Fundamentals of Information Security Management Systems
by Rafael Campos
1. Part-I : Overview of ISO/IEC 27001:2013
1.1. 1.1 - What is ISO/IEC 27001:2013?
1.2. 1.2 - What are the benefits of ISO27001 implementation?
1.3. 1.3 - Who are the ISO27001:2013 Certification Bodies?
1.4. Exercise
2. Part-II : Information Security Management (ISM) Terminology
2.1. 2.1 - Asset
2.2. 2.2 - Availability
2.3. 2.3 - Confidentiality
2.4. 2.4 - Control
2.5. 2.5 - Guideline
2.6. 2.6 - Information Processing Facilities
2.7. 2.7 - Information Security
2.8. 2.8 - Information Security Event
2.9. 2.9 - Information Security Incident
2.10. 2.10 - Information Security Management System (ISMS)
2.11. 2.11 - Integrity
2.12. 2.12 - Policy
2.13. 2.13 - Residual Risk
2.14. 2.14 - Risk
2.15. 2.15 - Statement of Applicability
2.16. Exercise
3. Part-III : Details of ISO/IEC 27001:2013 Standard
3.1. 3.1 - Introduction
3.2. 3.2 - Scope
3.3. 3.3 - Normative References
3.4. 3.4 - Terms and Definitions
3.5. 3.5 - Context of the Organization
3.6. 3.6 - Leadership
3.7. 3.7 - Planning
3.8. 3.8 - Support
3.9. 3.9 - Operation
3.10. 3.10 - Performance Evaluation
3.11. 3.11 - Improvement
3.12. Exercise
4. Part-IV : Control Objectives and Controls
4.1. 4.1 - Information Security Policies
4.2. 4.2 - Organization of Information Security
4.3. 4.3 - Human Resources Security
4.4. 4.4 - Asset management
4.5. 4.5 - Access control
4.6. 4.6 - Cryptography
4.7. 4.7 - Physical and environmental security
4.8. 4.8 - Operations security
4.9. 4.9 - Communications security
4.10. 4.10 - System acquisition, development and maintenance
4.11. 4.11 - Supplier relationships
4.12. 4.12 - Information security incident management
4.13. Exercise