Training Module
Training Module

Information Security Foundations II

Understand the fundamentals of detection, logging, monitoring, alerting, and responsive control concepts in information security

Understand

Implement

Manage

Audit

Training module overview

Many organisations invest in monitoring and incident response capabilities, yet still discover incidents late, escalate inconsistently, or collect data that is not usable under pressure. The problem is rarely the absence of tools; it is a weak shared understanding of what should be detected, what constitutes a credible signal, and what “response” means in operational terms.

This full-day domain fundamentals module explains the concepts behind common detective and responsive controls and links them to ISO/IEC 27001 Annex A control themes. It is intentionally not a risk management module, does not define ISMS scope or the Statement of Applicability, and does not teach preventive control concepts (covered in Foundations I) or operational control implementation mechanics (covered in the operational control specialisation). It focuses on intent, typical design choices, dependencies, and common failure modes for detection and response.

Many organisations invest in monitoring and incident response capabilities, yet still discover incidents late, escalate inconsistently, or collect data that is not usable under pressure. The problem is rarely the absence of tools; it is a weak shared understanding of what should be detected, what constitutes a credible signal, and what “response” means in operational terms.

This full-day domain fundamentals module explains the concepts behind common detective and responsive controls and links them to ISO/IEC 27001 Annex A control themes. It is intentionally not a risk management module, does not define ISMS scope or the Statement of Applicability, and does not teach preventive control concepts (covered in Foundations I) or operational control implementation mechanics (covered in the operational control specialisation). It focuses on intent, typical design choices, dependencies, and common failure modes for detection and response.

Target audience

  • Information security managers and ISMS implementers who coordinate monitoring and incident readiness

  • IT operations / platform owners who must turn detection expectations into workable configurations and routines

  • Service owners accountable for availability and incident handling in their domain

  • Compliance and governance professionals who need to interpret control intent and implementation patterns (without re-teaching management-system methods)

  • Information security managers and ISMS implementers who coordinate monitoring and incident readiness

  • IT operations / platform owners who must turn detection expectations into workable configurations and routines

  • Service owners accountable for availability and incident handling in their domain

  • Compliance and governance professionals who need to interpret control intent and implementation patterns (without re-teaching management-system methods)

Agenda

Course ID:

HAM-ISF-2

Audience:

Auditor

Manager

Domain:

Information Security

Available in:

English

Duration:

7 h

List price:

CHF 550

Excl. VAT. VAT may apply depending on customer location and status.

What you get

Learning outcomes

  • Explain the intent and limits of detective controls, including the concepts of coverage, latency, and signal quality

  • Describe logging requirements that make detection and investigation feasible (sources, fields, timing, identity, integrity)

  • Distinguish monitoring from alerting and apply basic tuning logic to reduce noise and missed signals

  • Describe core incident response concepts (escalation, containment, evidence preservation, recovery) and typical coordination failure modes

  • Identify common breakdowns in detection/response controls (blind spots, alert fatigue, unclear roles, untestable recovery)

  • Relate detection and response concepts to ISO/IEC 27001 Annex A control themes to support coherent implementation discussions

  • Explain the intent and limits of detective controls, including the concepts of coverage, latency, and signal quality

  • Describe logging requirements that make detection and investigation feasible (sources, fields, timing, identity, integrity)

  • Distinguish monitoring from alerting and apply basic tuning logic to reduce noise and missed signals

  • Describe core incident response concepts (escalation, containment, evidence preservation, recovery) and typical coordination failure modes

  • Identify common breakdowns in detection/response controls (blind spots, alert fatigue, unclear roles, untestable recovery)

  • Relate detection and response concepts to ISO/IEC 27001 Annex A control themes to support coherent implementation discussions

Learning materials

  • Slide deck

  • Participant workbook

  • Certificate of completion

  • Slide deck

  • Participant workbook

  • Certificate of completion

Templates & tools

  • Detection concept map (signal → source → quality → escalation path)

  • Logging quality checklist (minimum fields, time sync, identity context, integrity considerations)

  • Alert design and tuning checklist (thresholds, baselines, severity, routing, suppression)

  • Incident response decision points canvas (containment vs. continuity, evidence, communications)

  • ISO/IEC 27001 Annex A crosswalk (concept → control theme references, indicative)

  • Detection concept map (signal → source → quality → escalation path)

  • Logging quality checklist (minimum fields, time sync, identity context, integrity considerations)

  • Alert design and tuning checklist (thresholds, baselines, severity, routing, suppression)

  • Incident response decision points canvas (containment vs. continuity, evidence, communications)

  • ISO/IEC 27001 Annex A crosswalk (concept → control theme references, indicative)

Prerequisites

This module assumes general professional familiarity with organisational IT and basic information security terminology. No prior ISO/IEC 27001 clause knowledge is required.

Helpful background includes:

  • Basic understanding of users, systems, networks, and common enterprise services

  • Familiarity with operational realities (incidents, outages, alerts, access, configuration changes)

  • Comfort reading simple technical diagrams or control descriptions

This module assumes general professional familiarity with organisational IT and basic information security terminology. No prior ISO/IEC 27001 clause knowledge is required.

Helpful background includes:

  • Basic understanding of users, systems, networks, and common enterprise services

  • Familiarity with operational realities (incidents, outages, alerts, access, configuration changes)

  • Comfort reading simple technical diagrams or control descriptions

Helpful preparatory modules

The modules below prepare for an optimal learning experience – but are not strictly necessary for participants to follow.

Information Security Foundations II: Detective & Responsive Controls

Understand the fundamentals of detection, logging, monitoring, alerting, and responsive control concepts in information security

7 h

Information Security Foundations II: Detective & Responsive Controls

Understand the fundamentals of detection, logging, monitoring, alerting, and responsive control concepts in information security

7 h

Information Security Foundations II: Detective & Responsive Controls

Understand the fundamentals of detection, logging, monitoring, alerting, and responsive control concepts in information security

7 h

System Foundations: Context, Stakeholders, and System Boundaries

Understand organisational context, stakeholders, and system boundaries

7 h

System Foundations: Context, Stakeholders, and System Boundaries

Understand organisational context, stakeholders, and system boundaries

7 h

System Foundations: Context, Stakeholders, and System Boundaries

Understand organisational context, stakeholders, and system boundaries

7 h

Office scene with people standing, walking and sitting

Ready to achieve mastery?

Bring ISO requirements into everyday practice to reduce avoidable issues and strengthen the trust of your customers and stakeholders.

Office scene with people standing, walking and sitting

Ready to achieve mastery?

Bring ISO requirements into everyday practice to reduce avoidable issues and strengthen the trust of your customers and stakeholders.

Office scene with people standing, walking and sitting

Ready to achieve mastery?

Bring ISO requirements into everyday practice to reduce avoidable issues and strengthen the trust of your customers and stakeholders.