Skip to main content

ISO/IEC 27001 : 2013 (INFORMATION SECURITY)

ISO/IEC 27001 : 2013 (INFORMATION SECURITY)

Syllabus
Class Type : Workshop
Duration : 2 Days (09.00 – 16.00)
Venue  & Price : www.purnamaacademy.com ,
Registration : www.purnamaacademy.com (Save up to 20% for Early Bird Registration !)

Description
Setting up an ISMS can be as simple or as sophisticated as your organization needs it to be. However, even knowing where to start when considering setting up an ISMS can be challenging.
In this one day course, our expert tutors will explain the requirements of the current standard to help you understand how it could apply to your organization and the potential benefits of adopting it.
You will therefore be better prepared to carry out an implementation of an ISMS that conforms to the current standard, as the background, updated concepts, principles, terms and definitions used in ISO/IEC 27001:2013 are fully explained and discussed.
The requirements course will also help you understand how the standard works in preparation for attending the internal and lead auditing training courses.

Implementation
In this two day course, our experienced tutors teach you how to consider the state of your organization's current information security management practices in preparation to put in an ISMS.
You should already have a good understanding of the requirements of the current standard and our tutors will tap into that knowledge so that you can develop your skill and understanding of the practicalities involved when setting up a typical management system framework that conforms with ISO/IEC 27001:2013.
This will enable you to play a key role in ensuring your organization is compliant to ISO/IEC 27001:2013.
ISO/IEC 27001:2013 provides the model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an ISMS to protect your information assets.
After attending this course, you will be in a position to use this model and be able to develop an ISMS suitably appropriate for your organization

Topic Include :

Introduction
·         What is information security management (ISM)
·         Why ISM is important to an organization
·         What are the benefits of ISM
·         What is the background of ISM
·         What are the key concepts and principles in ISO/IEC 27001:2013
·         The terms and definitions used
·         The main requirements of ISO/IEC 27001:2013


Implementation
·         How to identify a typical framework to implement an ISMS compliant with  ISO/IEC 27001:2013 following the Plan, Do, Check, Act (PDCA) cycle
·         How to conduct a base line review of the organization's current position with regard to ISO/IEC 27001:2013
·         How to interpret the requirements of ISO/IEC 27001:2013 from an implementation perspective in the context of your organization
·         How to implement key elements of ISO/IEC 27001:2013


Participants :  IT Manager, IT Supervisor, Kabag IT, Kominfo Staff, Senior Manager,Direktur

Speaker  : Purnama Academy Trainer

#trainingiso27001  #informationsecurity #silabus  #pelatihan #jakarta  #bandung  #bali  #jadwaltraining




Comments

Popular posts from this blog

SEO , Top Keyword Research 2015

Google's Hummingbird update created a lot of anxiety, but ultimately, it could be a good thing for the industry, because it frees us from the tyranny of competing for a limited number of top keywords. Essentially, the role of the Hummingbird algorithm is to better answer those longer-tail queries users are typing in Google. If your pages are optimized for these more conversational queries, you have a better chance of top rankings. Try a new, niche-based approach to keywords, which allows you to double or even triple the list of profitable keywords in your SEO arsenal. This article explains the four steps for doing keyword research the modern way, using SEO PowerSuite or other tools. 1. Ideas: Most search marketers simply think of the main keywords related to their businesses, plop them into a tool like Google Keyword Planner, and then run with the keyword list it delivers. However, search habits vary widely: Searchers may use hundreds of different word combinations to describe the ...

TRAINING UNITY 3D GAME ADVANCED : WORKING WITH FIREBASE-BANDUNG

TRAINING UNITY 3D GAME ADVANCED : WORKING WITH FIREBASE By Purnama Academy - Training Center January 08, 2018  No comments UNITY 3D GAME ADVANCED : WORKING WITH FIREBASE www.purnamaacademy.com , Hotline (Call/SMS/WA) :  0838-0838-0001 Syllabus Overview Training yang membahas tingkatan lanjut dari pengembangan game 3D menggunakan UNITY 3D baik skala desktop ataupun mobile, dimana peserta mengetahui cara cara menyimpan informasi data game dari player ke dalam backend dengan bantuan firebase SDK, hal ini memungkinkan untuk pengembangan game skala jaringan (online) Class Type : Training Duration : 2 Days (09.00 – 17.00) Venue / Price : Click Here , Registration : Click Here  (Save up to 20% for Early Bird Registration !) Description : Firebase is Google's mobile platform that helps you quickly develop high-quality apps and grow your business A dependable backend is a must-have for today's games. Giving users the ability to log in and save and retrieve player data can make or...

Recommended Agen Properti Saiful Abror [token:961]

Telah bergabung Agen properti Saiful Abror listing ( http://propertilink.com/properti ) di website propertilink dot com , website iklan properti tercepat di indonesia dengan teknologi mesin promo otomatis yang juga pertama di indonesia yang membantu mempercepat penjualan iklan properti Anda dan ditunjang dengan program Agen Milyuner yang memberikan pasif income dengan potensi bonus komisi 3,3 M untuk berapapun nilai properti yang Anda jual, Kini giliran Anda ! [Message Server propertilink dot com security token:961]