Descrição
Idade Mínima: 0
Idade Máxima: 0
Situação:
Habilitações Mínimas:
Habilitações Específicas:
No final da ação de formação o participante é capaz:
• de mobilizar em contexto de trabalho os conhecimentos necessários para uma adequada proteção da informação.
• implementar os controlos contidos na norma da ISO/IEC 27002 necessários para mitigar os riscos identificados,
• satisfazer os requisitos da norma ISO/IEC 27001.
1. Assets
Responsibilities of Assets and Classification
2. Human factors
The psychology of Information Security
Improving awareness in the workplace
3. Defence in Depth
Non IT related Security
Physical Security
4. Introducing Service Management
The relationship between ISO/IEC 27002
5. Communications and Operational Management
6. Access Control
Review of Identification, Authentication and Authorisation
Relationship between Risk, Access Control and Protective
7. Cryptography
A non-technical view of Cryptography
8. Validation
What is it?
Techniques
9. Information-Systems
10. Incident Management
11. Business Continuity
A review of BS 25 999
12. Business Impact and Disaster Recovery
What is a Business Impact Assessment
Identified Disaster Recovery scenarios
13. Compliance
Corporate Governance and Compliance Obligations
Data Protection Act, Computer Misuse Act, Copyright Designs
14. Certification to ISO/IEC 27001
Relationship between ISO/IEC 27002 and 27001Audit