Iso/Iec 27001 Lead Auditor For Information Security - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Iso/Iec 27001 Lead Auditor For Information Security (/Thread-Iso-Iec-27001-Lead-Auditor-For-Information-Security) |
Iso/Iec 27001 Lead Auditor For Information Security - AD-TEAM - 01-30-2025 Iso/Iec 27001 Lead Auditor For Information Security Published 1/2025 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 11.04 GB | Duration: 12h 15m Advance your information security career by mastering ISMS auditing to ISO/IEC 27001:2022 What you'll learn Management system auditing principles and basics Requirements of ISO/IEC 27001 from the auditor's perspective Assessing the information security controls from ISO/IEC 27001 Formulating findings and conculsions for the ISMS audit Requirements Familiarity with the framework for information security management proposed by ISO/IEC 27001 is useful but not mandatory Description This course will help you master Information Security Management System (ISMS) auditing and the requirements of ISO/IEC 27001:2022, equipping you with essential skills to advance your career in the rapidly growing field of information security.Compliance with international standards, such as ISO/IEC 27001, is now a critical requirement for organizations across industries, including finance, engineering, IT, transportation, professional services or manufacturing. Professionals skilled in assessing compliance and in guiding organizations to strengthen their information security are in high demand.By enrolling in this online course, you will gain a solid understanding of auditing fundamentals, the specific requirements of ISO/IEC 27001, the standard's proposed security controls, and how to evaluate compliance during an ISMS audit.The first part of the course introduces the foundational concepts of information security management systems. You will explore what an ISMS is, the standards within the ISO/IEC 27000 series, and the purpose and structure of ISO/IEC 27001:2022.Next, the course provides a comprehensive overview of management system auditing basics. You will learn about the core principles auditors must adhere to, effective methods for collecting audit evidence, and critical documents such as the audit programme, audit plan, and audit report. This section also delves into remote auditing, how to analyze audit findings and conclusions, and the differences between lead auditors and auditors, as well as internal and external audits.The subsequent section focuses on auditing the management system requirements of ISO/IEC 27001. Key topics include auditing the information security risk assessment, assessing the scope of the ISMS, reviewing the information security policy and objectives, evaluating the management reviews and the internal audits of the ISMS, auditing the statement of applicability and the risk treatment plan or reviewing how the organization manages nonconformities. Each topic is analyzed from an auditor's perspective, emphasizing the critical areas to evaluate during compliance assessments.The following four sections of the course address the main themes of information security controls as outlined in ISO/IEC 27001:2022:Organizational Controls, such as policies, supplier relationships, incident management, privacy and protection of personally identifiable information, access control, threat intelligence, information classification and labelling of the inventory of information and assets.People Controls, including screening, disciplinary process, information security education and training, confidentiality and non-disclosure agreements.Physical Controls, focusing on securing the infrastructure, protecting against natural and environmental threats, cabling security, protecting assets off-premises or managing storage media throughout its life cycle.Technological Controls, covering topics like cryptography, malware protection, network security, secure development, capacity management, backups, information deletion, data masking, vulnerability management or system redundancy.This course provides suggestions for assessing during the ISMS audit challenges such as those posed by remote working, or the use of personal devices for work purposes (BYOD) . You will gain actionable insights into how auditors can evaluate compliance with these controls effectively.The final section of the course focuses on closing the ISMS audit, covering how to formulate the audit's findings and conclusions, how to conduct the closing meeting and plan the necessary post-audit activities.This course provides a complete and detailed exploration of ISO/IEC 27001 requirements, with inputs from related standards such as ISO/IEC 27002, ISO/IEC 27005, and ISO/IEC 27035. It combines theoretical knowledge with practical examples, offering auditors valuable guidance on where to focus to gather meaningful evidence.Whether you are a professional aiming to advance your career as an ISMS auditor or preparing for an upcoming audit, this course offers a structured and comprehensive approach to mastering ISO/IEC 27001:2022 ISMS auditing. Overview Section 1: Introduction Lecture 1 Introduction Lecture 2 What is an ISMS (Information Security Management System)? Lecture 3 The ISO/IEC 27000 series of standards Lecture 4 About ISO/IEC 27001:2022 Lecture 5 Certification to ISO/IEC 27001 Section 2: Generic aspects about management system auditing Lecture 6 What is a management system audit? Lecture 7 Principles of management system auditing Lecture 8 What is an audit programme? Lecture 9 Preparing for an audit Lecture 10 The audit team