dots bg

Information Security Foundations

This course offers a deep dive into the essential aspects of information security, focusing on the ISO/IEC 27000 series. Designed for IT professionals and middle management, the course aims to build a strong foundation in risk-based asset management, business continuity planning, and the development of robust security policies. Participants will learn practical strategies for securing critical assets and ensuring organizational resilience.

Course Instructor Jyothi Ramaswamy
dots bg

Course Overview

Main Topics Covered:

1.   Information Security Training (Based on ISO/IEC 27000 series)

  • Introduction to the ISO/IEC 27000 standards and their application in securing information systems.
  • Implementation of Information Security Management Systems (ISMS).

2.   Risk-based Asset Management & Availability Management

  • Identification, assessment, and management of risks associated with organizational assets.
  • Ensuring high availability of critical business functions and services.

3.   Business Continuity Planning

  • Developing business continuity plans to ensure operations continue during disruptions.
  • Disaster recovery strategies to minimize downtime.

4.   Developing and Implementing Security Policies and Procedures

  • Crafting comprehensive security policies.
  • Practical approaches to implementing security controls across various organizational levels.

Course Duration

  • Morning Session: 10:00 A.M to 12:00 P.M
  • Afternoon Session: 02:00 P.M to 04:00 P.M

Batch Size: 5 participants

Schedule of Classes

Total Classes

2 Classes

Course Curriculum

1 Subject

Information Security Foundations

6 Learning Materials

Module 1 - Introduction to Information Security & ISMS

Introduction to Information Security & ISMS

Audio

Module 2 - Risk-Based Asset Management

Risk-Based Asset Management

Audio

Module 3 - Availability Management & Asset Protection

Availability Management & Asset Protection

Audio

Module 4 - Business Continuity Planning (BCP)

Business Continuity Planning (BCP)

Audio

Module 5 - Disaster Recovery & Crisis Management

Disaster Recovery & Crisis Management

Audio

Module 6 - Resilience Building & Practical Applications

Resilience Building & Practical Applications

Audio

Assessment

Course Instructor

tutor image

Jyothi Ramaswamy

16 Courses   •   5 Students

Jyothi Ramaswamy is a seasoned cybersecurity professional with over 25 years of experience at Tata Consultancy Services (TCS), including 15 years in information security and cybersecurity. She holds a BTech in Electronics, an MS in Software Systems, and certifications like CISM, CRISC, and CRISP. Jyothi specializes in security awareness programs and risk management.

Who Should Enroll

01

IT Team Members

If you're responsible for implementing information security protocols within your organization, this course provides the essential knowledge and frameworks you need to be effective.

02

Middle Management Professionals

This course is ideal for professionals overseeing information security and business continuity measures, helping you align security practices with organizational objectives.

Assessment & Certificate

Upon completion of the program and successfully passing the assessment, learners will receive a GCA certificate. The certificate will also indicate the number of hours, which can be used toward meeting Continuing Professional Education (CPE) requirements.