Training Module

Information Security Fundamentals I

Understand the core concepts behind preventive controls, including access management, cryptography, secure configuration, and protective design

Training Module

Information Security Fundamentals I

Understand the core concepts behind preventive controls, including access management, cryptography, secure configuration, and protective design

Training Module

Information Security Fundamentals I

Understand the core concepts behind preventive controls, including access management, cryptography, secure configuration, and protective design

Digital shield with a padlock symbol, representing information security fundamentals through preventive controls such as access management, cryptography, and secure system design.

How do preventive controls actually prevent incidents?

Understand the core concepts behind access management, cryptography, secure configuration, and protective design within an integrated control system.

Digital shield with a padlock symbol, representing information security fundamentals through preventive controls such as access management, cryptography, and secure system design.

How do preventive controls actually prevent incidents?

Understand the core concepts behind access management, cryptography, secure configuration, and protective design within an integrated control system.

Digital shield with a padlock symbol, representing information security fundamentals through preventive controls such as access management, cryptography, and secure system design.

How do preventive controls actually prevent incidents?

Understand the core concepts behind access management, cryptography, secure configuration, and protective design within an integrated control system.

Training module overview

Training module overview

Training module overview

This module explains how organizations prevent security incidents by reducing exposure and limiting attack opportunities before harm occurs.

Participants learn how authentication and authorization mechanisms, cryptographic safeguards, secure configuration, and protective system design work together within an integrated control architecture. The module clarifies the intent and limitations of these preventive safeguards and how they contribute to confidentiality, integrity, and availability.

Concepts are anchored in ISO/IEC 27001 Annex A. The focus is on structural understanding rather than operational implementation or tool configuration.

This module explains how organizations prevent security incidents by reducing exposure and limiting attack opportunities before harm occurs.

Participants learn how authentication and authorization mechanisms, cryptographic safeguards, secure configuration, and protective system design work together within an integrated control architecture. The module clarifies the intent and limitations of these preventive safeguards and how they contribute to confidentiality, integrity, and availability.

Concepts are anchored in ISO/IEC 27001 Annex A. The focus is on structural understanding rather than operational implementation or tool configuration.

Applicable environments

This module applies to organisations for which information security is relevant. It supports professionals who need a solid understanding of information security-specific concepts, terminology, and context in order to effectively implement, manage, or audit related management system requirements.

Target audience

Target audience

Target audience

  • Information security managers and ISMS implementers

  • CIOs, CTOs, CISOs, and other technology executives

  • IT service, platform, and application owners

  • Compliance, risk, and governance professionals (ISO/IEC 27001)

  • Security consultants and client-facing advisors

  • Product, engineering, and operations leads

  • Information security managers and ISMS implementers

  • CIOs, CTOs, CISOs, and other technology executives

  • IT service, platform, and application owners

  • Compliance, risk, and governance professionals (ISO/IEC 27001)

  • Security consultants and client-facing advisors

  • Product, engineering, and operations leads

Decision support

Is this module for you?

It is a good fit if you…

  • want to understand how preventive controls reduce risk.

  • need clarity on the intent and limits of ISO/IEC 27001 preventive controls.

  • implement or assess access control, cryptography, or secure configuration.

  • need a shared control vocabulary across security, IT, risk, and audit.

  • want to apply control requirements consistently in practice.

  • want to understand how preventive controls reduce risk.

  • need clarity on the intent and limits of ISO/IEC 27001 preventive controls.

  • implement or assess access control, cryptography, or secure configuration.

  • need a shared control vocabulary across security, IT, risk, and audit.

  • want to apply control requirements consistently in practice.

If most of the points above apply, this module is likely a good fit.

It may not be the best fit if you…

  • are primarily interested in detection, response, or recovery controls.

  • expect tool-specific configuration or hardening training.

  • want a clause-by-clause Annex A walkthrough.

  • already design and assess preventive controls confidently.

  • are primarily interested in detection, response, or recovery controls.

  • expect tool-specific configuration or hardening training.