Lecture 11 Lead auditor vs. Auditor Lecture 12 The audit plan Lecture 13 Conducting an audit Lecture 14 Collecting and recording evidence Lecture 15 Remote auditing Lecture 16 Audit findings and conclusions Lecture 17 The audit report and post-audit activities Section 3: Auditing the management system requirements in ISO/IEC 27001:2022 Lecture 18 Strategy for auditing an ISMS Lecture 19 Audit and documented information Lecture 20 Auditing top management Lecture 21 Context of the organization Lecture 22 The scope of the ISMS Lecture 23 Leadership and commitment Lecture 24 The information security policy Lecture 25 Organizational roles, responsibilities and authorities Lecture 26 Addressing risks and opportunities Lecture 27 The information security risk assessment Lecture 28 Information security risk treatment Lecture 29 The Statement of Applicability (SoA) Lecture 30 Information security objectives and planning to achieve them Lecture 31 Planning of changes Lecture 32 Resources Lecture 33 Competence and awareness Lecture 34 Communication Lecture 35 The ISMS documented information Lecture 36 Operational planning and control Lecture 37 Monitoring, measurement, analysis and evaluation Lecture 38 Internal audit Lecture 39 Management review Lecture 40 Continual improvement Lecture 41 Management of nonconformities Lecture 42 Recapitulation - Management system requirements of ISO/IEC 27001:2022 Section 4: Organizational controls Lecture 43 Considerations about the organizational controls Lecture 44 Policies and procedures for information security Lecture 45 Information security roles and responsibilities Lecture 46 Segregation of duties Lecture 47 Contact with authorities and with special interest groups Lecture 48 Threat intelligence Lecture 49 Information security in project management Lecture 50 Inventory of information and associated assets Lecture 51 Acceptable use of information and assets. Return of assets Lecture 52 Classification and labelling of information Lecture 53 Information transfer Lecture 54 Access control and access rights Lecture 55 Identity management Lecture 56 Authentication information Lecture 57 Information security in supplier relationships and agreeements Lecture 58 Information security in the ICT supply chain Lecture 59 Information security for use of cloud services Lecture 60 Information security incident management Lecture 61 Information security aspects of business continuity Lecture 62 Compliance with legal, statutory and regulatory requirements Lecture 63 Privacy and protection of PII Lecture 64 Independent review of information security. Compliance with policies and rules Lecture 65 Recapitulation - Organizational controls Section 5: People controls Lecture 66 Considerations about the people controls Lecture 67 Screening Lecture 68 Terms & conditions of employment. Confidentiality and non-disclosure agreements Lecture 69 Information security awareness, education and training Lecture 70 Disciplinary process Lecture 71 Responsibilities after termination or change of employment Lecture 72 Remote working Lecture 73 Information security event reporting Lecture 74 Recapitulation - People controls Section 6: Physical controls Lecture 75 Considerations about the physical controls Lecture 76 Security perimeters. Phyiscal entry. Securing rooms and facilities Lecture 77 Physical security monitoring Lecture 78 Protection against physical and environmental threats Lecture 79 Work in secure areas Lecture 80 Clear desk and clear screen Lecture 81 Equipment siting, protection and maintenance Lecture 82 Security of assets off-premises Lecture 83 Storage media Lecture 84 Supporting utilities Lecture 85 Cabling security Lecture 86 Secure disposal and re-use of equipment Lecture 87 Recapitulation Physical controls Section 7: Technological controls Lecture 88 Considerations about the technological controls Lecture 89 User end-point devices Lecture 90 Privileged access rights Lecture 91 Information access restriction. Access to source code Lecture 92 Secure authentication Lecture 93 Capacity management Lecture 94 Protection against malware Lecture 95 Management of technical vulnerabilities Lecture 96 Configuration management Lecture 97 Information deletion Lecture 98 Data masking Lecture 99 Data leakage prevention Lecture 100 Information backup Lecture 101 Redundancy of information processing facilities Lecture 102 Logging, monitoring and clock synchronization Lecture 103 Use of privileged utility programs Lecture 104 Installation of software on operational systems Lecture 105 Security of networks and network services Lecture 106 Web filtering Lecture 107 Use of cryptography Lecture 108 Secure development lifecycle Lecture 109 Application security requirements Lecture 110 Secure system architecture and engineering principles Lecture 111 Secure coding Lecture 112 Security testing. Test information Lecture 113 Separation of development, test and production environments Lecture 114 Outsourced development Lecture 115 Change management Lecture 116 Protection of information systems during audit testing Lecture 117 Recapitulation Technological controls Section 8: Closing the ISMS audit Lecture 118 Closing the ISMS audit Lecture 119 Some final considerations Lecture 120 Thank you and good bye Information security professionals,Aspiring ISMS auditors,IT Managers and System Administrators,Consultants and Advisors,Candidates for ISO/IEC 27001 Auditor exams,Organizational Leaders and Decision-Makers,Students or Recent Graduates in IT or Security Fields,ISO specialists and enthusiasts RapidGator AlfaFile TurboBit |