1. Information Security Training (Based on ISO/IEC 27000 series)
2. Risk-based Asset Management & Availability Management
3. Business Continuity Planning
4. Developing and Implementing Security Policies and Procedures
Our Flexible Schedule offers you control over the course duration—finish in a day or spread it over three months. Fixed modules ensure structured learning, tailored entirely to your availability.
Total Classes
1 Subject
6 Learning Materials
20 Courses • 228 Students
Ms Ramaswamy holds a B.Tech in Electronics and Communication and a MSc in Software Systems from BITS Pilani. In her earlier role, Jyothi was Governance, Risk & Compliance Lead for Cyber Security Services at TCS and has experience in Information Security control, implementation, and verification. Jyothi holds CRISP, CRISC, CISM certifications and is an APMG accredited trainer.
If you're responsible for implementing information security protocols within your organization, this course provides the essential knowledge and frameworks you need to be effective.
This course is ideal for professionals overseeing information security and business continuity measures, helping you align security practices with organizational objectives.
Upon completion of the program and successfully passing the assessment, learners will receive a GCA certificate. The certificate will also indicate the number of hours, which can be used toward meeting Continuing Professional Education (CPE) requirements.
By clicking on Continue, I accept the Terms & Conditions,
Privacy Policy & Refund Policy