  • want a clause-by-clause Annex A walkthrough.

  • already design and assess preventive controls confidently.

Agenda

Agenda

Agenda

  • What prevention actually means

  • Identity and access management fundamentals

  • Access governance patterns without process overhead

  • Cryptography as a preventive control

  • Protective configuration and secure build concepts

  • Network and platform protection fundamentals

  • Information handling and loss prevention basics

  • Case-based workshop

Show detailed agenda...

  • What prevention actually means

  • Identity and access management fundamentals

  • Access governance patterns without process overhead

  • Cryptography as a preventive control

  • Protective configuration and secure build concepts

  • Network and platform protection fundamentals

  • Information handling and loss prevention basics

  • Case-based workshop

Show detailed agenda...

  • What prevention actually means

  • Identity and access management fundamentals

  • Access governance patterns without process overhead

  • Cryptography as a preventive control

  • Protective configuration and secure build concepts

  • Network and platform protection fundamentals

  • Information handling and loss prevention basics

  • Case-based workshop

Show detailed agenda...

Learning outcomes

Learning outcomes

Learning outcomes

Key outcomes

  • Explain the purpose and limits of preventive controls in practice

  • Describe identity, cryptography, and configuration controls as complementary safeguards

  • Interpret network, platform, and information handling controls in terms of exposure reduction

  • Explain the purpose and limits of preventive controls in practice

  • Describe identity, cryptography, and configuration controls as complementary safeguards

  • Interpret network, platform, and information handling controls in terms of exposure reduction

Additional capabilities

  • Identify structural weaknesses and dependency gaps in preventive controls

  • Relate preventive controls to ISO/IEC 27001 Annex A

  • Communicate preventive control logic across technical and governance roles

  • Identify structural weaknesses and dependency gaps in preventive controls

  • Relate preventive controls to ISO/IEC 27001 Annex A

  • Communicate preventive control logic across technical and governance roles

Additional benefits

Additional benefits

Additional benefits

Learning materials

  • Slide deck

  • Participant workbook

Templates & tools

Practical, reusable artefacts to apply the module directly to your organisation.

  • IAM policy, identity governance concept, and access management process

  • Cryptography policy and key & certificate management process

  • Secure configuration & baseline concept

  • Segmentation & boundary control concept

  • Information classification & handling policy

  • AI prompt collection for artifact adjustment

  • IAM policy, identity governance concept, and access management process

  • Cryptography policy and key & certificate management process

  • Secure configuration & baseline concept

  • Segmentation & boundary control concept

  • Information classification & handling policy

  • AI prompt collection for artifact adjustment

Confirmation

  • Certificate of completion

Module ID

HAM-IS-DF-01

Audience

Auditor

Manager

Language

English

Delivery

Live virtual

Duration

7 h

List price

CHF 750

Excl. VAT. VAT may apply depending on customer location and status.

Delivery & learning format

Delivery & learning format

Delivery & learning format

Virtual live teaching

This module is delivered live, with a strong focus on discussion, practical application, and direct interaction with the instructor.

Sessions work through realistic examples, clarify concepts in context, and apply methods directly to participants’ organisational realities.

Custom delivery options

For organisations with specific constraints or learning objectives, the module can be adapted in format or scope, including in-house delivery and contextualised case material.

Not sure if this module is right for you?

Not sure if this module is right for you?

Not sure if this module is right for you?

Send a short message and describe your context.

For an optimal learning experience

Preparation guidance

This module is designed as part of a modular training approach. Topics are deliberately distributed across modules and are not repeated in full, in order to avoid unnecessary redundancy. Each module is self-contained and can be taken on its own. Where prior knowledge or experience is helpful, this is indicated below so you can decide whether any preparation is useful for you.

For an optimal learning experience

Preparation guidance

This module is designed as part of a modular training approach. Topics are deliberately distributed across modules and are not repeated in full, in order to avoid unnecessary redundancy. Each module is self-contained and can be taken on its own. Where prior knowledge or experience is helpful, this is indicated below so you can decide whether any preparation is useful for you.

