Compliance
One comprehensive course that teaches you all you need to know about compliance with ISMS, ISO 27001, PCI DSS and Business Continuity Management.
Compliance with risk-based controls and business continuity plans and processes has become indispensable for businesses in the current threat landscape. Compliance requirements ensure that your business adheres to at least a basic level of risk management measures and controls as well as regulatory requirements in order to ensure business continuity and better disaster recovery. This course is a comprehensive one-stop training for those who wish to understand all about regulatory and organisational compliance. It covers detailed insights on compliance with ISO 27001, ISMS, PCI DSS and Business Continuity Management. Ideal for Information Security and Risk Management professionals, this course can also help you emerge as a much sought-after Governance, Risk and Compliance professional.
Benefits of choosing this course
Benefits of choosing the Compliance course
Understand the full extent of cybersecurity compliance requirements for business.
Covers the key frameworks/standards of ISMS, ISO 27001 PCI DSS and Business Continuity Management System.
Widen your skills and knowledge as a cyber and Governance and Risk Management professional with this intense and detailed training.
Highlights of the Compliance course
4 detailed, content-rich modules on each compliance requirement with up to 17 sub-sections within each module.
Razor-sharp focus on the most important & relevant cybersecurity regulatory standards and frameworks.
Self-assessment quizzes to test the wealth of knowledge acquired.
- Key Learning Objectives
- Downloads
- About
-
Key Learning Objectives
-
After completing the Compliance course, you will be able to:
- Elucidate what the essential cybersecurity compliance standards are and what does compliance with each one entail.
- Acquire substantial knowledge about ISMS, its importance and its benefits.
- Explain in your own words the steps required for ISMS implementation, its scope and how to conduct ISMS gap analysis.
- Gain considerable understanding of the ISO 27001 standard for information security and how to become ISO 27001 compliant.
- Fully comprehend the structure of ISO 27001:2013 and the controls in Annex A of ISO 27001:2013.
- Understand the Payment Card Industry Data Security Standard (PCI DSS), essential terms related to PCI DSS and the entities involved in payment card transactions.
- Articulate the need for PCI DSS compliance and how to actually become compliant.
- Discuss what Business Continuity Management is and why it is critical today.
- Articulate the core elements, objectives and issues involved in Business Continuity Management planning.
- Confidently work on Business Impact Analysis and on creating Disaster Recovery plans.
-
Direct Downloads
Directly download the full Learning Objectives of the course here
Templates. Worksheets & Mind-maps
When you enrol in this course you will have access to several worksheets & templates that you can use immediately. Take a look at the course curriculum, below, to see whats included in this course.
The image immediately below is a gallery view of some of the templates and collateral available to students.
Continuing Professional Development
CPD points can be claimed for this course at the rate of 1 point per hour of training for this NCSC-certified and CIISec-approved course (8 points for one-day public course and 15 points for the two-day internal workshop - for when organisations host this course internally).
CIPR Student-Only Incident Response Plan Template
As a student you get access to unique content including our highly acclaimed Cyber Incident Response Plan Template. If you want, you can download the FREE version of the Incident Response Plan template here.
