Can't find convenient schedule? Let Us Know
|ISMS-7.1 Introduction||ISMS-7.1.1||Scope of ISO/IEC 27000 series of standards|
|ISMS-7.1.2||Recognize industry standards/best practices in Service Management and Quality management systems, such as: ITIL®, SixSigma®, CobiT, ISO/IEC 9000, ISO/IEC 20000|
|ISMS-7.1.3||Recognize the content and correlation between ISO/IEC 27001:2005 and ISO/IEC 27002:2005|
|ISMS-7.1.4||Definition and need for Information Security and Information Security Management System (ISMS)|
|ISMS-7.1.5||Importance of an Information Security Management System (ISMS)|
|ISMS-7.1.6||Value and Reliability of Information|
|ISMS-7.1.7||Benefits and Critical Success factors of an Information Security Management System (ISMS)|
|ISMS-7.2 Organization of Information Securityl||ISMS-7.2.1||Management responsibility:
• Management commitment
• Resource management
|ISMS-7.2.3||Contact with authorities and with special interest parties|
|ISMS-7.2.4||Independent review of information security|
|Addressing security when dealing with external parties||Addressing security when dealing with external parties|
|ISMS-7.3 Information Security Management System||ISMS-7.3.1||Information Security Policy|
|ISMS-7.3.2||General ISMS requirements|
|ISMS-7.3.3||Structure of policies|
|ISMS-7.3.4||Establishing and managing the ISMS:
• Establish the ISMS
• Implement and operate the ISMS
• Monitor and review the ISMS • Maintain and improve the ISMS
• Control of documents
• Control of records
|ISMS-7.3.6||Management review of the ISMS
• Review input
• Review output
• Continual improvement
• Corrective action
• Preventive action
|ISMS-7.4 ISMS Implementation||ISMS-7.4.1||Defining ISMS scope, boundaries and ISMS policy|
• Responsibility for assets
• Information classification
|ISMS-7.4.3||Risk Assessment and Treatment:
• Assessing security risks
• Treating security risks
|ISMS-7.4.4||Information security aspects of business continuity management|
|ISMS-7.5 Human resources, physical and environmental security||ISMS-7.5.1||Human Resources Security: Prior to employment|
|ISMS-7.5.2||Human Resources Security: During employment|
|ISMS-7.5.3||Human Resources Security: Termination or change of employment|
|ISMS-7.5.4||Physical and Environmental Security: Secure areas|
|ISMS-7.5.5||Physical and Environmental Security: Equipment security|
|ISMS-7.6 Communications and operations management||ISMS-7.6.1||Operational procedures and responsibilities|
|ISMS-7.6.2||Third party service delivery management|
|ISMS-7.6.3||System Planning and acceptance:
• Capacity management
• System acceptance
|ISMS-7.6.4||Protection against malicious and mobile code|
|ISMS-7.6.6||Network security management|
|ISMS-7.6.8||Exchange of information|
|ISMS-7.6.9||Electronic commerce services|
|ISMS-7.7 Access Control||ISMS-7.7.1||Access control policy|
|ISMS-7.7.2||User access management|
|ISMS-7.7.4||Network access control|
|ISMS-7.7.5||Operating system access control|
|ISMS-7.7.6||Application and information access control|
|ISMS-7.7.7||Mobile computing and teleworking|
|ISMS-7.8 Information systems acquisition, development and maintenance||ISMS-7.8.1||Security requirements of information systems|
|ISMS-7.8.2||Correct processing in applications|
|ISMS-7.8.4||Security of system files|
|ISMS-7.8.5||Security in development and support processes|
|ISMS-7.8.6||Technical vulnerability management|
|ISMS-7.9 Compliance||ISMS-7.9.1||Compliance with legal requirements|
|ISMS-7.9.2||Compliance with security policies and standards, and technical compliance|
|ISMS-7.9.3||Internal ISMS audits:
• Define criteria, scope, frequency, method and audit procedures
• Define roles and responsibilities of internal auditors
• Ensure objective and impartial documentation
• Plan audit activities
• Follow up activities
• Record keeping procedures
|ISMS 7.10 Information Security Incident Management||ISMS-7.10.1||Reporting information security events|
|ISMS-7.10.2||Management of information security incidents and improvements|
|Total Proposed Training Time: 24 hours|
Holders of Peoplecert's ISO 27000: Information Security Management Foundation Certification will be able to demonstrate their knowledge, ability, competence and understanding in:
From the workshop:
Comprehension is the lowest level of understanding and entails the ability to grasp the meaning of the material taught, including some sort of interpretation, translation or estimation during the process. Assessment objectives would include knowing and recalling:
|Delivery||Computer (web) or Paper based|
|Type||40 Multiple choice questions
Single answer, one of four possible answers Each question is awarded one (1) mark
|Duration||1 hour (60 minutes)
For non-native speakers or candidates with a disability, an additional 15 minutes of extra time is allowed.
