ISO 27001 Training

As part of this course, you will learn best practices with regard to standardize and secure IT processes and systems. The process-oriented Information Security Management System (ISMS) according to ISO 27001 provides an optimal basis for this purpose. The professional operation of an ISMS enables you to increase the level of protection against Cyber Threats in order to protect your business data properly.

Your benefits

Learn how to:

  • Establish standardized IT and information security
  • Introduce the ISMS to strengthen your Cyber Security posture
  • Operate and continuously improve the ISMS
  • Maintain the ISMS professionally and optimally
  • Meet the requirements for the ISO 27001 certification

You will receive a certificate of completion from us, which confirms the successful participation in the training and the acquired professional competence.

Target audience

IT executives, administrators and engineers, IT security and privacy officers, and individuals that are responsible for IT and information security.

Location

The Icon Vienna
Gertrude-Froehlich-Sandner-Strasse 2-4
1100 Vienna

(also on site at your request)

Duration

9 AM to 5 PM

Fee

€ 990.- (VAT excl.)

Meals and drinks are included in the price.

Contents

  • Fundamental terms of information security
    • Overview of Cyber Security risks
  • Requirements for implementing the Information Security Management System (ISMS) according to ISO 27001
  • ISO 27005 Risk Management
    • Methods for risk assessment and treatment, especially for Cyber Security risks
  • Methods for measuring and improving the ISMS
  • Internal audits and management evaluations of the ISMS
  • Education and awareness measures within the ISMS
  • Detection and management of Cyber Security incidents
  • Complying to regulations based on the ISO 27001 Standard, such as NISG and NISV

Contents

  • IT & Information security requirements according to ISO 27002 (Statement of Applicability)
    • Security policy, organization of information security
    • Human resources security
    • Asset management, access control, cryptography
    • Physical and environmental security
    • Operations and communications security
    • Information systems acquisition, development, maintenance
    • Supplier relationships
    • Cyber Security incident management
    • Cyber Resilience with business continuity & contingency
    • Compliance
  • ISO 27001 certification process
Trainings

20th to 21st, July 2020

5th to 6th, October 2020

Secure Coding Training

In the course of this training with high practical relevance you learn how to develop and optimize applications with regard to effective and appropriate security controls. You will gain basic and advanced knowledge about how to design applications securely. By means of our live coding examples, you acquire practical know-how in secure design and coding for apps / services / sites.

Your benefits

Learn how to:

  • Avoid security vulnerabilities in the early stages of software development
  • Design applications securely
  • Detect weaknesses in the source code in good time
  • Eliminate weak points with secure coding
  • Handle Cyber Security incidents professionally in production

You will receive a certificate of completion from us, which confirms the successful participation in the training and the acquired professional competence.

Target audience

Software architects, software developers, testers, IT administrators, and persons responsible for software development.

Location

The Icon Vienna
Gertrude-Froehlich-Sandner-Strasse 2-4
1100 Vienna

(also on site at your request)

Duration

9 AM to 5 PM

Fee

€ 1290.- (VAT excl.)

Meals and drinks are included in the price.

Contents

  • Introduction to IT & Information Security in accordance with ISO 27001
    • Security protection goals with respect to Cyber Security
  • Introduction to Risk Management according to ISO 27005
  • Cyber Risk Assessment for applications
    • Identifying and modeling threats
    • Designing applications securely
  • Measures for assessing code quality and security
  • Cyber Security incident and crisis management
    • Handling Cyber Security incidents at the operational level
Contents

Secure programming for applications/services/sites, e.g.

  • Input validation
  • Authentication and authorization
  • Session management
  • Configuration of IT systems
  • Processing of sensitive data
  • Cryptographic mechanisms
  • Exception handling
  • Logging and audit
  • Serialization and synchronization
Trainings

22th to 23st, July 2020

7th to 8th, October 2020

Didn’t Find Something Fitting?

Get in touch with us and arrange a free first meeting. We will gladly prepare an individual offer for trainings.