14.12.2012 Views

EMBAJADA DE LOS ESTADOS UNIDOS DE AMERICA Bogota ...

EMBAJADA DE LOS ESTADOS UNIDOS DE AMERICA Bogota ...

EMBAJADA DE LOS ESTADOS UNIDOS DE AMERICA Bogota ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1.1 Review the requirements of ISO/IEC 27001<br />

1.2 Understand the relationship between ISO/IEC 27001 and ISO/IEC 27002<br />

1.3 Learn how to assess security threats and vulnerabilities<br />

1.4 Understand security controls and countermeasures<br />

1.5 Understand the roles and responsibilities of the auditor<br />

1.6<br />

Learn how to, plan, execute, report, and follow-up on an information security<br />

management system audit<br />

1.7 Cantidad de participantes: 10<br />

1.8 Certificacion como auditor lider ISO 27001:2005<br />

1.9 Duracion : 40 horas<br />

2 CURSO ISO 27002<br />

2.1 Understand the specific requirements for an ISMS<br />

2.2 Identify uses of ISMS controls<br />

2.3 Determine and assess risk to information security<br />

2.4 Determine the value of information assets<br />

2.5 Understand the design and implementation of an ISMS<br />

2.6 Understand definitions of policies, standards, and procedures<br />

2.7 Recognize the importance of auditing and reviewing an ISMS<br />

2.8 Understand ISMS documentation<br />

2.9 Understand the implementation process<br />

2.10 Cantidad de participantes: 10<br />

2.11 Certificacion: En adquisicion de conocimientos<br />

2.12 Duracion : 32 horas<br />

3<br />

CURSO SEGURIDAD <strong>DE</strong> LA INFORMACIÓN ADMINISTRACIÓN <strong>DE</strong>L RIESGO ISO<br />

27005<br />

3.1 Foreword<br />

3.2 Introduction<br />

3.3 Normative references<br />

3.4 Terms and definitions<br />

3.5 Structure of this International Standard<br />

3.6 Background<br />

3.7 Overview of the information security risk management process<br />

3.8 Context establishment<br />

3.9 General considerations<br />

3.10 Basic Criteria<br />

3.11 The scope and boundaries<br />

3.12 Organization for information security risk management<br />

3.13 Information security risk assessment<br />

3.14 General description of information security risk assessment<br />

3.15 Risk analysis<br />

3.16 Risk identification

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!