Skip to main content

INFORMATION SECURITY MANAGEMENT SYSTEM

 


      INFORMATION SECURITY MANAGEMENT SYSTEM


COURSE OVERVIEW :

            The purpose of this course is to provide participants with the knowledge and skills required to perform and lead first, second and third-party audits of Information Security Management systems against ISO 27001:2013

             

PRINCIPLES OF ISMS : 

      Confidentiality, integrity, and availability are the three core principles (tenets) of information security. Every aspect of an information security program (and every security control implemented by an entity) should be designed to meet at least one of these principles.

Who Should Attend?

                ·        Individuals who want to progress towards CQI and IRCA Certified ISMS Auditor status

                ·        Individuals interested in conducting first, second and third party audits

                ·        Individuals leading their companies to ISO 27001 certification

·                           Professionals who are responsible for developing and implementing management systems based on ISO 27001: 2013

               ·        IT and Security professionals

               ·        Internal audit coordinators

               ·        Corporate or division ISMS auditors

               ·        Corporate loss control/risk managers

               ·        Certification body auditors


Course Outline

                ·        Introduction to auditing Information Security management system standards (ISO 27001)

                ·        Overview of ISO 19011 - Guidelines for Auditing Management Systems

               ·        Auditing the Organization and its Context

               ·        Auditing Leadership

               ·        Auditing Planning of the ISMS

               ·        Auditing Management of Support Activities

               ·        Auditing Operations

               ·        Auditing ISMS Performance Evaluation

               ·        Auditing ISMS Improvement

IMPORTANCE OF INFORMATION SECURITY MANAGEMENT SYSTEM 
Reducing the risk of data breaches and attacks in IT systems. Applying security controls to prevent unauthorized access to sensitive information. Preventing disruption of services, e.g., denial-of-service attacks. Protecting IT systems and networks from exploitation by outsiders.
For More information Contact Our HSE Advisor :
Ms.Manimekalai  - HSE Adviser | Aim Vision Safety Training & Consulting
t: 044 42140492
m: 91 9047276591
e: training@aimvisionsafety.co.in
#286,First Floor,GST Road,
Chromepet, Chennai 600 044 (Above Vodafone Showroom)

www.aimvisionsafety.co.in
www.isoauditorcourse.in


Comments

Popular posts from this blog

Quality Auditor Training Chennai

ISO 9001 QMS Auditor /  Lead Auditor training   Apply now! Quality Auditor Training Chennai   highly interactive 5 day ISO 9001 QMS Auditor /  Lead Auditor training  course that will teach you the tools and techniques of how to plan, lead and report audits within your own organisation, your suppliers or third party organisations. Course Duration – 5 Days Who Should Attend? Anyone needing to audit a quality management system (QMS) that conforms to ISO 9001 Anyone involved in the planning, managing or implementation of audit programmes Those involved in auditing suppliers Those wishing to become a registered auditor   Content Introduction to Quality Scope and Elements of ISO 9001:2015 Purpose and Scope of an Audit Skills and Qualities of an Auditor Planning an Audit The Role of the Checklists Organising an Opening and Closing Meeting Performing an Audit and Recording Non-Confo

AOSH-CERTIFIED MASTER TRAINER

     AOSH CERTIFIED MASTER TRAINER | AIM VISION SAFETY Program Overview The AOSH UK Certified Master Trainer (Train the Trainer) Certificate content is practical and grounded in the real world, not just academic theory. This program focuses on what happens before, during, and after you deliver training, and what to do if training is not the right solution. Learner feedback indicates high value in the following areas:  student engagement, expert facilitation and applicable tools and techniques. Duration : 3 Days Topic 1 – Introduction + Open Your Training with PUNCH A Day in the Life of a Trainer A Trainer’s Process The Training Cycle Topic 2 – Purpose & Assessment + Needs Assessment Analysis Basics Data Collection Learning Objectives Applying Verbs to Levels of Learning Topic 3 – Planning & Preparation + Adult Learning Principles Instructional Design Preparing the Materials, the Environment, and Yourself The Four Dimensions of Training Topic 4 – Presentation & Facilitation

When working with electrical equipment, use safe work practises??

  When working with electrical equipment, use safe work practices?? Safe Work Practices             When the device is being serviced or maintained, disconnect it from the source.              Before doing maintenance or repairs on electrical equipment , disconnect the power supply.              If handling plugged-in equipment is required, wear non-conductive gloves, and insulated-sole shoes, and ensure that all contacting components are dry.               Keep the other hand away from any conductive material if it is safe to work with just one hand. By taking this action, mishaps involving current via the chest cavity are decreased.               Due to condensation problems, it is necessary to use electrical equipment in cold rooms as little as possible.               If using these spaces is necessary, the device must be mounted to a wall or vertical panel.               The equipment power must be turned off at the main switch or circuit breaker and unplugged if the gadget react