For an optimal learning experience

Preparation guidance

This module is designed as part of a modular training approach. Topics are deliberately distributed across modules and are not repeated in full, in order to avoid unnecessary redundancy. Each module is self-contained and can be taken on its own. Where prior knowledge or experience is helpful, this is indicated below so you can decide whether any preparation is useful for you.

Assumed background

This module assumes general professional with organisational IT and information handling. No prior ISO/IEC 27001 clause knowledge is required.

Helpful background includes:

  • Basic understanding of users, systems, networks, and common enterprise tooling

  • Familiarity with operational realities (access requests, admin roles, configuration changes)

  • Comfort reading simple technical diagrams or control descriptions

This module assumes general professional with organisational IT and information handling. No prior ISO/IEC 27001 clause knowledge is required.

Helpful background includes:

  • Basic understanding of users, systems, networks, and common enterprise tooling

  • Familiarity with operational realities (access requests, admin roles, configuration changes)

  • Comfort reading simple technical diagrams or control descriptions

Continuous learning

Follow-up modules

Continuous learning

Follow-up modules

Continuous learning

Follow-up modules

After completion of this module, the following modules are ideal to further deepen your competence. If you are looking for a structured learning path, modules can also be taken as part of a professional track.

Information Security Fundamentals II

Understand the core concepts behind detective and corrective controls, including logging and monitoring, incident response, backup, and recovery

Duration

7 h

List price

CHF 750

View module

Information Security Fundamentals II

Understand the core concepts behind detective and corrective controls, including logging and monitoring, incident response, backup, and recovery

Duration

7 h

List price

CHF 750

View module

Information Security Fundamentals II

Understand the core concepts behind detective and corrective controls, including logging and monitoring, incident response, backup, and recovery

Duration

7 h

List price

CHF 750

View module

Information Security Risk Management

Understand ISO/IEC 27001 requirements for information security risk assessment, risk treatment, and traceable risk decisions

Duration

7 h

List price

CHF 550

View module

Information Security Risk Management

Understand ISO/IEC 27001 requirements for information security risk assessment, risk treatment, and traceable risk decisions

Duration

7 h

List price

CHF 550

View module

Information Security Risk Management

Understand ISO/IEC 27001 requirements for information security risk assessment, risk treatment, and traceable risk decisions

Duration

7 h

List price

CHF 550

View module

ISMS Scope, Boundaries & Statement of Applicability

Understand how to define an ISO/IEC 27001 ISMS scope and boundaries and document a Statement of Applicability (SoA)

Duration

7 h

List price

CHF 550

View module

ISMS Scope, Boundaries & Statement of Applicability

Understand how to define an ISO/IEC 27001 ISMS scope and boundaries and document a Statement of Applicability (SoA)

Duration

7 h

List price

CHF 550

View module

ISMS Scope, Boundaries & Statement of Applicability

Understand how to define an ISO/IEC 27001 ISMS scope and boundaries and document a Statement of Applicability (SoA)

Duration

7 h

List price

CHF 550

View module

Operational Control in Information Security

Understand operational planning, controlled change, and day-to-day control operation in an ISO/IEC 27001 ISMS

Duration

7 h

List price

CHF 550

View module

Operational Control in Information Security

Understand operational planning, controlled change, and day-to-day control operation in an ISO/IEC 27001 ISMS

Duration

7 h

List price

CHF 550

View module

Operational Control in Information Security

Understand operational planning, controlled change, and day-to-day control operation in an ISO/IEC 27001 ISMS

Duration

7 h

List price

CHF 550

View module

Office scene with people standing, walking and sitting

Ready to improve your management systems?

We support continuous improvement by embedding ISO requirements into everyday practice and daily operations.

Office scene with people standing, walking and sitting

Ready to improve your management systems?

We support continuous improvement by embedding ISO requirements into everyday practice and daily operations.

Office scene with people standing, walking and sitting

Ready to improve your management systems?

We support continuous improvement by embedding ISO requirements into everyday practice and daily operations.