Njlbk3l0smk2czghb3wy

Constructs of Information Security Management System

Management and architecture of Cyber security : Understanding the Policy,Process, Control and Governance framework

   Watch Promo   Enroll in Course

Cyber threatsare one of the most clear and present danger looming over organisation in the current digital world. Cyber securityis an area where technology, people, process and control work together hand-in-gloves to thwart any information leak and hence saving organisation from financial and reputational loss. Information security is fundamental to cyber security as it prepares the organisation to defend the breach of information assets. Any organisation’s cyber security programs is a combination of security of IT and telecom infrastructure, application, data and people. This is the data, also called as Information, that is vital for organisation’s survival. Hence, Information securitymanagement is of fundamental importance in any cyber security initiative adopted my organisations.

In the new age of digital economy, organisations are struggling to protect their digital asset also called as Information. The Information security management system a.k.a ISMS is one of the framework for organisations to adopt to become proactive to the internal as well as external threat to information security. The risk of information securitybreach is far-fetched than the old days phenomenon. These RISKsare not only monetary but also brand image, collapse of a business, property damage etc.

The five axes of digital technology viz. Social, Mobility, Analytics, Cloud and Internet of Everything(IOE) are disrupting the conventional method of doing business. Not adopting these technologies is questioning the basic survivability of organisation. As these technologies are getting adopted, the threat surface for information security breach has multiplied many folds. However, only technology does not lead to a super cyber defence mechanism. As high as, 90% of the information security breach has been attributed to employee or partners and their awareness of information security.

Hence, a good information security management system does not have technology as the only facet, but it has people, process, policy and guidelines as the governing principles with ever evolving strategy tuned to the emerging threat vectors in cyber world.

As a matter of fact, a new employee is required to sign information security non-disclosure and compliance document when they join an organisation. But is that effective? Do organisations see the informal chit-chat among employee a threat? Why can’t they create a work culture where information security become a habit of employees like the personal and family security engrained in their habits.

This course is all about understanding the components of information security management systems. It will bring clarity to technical person about the importance of people, process, policy and controls that governs the information security management in an organisation. This is a must course for all seeking a corporate career and being a good corporate citizen. Also, this is the first step for seeking a career in information security management with a gradual rise to the top position in Information security domain in corporate also called as Chief Information Security Officer(CISO).

This course dissects the information security myth from enterprise architect's point of view with the course name titled ‘Constructs of Information Security Management System’. It systematically builds from information to information security to all elements of ISMS starting with fundamental of information characteristics also called as Confidentiality, Integrity, Availability(CIA). As you know information securityis the major building block toward a step toward cyber security, learning ISMS basics is a must for all.

The last three lectures will enhance the knowledge for the professionals who wants to understand the Enterprize Security Architecture from a technology deployment perspective. This will help the working professional to decide which all technology elements to be implemented in order to secure the enterprise informationand be ready to responseto a cyber attack. The Chief Enterprize Security Officer (CISO) will have a refresher on technology elements.


Your Instructor


Krishna Basudevan
Krishna Basudevan

I am a digital transformation consultant in the area of Social, mobility, analytics, cloud and IoT. With 27 years of industry experience with large multinationals, I have been the enterprise architect with key focus on business and IT alignment. I have steered multi-million IT and telecom transformation projects in one of the top 5 global telecom company.

I have put those experience in the courses with related technology to solve business problems. With that in mind, the course has been designed to understand the basics and apply them in business domain. As a technology enthusiast, I have seen programmers and analyst goes over board to create technology solution to a business problem. My courses will teach students, how to apply right technology in business situation and decision making. My courses will evolve around Big data analytics, telecom, cyber security, IOT from a business perspective. As a student, I welcome you to go through the courses and ask question. You can always reach me at my email-id [email protected] or my handphone +91 9810411656.



Course Curriculum


  What is Information Security ?
Available in days
days after you enroll
  Information Risk Management
Available in days
days after you enroll
  Asset Classification
Available in days
days after you enroll
  Threat, Vulnerability, Control
Available in days
days after you enroll
  Information Security Governance
Available in days
days after you enroll
  Information Security Management Systems
Available in days
days after you enroll
  Enterprise Security Architecture and its Components
Available in days
days after you enroll
  Test Your Knowledge
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Get started now!