Information Security Risk Management for ISO 27001/ISO 27002
In this course, you will gain essential skills in managing information security risks within the ISO 27001/27002 framework. Focused on risk assessment and control selection, this course will enable you to implement effective risk management strategies to protect sensitive data.
You will learn how to assess, mitigate, and manage information security risks using ISO 27001/27002 standards. By the end, you'll have the tools to improve organizational security and ensure compliance with international standards.
What sets this course apart is its practical approach, combining theoretical frameworks with real-world scenarios for immediate application in your workplace. This makes it ideal for professionals working in cybersecurity and risk management.
This course is designed for IT security professionals, compliance officers, and project managers with a basic understanding of information security. A prior knowledge of ISO 27001 or ISO 27002 is recommended but not required.
Copyright
© IT Governance Ltd, 2007, 2010, 2019. The authors, Alan Calder and Steve G Watkins, have asserted their rights under the Copyright, Designs and Patents Act, 1988 to be identified as the authors of this work.
Every possible effort has been made to ensure that the information contained in this course is accurate at the time of going to press, and the publisher and the author cannot accept responsibility for any errors or omissions, however caused. Any opinions expressed in this book are those of the author, not the publisher. Websites identified are for reference only, not endorsement, and any website visits are at the reader’s own risk. No responsibility for loss or damage occasioned to any person acting, or refraining from action, as a result of the material in this publication can be accepted by the publisher or the author. Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this
Watch on Coursera ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
More on: Security Basics
View skill →Related AI Lessons
⚡
⚡
⚡
⚡
The ABCs of reading medical research and review papers these days
Medium · LLM
#1 DevLog Meta-research: I Got Tired of Tab Chaos While Reading Research Papers.
Dev.to AI
How to Set Up a Karpathy-Style Wiki for Your Research Field
Medium · AI
The Non-Optimality of Scientific Knowledge: Path Dependence, Lock-In, and The Local Minimum Trap
ArXiv cs.AI
🎓
Tutor Explanation
DeepCamp AI