Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Photoshop Graphic Design Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Meditation Personal Transformation Life Purpose Neuroscience Emotional Intelligence
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Data Science
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Other IT & Software ISO/IEC 27001

ISO 27001 Cybersecurity manager. Guidelines.

Application of ISO/IEC 27001 for cybersecurity. Understand and apply the requirements for a cybersecurity program.
Bestseller
Rating: 4.4 out of 54.4 (948 ratings)
3,524 students
Created by Cristian Vlad Lupa
Last updated 4/2020
English
English
30-Day Money-Back Guarantee

What you'll learn

  • Principles and concepts in cybersecurity
  • Threats and vulnerabilities
  • Risks and controls
  • Best practices for a succesful cybersecurity program
  • How ISO/IEC 27001 requirements apply to cybersecurity
  • Common attacks, how they work and how they can be prevented
Curated for the Udemy for Business collection

Requirements

  • Familiarity with information security concepts
  • A general understanding of IT

Description

The purpose of this course is to provide cybersecurity guidelines for the application of ISO 27001 (the popular standard for information security management systems).

After going through the lessons you will have a good understanding of the concepts, principles and requirements for an organization to design a cybersecurity system.

You will understand what are the typical security threats for different activities and processes and the recommended controls that an organization can implement in order to respond and protect itself.


The structure of the course includes:

- introductory aspects including definitions for the Cyberspace and Cybersecurity.

- the concepts of Confidentiality, Integrity, Authentication and Non-Repudiation as critical elements for any security system;

- information classification - schemes, levels and labeling aspects

- Threats, vulnerability, risk assessment (quantiative and qualitative methods) and the options for an organization to treat security risks.

- Internal organization requirements including support from top management and segregation of duties;

- aspect on mobile devices - like BYOD (Bring Your Own Device) and COPE (Company Owned Personally Enabled)

- human resources security - from screening to employment, the contractual requirements and disciplinary process plus the termination and change of employment

- requirements for the use of removable media

- access controls and authentication aspects plus how to manage privileges so they won't generate security breaches

- cryptography - including basic elements and definitions, digital signature and the public key infrastructure

- a short description of most popular cryptograhpic attacks (brute force, rainbow tables or birthday attacks) and recommended controls

- controls that refer to physical security and equipment

- malware aspects (viruses, logic bombs, worms, trojans, spyware, adware and a detailed presentation of ransomware)

- denial of service attacks

- social engineering and phishing

- password management aspects including common password attacks and controls

- backup aspects

- requirements for the change management process in an organization so that security is not affected

- network security aspects - principles and controls + wireless attacks and how to prevent them

- requirements for email security

- security in development processes

- supplier relationships and risks associated to suppliers' access to information assets of the organization

- capacity management

- managing cybersecurity incidents - from detection to closure and root cause analysis

- business continuity aspects and how an organization should prepare for and respond to crisis situations

- compliance requirements that any organization must repsect.


The course uses easy to follow explanations and examples with a few case studies along the way (about the Barings bank collapse, the Target security breach or Edward Snowden) to illustrate the concepts described.

At the end of the course there is a quiz  - with questions from the subject matter.


Get the information you need to design, coordinate and improve a cybersecurity system or audit organizations as per ISO 27001.


Who this course is for:

  • Cybersecurity managers
  • Information security officers
  • ISO/IEC 27001 auditors and consultants
  • Security professionals
  • Professionals tasked with implementing or administrating a management system as per ISO 27001
  • Security practitioners interested in the ISO 27001 framework
  • People looking for a career in cyber security
  • IT professionals looking to enhance their knowledge

Course content

1 section • 48 lectures • 4h 4m total length

  • Preview02:34
  • The Cyberspace
    04:58
  • Cybersecurity
    Preview05:18
  • Positions in cybersecurity
    06:59
  • Preview05:16
  • Information classification
    04:51
  • Threats and vulnerabilities
    03:00
  • Preview05:28
  • Treating risk
    05:51
  • Support from top management
    04:16
  • Internal organization
    05:14
  • Segregation of duties
    04:35
  • The Barings Bank collapse
    04:21
  • Bring your own device (BYOD)
    07:22
  • Mobile devices
    04:46
  • Human resources security
    08:32
  • Awareness and training
    04:10
  • Asset management
    04:23
  • Removable media
    04:39
  • The interesting story of Edward Snowden
    06:14
  • Access control
    04:25
  • Privileged access rights
    03:02
  • Logging and monitoring
    04:18
  • Preview05:44
  • Digital signature
    04:50
  • Public key infrastructure
    03:37
  • Cryptographic attacks
    04:23
  • Physical security
    07:19
  • Equipment
    08:00
  • Malware
    07:04
  • Ransomware
    06:07
  • Phishing
    05:50
  • Denial of service (DOS and DDOS)
    04:21
  • Social engineering
    02:52
  • Password management
    08:27
  • Backup
    02:59
  • Change management
    03:19
  • Network security management
    08:07
  • Email security
    03:58
  • Security in development processes
    04:45
  • Supplier relationships
    05:34
  • The Target security breach
    05:28
  • Capacity management
    02:56
  • Incident management
    05:54
  • The case of Uber
    02:44
  • Business continuity management
    06:32
  • Preview04:47
  • Looking to the future
    04:41
  • ISO 27001. Cybersecurity manager
    18 questions

Instructor

Cristian Vlad Lupa
Auditor, Consultant & Trainer
Cristian Vlad Lupa
  • 4.4 Instructor Rating
  • 19,175 Reviews
  • 43,989 Students
  • 16 Courses

Cristian is an experienced auditor, consultant and trainer who has been working in conformity evaluation for more than 15 years,

Passionate about standards and how their use can help organizations improve, Cristian has been involved in more than 500 audits in different European countries as well as numerous consulting projects on different standards.

A certified auditor and risk assessor, Cristian is today the managing director of RIGCERT - accredited certification body operating in Europe.


  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.