FREE 74.99
~ ISO 27001 – Cryptography – Info. Security Management System

FREE 
74.99

 ~ 
ISO 27001 – Cryptography – Info. Security Management System
Coupon: zmrk6nkb

Please use Gmail

Every 12 hours I will contact all buyers, and I will check that they have the download links

ISO 27001 – Cryptography – Info. Security Management System

Requirements

  • An overview of ISO 27001:2013 is recommended, but not required,

Description

In this course, we’ll explore an overview of what cryptography is and how it relates to Clause 10 of ISO 27001:2013 Annex A Controls. I’ll be teaching using slides and explaining some notes about the topic. In addition to reading the notes on the screen and listening to the lecture, you can take notes if you wish. This course is less about cryptography itself and more about the requirement of ISO 27001:2013 Annex A Controls with regards to cryptography. Therefore we won’t be discussing any particular cryptographic control at great length.

[affegg id=2]

Here’s a summary of what you can expect to learn from this course:

Section 1:

Cryptography has been around for ages. It means scrambling data so that it’s unreadable to people who don’t know how to decrypt it. When computers became a thing and there was a whole bunch of information out there, we needed more encryption. Since then it’s really taken off and people have come up with really sophisticated ways to encrypt data.

Section 2:

So, what does ISO 27001:2013 Annex A say about this? It says that you have to have a cryptographic policy. This basically means that you have to prepare a document that’s going to govern how you use encryption in your organization. It answers the who what where when and how questions. This means the policy should answer the following questions:

  • Who is going to implement the policy? (The roles and responsibilities)
  • What data needs to be encrypted? (Sensitive data needs to be encrypted)
  • Where is the data that needs to be encrypted? (In transit, at rest, or in processing)
  • When should the organization encrypt? (Only when it is effective)
  • How they will encrypt their data? (The ciphers they’ll use, how they’ll manage their keys, permissions, etc.)

Section 3:

The strength of encryption controls relies heavily on the effective implementation of key management. You need the keys to gain access to your data so if you lose your keys or they get destroyed then you won’t have access to your data anymore. Also, if a thief gets your keys and they have access to your encrypted files, they can easily steal or alter your data.

Therefore, an organization has to create an effective key management policy that’s going to force them to decide how keys will be generated, backed up, stored, protected, retired, and deleted. They can use key management solutions and implement their policy themselves or they can outsource this process to another specialized organization.

Who this course is for:

  • Anyone who wants to know more about this area of ISO 27001:2013


Get this Deal

74.99

FREE
74.99

ISO 27001 – Cryptography – Info. Security Management System

[100% Discount]
GET THIS DEAL
[100% Discount] #ISO #Cryptography #Info #Security #Management #System #Get this Deal
تخفيضات,كوبونات,كوبون,عروض,كوبون كل يوم
Get this Deal,Get this Deal
udemy sale,udemy for business,udemy discount,udemy gutschein,business administration,discount factor,course deutsch,course catalogue,udemy course discount,javascript courses online,javascript course,freebies,toefl speaking,excel courses online,excel courses,excel templates dashboard,software engineering course online,software engineering course,

[affegg id=1]

FREE 
74.99

 ~ 
ISO 27001 – Cryptography – Info. Security Management System
FREE 74.99
~ ISO 27001 – Cryptography – Info. Security Management System

We will be happy to hear your thoughts

Leave a reply

Udemydl
Logo
Enable registration in settings - general
Compare items
  • Total (0)
Compare
0
Shopping cart