ISO 27032 preparation course

This intensive course allows participants in obtaining the necessary knowledge and skills for aiding an organization in the implementation and management of a cyber-security program based on ISO/IEC 27032 standard and the cyber-security framework of the National Institute on Standards and Technology (NIST).
  • This educational training will allow participants in obtaining a general vision of cyber-security and other types of security and the role of interested parties in cyber-security.  This course may be used as an orientation for addressing common problems pertaining to cyber-security and presents a framework that allows the interested parties in collaborating for the resolution of questions relative to cyber-security.  
  • Obtain a comprehensive knowledge of the components and the operations of a cyber-security program in accordance with ISO/IEC 27031 and the NIST cyber-security framework.
  • Understand the correlation between ISO 27032 and the NIST cyber-security framework, as well as other standards and operating frameworks.
  • Obtain the skills for implementing, maintaining and managing in a continuous manner a risk management program in accordance with ISO 13000.
  • Master concepts, approaches, standards, methods and techniques for effectively establishing, implementing and managing a cyber-security program within an organization. 
  • Be able to interpret the directives of ISO/IEC 27032 in the specific context of an organization.  
  • Obtain the necessary expertise for planning, implementing, managing, controlling and maintaining a cyber-security program in accordance with the set out in ISO/IEC 27032 and the NIST cyber-security framework.
  • Develop the expertise to advise an organization on the best practices for cyber-security management.  
  • Strengthen the necessary personal skills for implementing and maintaining a cyber-security program. 

Content and agenda

  1. Introduction to cyber-security and related concepts as recommended by ISO/IEC 27032
  2. Cyber-security policy and risk management
  3. Cyber-security controls, exchange of information and coordination 
  4. Incidents management, follow-up and sustained improvement
  5. Test

This course is aimed at: 

  • Cyber-security professionals
  • Information security experts
  • Project managers who wish to manage a cyber-security program
  • Technical experts who wish to prepare themselves for cyber-security positions
  • Individuals responsible for elaborating a cyber-security program

* mandatory fields

Your personal data is collected by Mazars in Mexico, the data controller, in accordance with applicable laws and regulations. Fields marked with an asterisk are required. If any required field is left blank, it will not be possible to process your request. Your personal data is collected for the purpose of processing your request.

You have a right to access, correct and erase your data, and a right to object to or limit the processing of your data. You also have a right to data portability and the right to provide guidance on what happens to your data after your death. Finally, you have the right to lodge a complaint with a supervisory authority and a right not to be the subject of a decision based exclusively on automated processing, including profiling, that produces legal effects concerning you or significantly affects you in a similar way.