ISO Courses for Your Career Potential
Are you ready to supercharge your career with ISO courses? Dive into the world of service management with the ISO/IEC 20000 Foundation 2018 course offered by Info Trek in Malaysia. This dynamic, 3-day training adventure is designed for anyone looking to define, plan, audit, implement, or manage a service management system (SMS) based on ISO/IEC 20000-1:2018. No prerequisites are required, but some familiarity with service management concepts is a plus, making it accessible to a wide range of professionals.
The Path to Success
This ISO course is a game-changer. You’ll gain a deep understanding of the ISO/IEC 20000 standard, its components, and how it applies to real-world scenarios. With the latest teaching methods, including interactive lectures, group discussions, and real-life activities, you’ll not only learn but also experience the material. What sets this course apart is its emphasis on practical application, leveraging your personal and work experiences to make the learning process more effective and engaging.
Elevate Your Career
By completing the ISO/IEC 20000 Foundation 2018 course, you’ll be well-prepared to tackle the complexities of service management. This certification will open doors, enhance your professional skills, and demonstrate your commitment to excellence. Whether you’re already in the IT field or looking to break into it, this ISO course is your ticket to a brighter, more promising future. So, don’t miss out on this opportunity. Join Info Trek’s ISO course, and let’s journey together toward a more successful and fulfilling career.
Course Details
Duration: 2 days; /14 hours; Instructor-led/ remote online training
With the growing number of internal and external information security threats, organizations are increasingly recognizing the importance of implementing best practice controls to safeguard their information assets. By implementing and maintaining suitable controls, organizations become less susceptible to information security breaches and the financial and reputational damage they cause.
ISO/IEC 27002 provides guidelines to help organizations select, implement and manage information security controls, taking into account their risk environment. It contains 4 security control clauses, which cover 93 controls. These controls are intended to be applicable to all organizations and represent a minimum ‘starting point’, i.e. additional controls and guidelines can be added as required. The standard supports the concepts and framework specified in ISO/IEC 27001.
This course aims to provide clear and practical guidance on implementing the controls from ISO/IEC 27001 and other relevant management practice guidance.
This course will help you:
- Apply the best practice controls contained in
- ISO/IEC 27002
- Identify the key benefits of using ISO/IEC 27002 to protect information assets, as part of an effective ISMS or as a standalone activity
- Explain the rationale behind the processes and usages associated with the controls
- Recognize how implementing these commonly accepted controls will help reduce levels of risk within your organization
- Implement the controls more effectively through clear and practical guidance
This course will help organizations identify appropriate controls to be implemented in different situations, along with the benefits and potential pitfalls of doing so
Audience
Anyone who wants to learn:
- To identify and understand commonly accepted information security controls
- How risks can be reduced to an acceptable level using controls
- How to determine which controls are the most appropriate to implement
- Practical implementation of ISO/IEC 27002 controls
- The benefits and pitfalls associated with the use of different controls
The course is applicable to representatives from any size or type of organization who is, or will be, involved in planning, implementing, maintaining, supervising or assessing information security, as part of an ISO/IEC 27001 ISMS or a standalone system.
Prerequisites
We recommend that you have a basic understanding of information security principles and terminology.
We also recommend that you have an understanding of the information risks faced by their organization.
A basic understanding of ISO/IEC 27001, information technology and information risk management may be an advantage.
Some delegates on this course will have already attended our Information Security Management System (ISMS) Requirements of ISO 27001, or Information Security Management System (ISMS) Implementing ISO/IEC 27001 course.
Methodology
No methodology
Course Objectives
This course aims to assist organizations to implement commonly accepted information security controls, either as part of an ISO/IEC 27001 information security management system (ISMS) or as a standalone activity through the use of ISO/IEC 27002.
You’ll be able to:
- Explain the background and purpose of ISO/IEC 27002
- Explain the scope and structure of ISO/IEC 27002
- Recognize the different best practice controls recommended by ISO/IEC 27002
- Define the benefits of implementing controls from ISO/IEC 27002
- Evaluate how to use the controls in conjunction with an ISO/IEC 27001 based
- ISMS
- Demonstrate how to choose the appropriate controls relevant to you
- Implement chosen controls from ISO/IEC 27002
Outlines
Day 1 - Welcome, benefits to you and course aim & Introductions, objectives and structure
Module 1: ISO/IEC 27002 Background and introduction
Module 2: Clause 5: 5.1 – 5.4Â
Module 3: Clause 5: 5.5 – 5.13
Module 4: Clause 5: 5.14 – 5.18
Module 5: Clause 5: 5.19 – 5.23
Module 6: Clause 5: 5.24 – 5.30
Module 7: Clause 5: 5.31 – 5.37
- End of Day
Day 2
Module 8: Clause 6
Module 9: Clause 7: 7.1 – 7.4
Module 10: Clause 7: 7.5 – 7.14
Module 11: Clause 8: 8.1 – 8.9
Module 12: Clause 8: 8.10 – 8.16
Module 13: Clause 8: 8.17 – 8.23Â
Module 14: Clause 8: 8.24 – 8.28
Module 15: Clause 8: 8.29 – 8.34
- Review and final questions
Module 3: Clause 6 and clause 7 controls
- Physical security monitoring
Module 4: Clause 8 controls
- Configuration management
- Information deletion
- Data masking
- Data leakage prevention
- Monitoring activities
- Web filtering
- Secure coding
- Review and final questions
- End of the course





