Google, Apple, Adobe, Oracle and many other tech giants, financial institutions, health services providers, insurance companies, education institutions, manufacturing and service companies, large and small business around the world have decided to implement this standard as a proof of their capability to protect the confidentiality, integrity and availability of the information they process. This course help participant to understand how an information security management system can be implemented, what the requirements of this standard are and what the solutions to ensure conformity are.
Course Objectives:
At the end of this course, delegates will be able to:
- Examine information security controls and guidelines for implementation
- Define information security principles and concepts
- Develop solid knowledge of the requirements for information security control
- Illustrate implementation of an information security management systems
Who Should Attend?
- Information security managers
- Information security consultants and auditors
- Information security officers
- Information security risk specialists
- Managers and business owners
Delivery method: This will include combine lectures, discussions, group exercises and illustrations. Participants will also understand the theoretical and practical knowledge of the topic.
Venue: U.S.A
Fee:
Duration: 2 Weeks
Course Date: August 28th – September 8th, 2023
- Lectures 0
- Quizzes 0
- Duration 200 hours
- Skill level All levels
- Language English
- Students 0
- Assessments Yes