|Pass Mark||65% (26/40)|
|Invigilator / Supervisor / Proctor||Yes
Physical or Web proctoring
|No materials are allowed in the examination room|
The tests are derived from a regularly updated question test bank (QTB) based on the test specification detailed below. Questions are used interchangeably among test sets. The overall difficulty level of each test is the same with any other test. A candidate is never assigned the same test in the case of multiple examination attempts.
The examination will consist of ten (10) sections with the following structure:
|2||ISMS-7.2 Organization of Information Security||17.5%|
|3||ISMS-7.3 Information Security Management System||17.5%|
|4||ISMS-7.4 ISMS Implementation||12.5%|
|5||ISMS-7.5 Human resources, physical and environmental security||7.5%|
|6||ISMS-7.6 Communications and operations management||5.0%|
|7||ISMS-7.7 Access Control||7.5%|
|8||ISMS-7.8 Information systems acquisition, development and maintenance||5.0%|
|10||ISMS 7.10 Information Security Incident Management||7.5%|
Refer the following link for more information:
"The course content covered most of the basics and went deeper into details when required. Good hands-on exercises with practical examples."
"Trainer was excellent, who has proven that he knows the stuff with strong hold on the subject. Open to questions and kept training interesting. Knowledgehut Support Team provided excellent service! Thank You!"
"Good planning for the CSM training Delhi"
It is easy to enroll for the training online. There are several options to pay either through your debit/credit card that includes Visa Card, MasterCard; American Express or - via PayPal. Payment receipt will be issued to the candidate automatically by email.
Any registration cancelled within 48 hours of the initial be refunded in FULL. Please note that refunds will be processed within 30 days of receipt of written request for refund. Kindly go through our Refund Policy for more details: http://www.knowledgehut.com/refund
You are welcome to revise the choice of city, place and date for any classroom training, if required. However, if it is cross-country, then there will be a revision in the training fee.
Information sharing is critical to the success of an organization, in this technology driven world. Information from employees, suppliers, customers, stakeholders and even that exchanged between organizations, help rise above competition. While this free-flow of information helps in business continuity there has to be a high level of security that protects this important asset. The ISO/IEC 27001 and 27002 standards for Information Security Management allow an organization to demonstrate achievement of excellence and compliance with global best practices for quality in Information Security Management. KnowledgeHut’s training helps you prepare for the PEOPLECERT ISO 27000 certification and implement the principles and guidelines that reflect a solid understanding of the standard.
Yes, the course fee includes the Exam fee. KnowledgeHut will book the exams for you when you are ready.
PEOPLECERT offers several certifications in various areas of Information Technology. In the field of Management Systems, the following certifications are provided: Business ISO 9001 Quality Management ISO 21500 Project Management Energy & Environment ISO 14001 Environment Management ISO 50001 Energy Management Information Technology ISO 20000 Information Technology Service Management ISO 27000 Information Security Management Food Industry ISO 22000 Food Safety Management
Learn through live online interaction with experienced trainers, not from video tutorials.
We understand your busy schedules and recognise that undertaking a course while working is not easy. Pick a convenient time slot and log in from anywhere.
Not happy with the class? Get a full refund after your first session. Of course, we do our best to ensure this does not happen!
Revisit your doubts and get your concepts crystal clear by accessing your class recordings post training.
Our course material is comprehensive and easy to follow, available in downloadable e-book format.
All you need is a Windows computer, an Internet connection with a minimum of 500 KBPS speed, and a pair of headphones with a microphone.
Our classes are held on weekends and at convenient timings on weekdays, making it easy for you to fit the sessions into your workday.
Chance to get your concepts crystal clear by attending another batch of the same course for free.
We guarantee you will pass the certification exam or we will reimburse you for the class
If you do not pass the exam in three attempts (details described below), we will pay you back for the class cost.
Sorry! The seats for this program have just Sold Out!
But please share your details below and in case of any cancellations, we shall assign the opened up seat to you.
Our Course Advisor will get back within 24 hours with timings of Demo Class