-
About
Example Curriculum
- M.1.1.1 Agenda (1:33)
- M.1.1.2 Introduction to ISMS (1:55)
- M.1.1.3 Need for an ISMS and its Benefits (2:32)
- M.1.1.4 ISO 27001 (6:57)
- M.1.1.5 Understanding Controls (3:45)
- M.1.1.6 Introduction to ISO 27001:2013 standard (2:38)
- M.1.1.7 Understanding the Structure of the Standard (3:13)
- M.1.1.8 ISO 27001:2013 Domains (2:31)
- M.1.1.9 Overview of Controls (9:00)
- M.1.1.10 Control Objective-5 (9:22)
- M.1.1.11 Control Objective-6 (12:50)
- M.1.1.12 Control Objective-7 (8:46)
- M.1.1.13 Control Objective-8 (18:47)
- M.1.1.14 Control Objective-9 (18:55)
- M.1.1.15 Control Objective-10 (5:45)
- M.1.1.16 Control Objective-11 (15:11)
- M.1.1.17 Control Objective-12 (18:46)
- M.1.1.18 Control Objective-13 (8:53)
- M.1.1.19 Control Objective-14 (18:01)
- M.1.1.20 Control Objective-15 (9:03)
- M.1.1.21 Control Objective-16 (8:35)
- M.1.1.22 Control Objective-17 (5:37)
- M.1.1.23 Control Objective-18 (10:17)
- M.1.1.24 Overview of ISMS implementation (6:02)
- M.1.1.25 Risk Assessment & Treatment (4:35)
- M.1.1.26 ISMS Documentation Review (4:13)
- M.1.1.27 ISMS Training (5:06)
- M.1.1.28 ISMS Documentation (4:22)
- M.1.1.29 Definitions (1:12)
- M.1.1.30 Audit, Certification, IAF, LI, LA (7:47)
- M.1.1.31 Audit Programme (4:03)
- M.1.1.32 Audit Activities (3:03)
- M.1.1.33 Audit Plan & Audit Checklist (2:13)
- M.1.1.34 Audit Findings & Audit Report (1:03)
- M.1.1.35 Opportunity For Improvement (OFI) & Non-Conformity (NC) (0:43)
- M.1 ISMS (PDF)
- M.2.1.1 Agenda (2:28)
- M.2.1.2 Introduction to PCI DSS (2:50)
- M.2.1.3 Common terms related to PCI DSS (1:12)
- M.2.1.4 Entities Involved in Payment Card Transactions (2:10)
- M.2.1.5 Some more details about Payment Card (23:14)
- M.2.1.6 Consequences of Compromised Payment Card Data (1:02)
- M.2.1.7 Need and Application of PCI DSS (2:59)
- M.2.1.8 Steps for Adhering to PCI DSS (0:51)
- M.2.1.9 Scoping & Network Segmentation (7:09)
- M.2.1.10 Compliance Requirements for PCI DSS (18:52)
- M.2.1.11 Levels of PCI Compliance (2:02)
- M.2.1.12 Do’s and Don’ts for Payment Card Security (6:02)
- M.2.1.13 SAQ and QSA (5:09)
- M.2.1.14 PA-DSS and its Requirements (16:46)
- M.2.1.15 Pin Transaction Security (PTS) (1:36)
- M.2.1.16 Payment Card Data Breaches and Myths (4:53)
- M.2.1.17 ROC, AOC & COC (20:48)
- M.2.1.18 PA QSA, QPA & ASV (3:38)
- M.2.1.19 Payment Card Attacks (5:23)
- M.2 PCI DSS (PDF)
- M.3.1.1 Agenda (2:00)
- M.3.1.2 Introduction to BCM (5:43)
- M.3.1.3 Business Continuity Planning (3:49)
- M.3.1.4 Issues in BCM (1:52)
- M.3.1.5 Risk Control Options (3:50)
- M.3.1.6 Disaster Recovery Plan (5:20)
- M.3.1.7 Maintenance of BCM Plan (3:32)
- M.3.1.8 Business Impact Analysis (5:59)
- M.3.1.9 Backup Sites (8:24)
- M.3.1.10 Backup Considerations and Backup Types (9:25)
- M.3.1.11 ISO 22301 and ISO 22301 Requirements (11:36)
- M.3.1.12 Mandatory Documents of ISO 22301 and Benefits (2:34)
- M.3 BCM (PDF)
Sign up and Start Today
Pay-in-full in your local currency (where available)
We take all major forms of payment and we use secure checkout.
Featured Courses
Our most popular courses and offers.
Find out more about our Virtual Cyber Consultant service if you have immediate requirements in cybersecurity, governance, risk and compliance that need to be fulfilled in a short span of time.