Constructs of Information Security Management System

Management and architecture of Cyber Security : Understanding the Policy,Process, Control and Governance framework

3.55 (32 reviews)
Udemy
platform
English
language
Operations
category
145
students
2 hours
content
Jun 2020
last update
$19.99
regular price

What you will learn

Those who wants to build career in cybersecurity, starts here !

At the end of course, Students will start believing in policy, process and control aspects of information security management system and they will change their attitude toward cyber security casual to serious.

An employed or aspiring to be employed person will change their attitude and will appreciate organisation's information security policy.

The students will be able to clearly understand the Confidentiality, Availability and Integrity aspect of Information asset.

The information security professions will clearly understand the meaning of Vulnerability, RISK, Policy, Process, Control, guidelines with ample example.

Know the Information security standards and frameworks

This course will guide in implementing all elements of Information security management system.

The existing cyber security professional will be able to understand and implement enterprize security architecture elements with context to business

At the end of course, get an implementation and audit checklist for ISMS

Description

Cyber threats are one of the most clear and present danger looming over organisation in the current digital world. Cyber security is an area where technology, people, process and control work together hand-in-gloves to thwart any information leak and hence saving organisation from financial and reputational loss. Information security is fundamental to cyber security as it prepares the organisation to defend the breach of information assets. Any organisation’s cyber security programs is a combination of security of IT and telecom infrastructure, application, data and people. This is the data, also called as Information, that is vital for organisation’s survival. Hence, Information security management is of fundamental importance in any cyber security initiative adopted my organisations.   

In the new age of digital economy, organisations are struggling to protect their digital asset also called as Information. The Information security management system a.k.a ISMS is one of the framework for organisations to adopt to become proactive to the internal as well as external threat to information security. The risk of information security breach is far-fetched than the old days phenomenon. These RISKs are not only monetary but also brand image, collapse of a business, property damage etc.

The five axes of digital technology viz. Social, Mobility, Analytics, Cloud and Internet of Everything(IOE) are disrupting the conventional method of doing business. Not adopting these technologies is questioning the basic survivability of organisation. As these technologies are getting adopted, the threat surface for information security breach has multiplied many folds. However, only technology does not lead to a super cyber defence mechanism. As high as, 90% of the information security breach has been attributed to employee or partners and their awareness of information security.

Hence, a good information security management system does not have technology as the only facet, but it has people, process, policy and guidelines as the governing principles with ever evolving strategy tuned to the emerging threat vectors in cyber world.

As a matter of fact, a new employee is required to sign information security non-disclosure and compliance document when they join an organisation. But is that effective? Do organisations see the informal chit-chat among employee a threat? Why can’t they create a work culture where information security become a habit of employees like the personal and family security engrained in their habits.

This course is all about understanding the components of information security management systems. It will bring clarity to technical  person about the importance of people, process, policy and controls that governs the information security management in an organisation.   This is a must course for all seeking a corporate career and being a good corporate citizen. Also, this is  the first step for seeking a career in information security management  with a gradual rise to the top position in Information security domain in corporate also called as  Chief Information Security Officer(CISO).

This course dissects the information security myth  from enterprise architect's point of view with the course name titled ‘Constructs of Information Security Management System’. It systematically builds from information to information security to all elements of ISMS starting with fundamental of information characteristics also called as Confidentiality, Integrity, Availability(CIA). As you know information security is the major building block toward a step toward cyber security, learning ISMS basics is a must for all. 

As a bonus lecture, three lectures has been addd for the professionals who wants to understand the Enterprize Security Architecture from a technology deployment perspective. This will help the working professional to decide which all technology elements to be implemented in order to secure the enterprise information and be ready to response to a cyber attack. The Chief Enterprize Security Officer (CISO) will have a refresher on technology elements.

Content

Section-0 Introduction to ISMS

Introduction

Setting the Context

What is INFORMATION
Challenges of Information
Factors of Production
What is Security and Risk

Information Security

What is Information Security

Information Risk Management

What is Information Risk Management(IRM)

Information Asset Classification

Asset and It's type: Classification of Documents

Threat, Vulnerability and Control

Threat, Vulnerability, Risk and Counter Measures
Controls: Category and Types

Information Security Governance

What is Information Security Governance

Summary: Information Security Management System

ISMS,Why Develop, Business and Organisation Objectives
Company Business is the Key
Various Standards
Test your knowledge on Construct of Information Security

Bonus Section- Enterprize Security Architecture

Enterprize security Architecture
Identity and Access Management
Security Intelligence and Event Management

Screenshots

Constructs of  Information Security Management System - Screenshot_01Constructs of  Information Security Management System - Screenshot_02Constructs of  Information Security Management System - Screenshot_03Constructs of  Information Security Management System - Screenshot_04

Reviews

Wendell
July 26, 2021
The delivery of this course was quite uneven, at some times unclear, and the course was loaded with time-wasting filler. Definitely NOT worth the cost. Please do not buy this course. There are better ones available that are far cheaper.
Stacey
June 8, 2021
Honestly, I don't think I absorbed any of the content. I already have a background in ISMS, but if I didn't, I would leave empty handed. The instructors are so monotone and uninteresting, I fell asleep three times while trying to focus. I did bump it up to two stars because the content is accurate, I just wish the instructors could have been more engaged instead of reading off the slides, which I could have done myself....if I wasn't literate, I would not be taking this course.
George
April 5, 2020
I was looking for a training that would help me to refresh my overview of security Mgt. That’s just what is doing until now. Good and logical structure that maps all of what security Mgt. Is, not just the tech part
Ajay
March 11, 2018
Well presented and informative! The course was great and helpful. The trainer used a very clear language and provided the useful knowledge. All in all it is a very enlightening course for those who want to understand about ISMS in a short span of time.
PRASHANT
December 14, 2017
The course is a highly insightful take on ISMS. I gained knowledge about many new concepts and clarity on several others. The instructor is highly knowledgeable and experienced.
Kuldeep
October 27, 2017
Great content and good insights for any profession looking to setup information security policy and procedures for his/her organization.

Charts

Price

Constructs of  Information Security Management System - Price chart

Rating

Constructs of  Information Security Management System - Ratings chart

Enrollment distribution

Constructs of  Information Security Management System - Distribution chart

Related Topics

1365468
udemy ID
9/30/2017
course created date
1/14/2023
course indexed date
Bot
course submited by