dots bg

Information Security Foundations

This course offers a deep dive into the essential aspects of information security, focusing on the ISO/IEC 27000 series. Designed for IT professionals and middle management, the course aims to build a strong foundation in risk-based asset management, business continuity planning, and the development of robust security policies. Participants will learn practical strategies for securing critical assets and ensuring organizational resilience.

Course Instructor Jyothi Ramaswamy
Registration Type: Institutional
Start Date: Customizable
End Date: Customizable
Timing: Customizable
Fee: INR 150000
Duration: 10 Hours
Organizational Context: 2 Hours
Batch Size: Up to 20 participants
Format: Live, Online, Interactive Sessions
To enroll in this course, please contact the Admin
dots bg

Course Overview

Main Topics Covered:

1.   Information Security Training (Based on ISO/IEC 27000 series)

  • Introduction to the ISO/IEC 27000 standards and their application in securing information systems.
  • Implementation of Information Security Management Systems (ISMS).

2.   Risk-based Asset Management & Availability Management

  • Identification, assessment, and management of risks associated with organizational assets.
  • Ensuring high availability of critical business functions and services.

3.   Business Continuity Planning

  • Developing business continuity plans to ensure operations continue during disruptions.
  • Disaster recovery strategies to minimize downtime.

4.   Developing and Implementing Security Policies and Procedures

  • Crafting comprehensive security policies.
  • Practical approaches to implementing security controls across various organizational levels.

Flexible Schedule

Our Flexible Schedule offers you control over the course duration—finish in a day or spread it over three months. Fixed modules ensure structured learning, tailored entirely to your availability.

Batch Size: Up to 20 participants

Schedule of Classes

Total Classes

2 Classes

Course Curriculum

1 Subject

Information Security Foundations

6 Learning Materials

Module 1 - Introduction to Information Security & ISMS

Introduction to Information Security & ISMS

Audio

Module 2 - Risk-Based Asset Management

Risk-Based Asset Management

Audio

Module 3 - Availability Management & Asset Protection

Availability Management & Asset Protection

Audio

Module 4 - Business Continuity Planning (BCP)

Business Continuity Planning (BCP)

Audio

Module 5 - Disaster Recovery & Crisis Management

Disaster Recovery & Crisis Management

Audio

Module 6 - Resilience Building & Practical Applications

Resilience Building & Practical Applications

Audio

Assessment

Course Instructor

tutor image

Jyothi Ramaswamy

20 Courses   •   228 Students

Ms Ramaswamy holds a B.Tech in Electronics and Communication and a MSc in Software Systems from BITS Pilani. In her earlier role, Jyothi was Governance, Risk & Compliance Lead for Cyber Security Services at TCS and has experience in Information Security control, implementation, and verification. Jyothi holds CRISP, CRISC, CISM certifications and is an APMG accredited trainer.

Who Should Enroll

01

IT Team Members

If you're responsible for implementing information security protocols within your organization, this course provides the essential knowledge and frameworks you need to be effective.

02

Middle Management Professionals

This course is ideal for professionals overseeing information security and business continuity measures, helping you align security practices with organizational objectives.

Assessment & Certificate

Upon completion of the program and successfully passing the assessment, learners will receive a GCA certificate. The certificate will also indicate the number of hours, which can be used toward meeting Continuing Professional Education (CPE) requirements.