Cybersecurity Management
Dates of the event - by agreement
№ |
Section names |
Watch |
||
Total |
Lectures |
Practically. |
||
1 |
Definition of information security, types of information, the relationship between the concepts of information security and ZI. Types of asset classifications, threats, and vulnerabilities. The concept and policy of information security, methods of their formation. |
4 |
2 |
2 |
2 |
The" family " of ISO standards for control systems. The concept of the process approach. The history of its use and trends. |
4 |
2 |
2 |
3 |
The mechanism of interaction and application of standards. Their structure. Terms and definitions. |
4 |
2 |
2 |
4 |
Defining the boundaries of an information security management System (ISMS) |
4 |
2 |
2 |
5 |
Inventory of assets, their evaluation and ranking. Factors that affect the value of assets. Identification and assessment of threats, vulnerabilities, and possible damage. Evaluation criteria. |
6 |
4 |
2 |
6 |
Fundamentals of building an ISMS. Requirements of the Standard.
ISMS documentation. The applicability matrix. ISMS records. Mechanisms for the analysis and revision of the ISMS. |
6 |
4 |
2 |
7 |
The structure of the documentation. Mandatory documents, their purpose. The Deming-Shewhart cycle as applied to the ISMS. |
4 |
2 |
2 |
8 |
Definition of information security, types of information, the relationship between the concepts of information security and ZI. Types of asset classifications, threats, and vulnerabilities. The concept and policy of information security, methods of their formation. |
4 |
2 |
2 |
|
TOTAL |
36 |
20 |
16 |