process

    Lecture 71 Responsibilities after termination or change of employment

    Lecture 72 Remote working

    Lecture 73 Information security event reporting

    Lecture 74 Recapitulation - People controls

    Section 6: Physical controls

    Lecture 75 Considerations about the physical controls

    Lecture 76 Security perimeters. Phyiscal entry. Securing rooms and facilities

    Lecture 77 Physical security monitoring

    Lecture 78 Protection against physical and environmental threats

    Lecture 79 Work in secure areas

    Lecture 80 Clear desk and clear screen

    Lecture 81 Equipment siting, protection and maintenance

    Lecture 82 Security of assets off-premises

    Lecture 83 Storage media

    Lecture 84 Supporting utilities

    Lecture 85 Cabling security

    Lecture 86 Secure disposal and re-use of equipment

    Lecture 87 Recapitulation Physical controls

    Section 7: Technological controls

    Lecture 88 Considerations about the technological controls

    Lecture 89 User end-point devices

    Lecture 90 Privileged access rights

    Lecture 91 Information access restriction. Access to source code

    Lecture 92 Secure authentication

    Lecture 93 Capacity management

    Lecture 94 Protection against malware

    Lecture 95 Management of technical vulnerabilities

    Lecture 96 Configuration management

    Lecture 97 Information deletion

    Lecture 98 Data masking

    Lecture 99 Data leakage prevention

    Lecture 100 Information backup

    Lecture 101 Redundancy of information processing facilities

    Lecture 102 Logging, monitoring and clock synchronization

    Lecture 103 Use of privileged utility programs

    Lecture 104 Installation of software on operational systems

    Lecture 105 Security of networks and network services

    Lecture 106 Web filtering

    Lecture 107 Use of cryptography

    Lecture 108 Secure development lifecycle

    Lecture 109 Application security requirements

    Lecture 110 Secure system architecture and engineering principles

    Lecture 111 Secure coding

    Lecture 112 Security testing. Test information

    Lecture 113 Separation of development, test and production environments

    Lecture 114 Outsourced development

    Lecture 115 Change management

    Lecture 116 Protection of information systems during audit testing

    Lecture 117 Recapitulation Technological controls

    Section 8: Closing the ISMS audit

    Lecture 118 Closing the ISMS audit

    Lecture 119 Some final considerations

    Lecture 120 Thank you and good bye

    Information security professionals,Aspiring ISMS auditors,IT Managers and System Administrators,Consultants and Advisors,Candidates for ISO/IEC 27001 Auditor exams,Organizational Leaders and Decision-Makers,Students or Recent Graduates in IT or Security Fields,ISO specialists and enthusiasts