ISO/IEC 27032:2012 Guidelines for Cybersecurity Training Course

The cyberspace is a complex environment. It involves different types of interactions between people, software, hardware and physical locations to support with storage, processing, communication and service delivery for a wide range of information. This means the security requirements vary depending upon use, criticality and sensitivity of the information, as well as the level of collaboration between stakeholders.

International Standards such as ISO/IEC 27002 provide some best practice recommendations on information security controls, however risks relating to cybersecurity need extra technical guidance including:

• Social engineering attacks
• Hacking
• Proliferation of malicious software (malware)
• Spyware
• Other potentially unwanted software

Building on the concepts and framework specified in ISO/IEC 27001, the best practice guidance and techniques in ISO/IEC 27032 help you to manage and respond to these cybersecurity issues, including how to:

• Prepare for attacks, whether by malware or by unauthorised entities
• Detect and monitor attacks
• Respond to attacks

This course will provide you with knowledge on ISO/IEC 27032 so you can understand, prepare for, detect, respond to and monitor issues related to cybersecurity for your organization.  You will be provided with:

• An overview of cybersecurity
• An explanation of the relationship between cybersecurity and other types of security
• A definition of stakeholders and a description of their roles in cybersecurity
• Guidance for addressing common cybersecurity issues
• A framework to enable stakeholders to collaborate on resolving cybersecurity issues