Attendees will learn how to specify requirements to plan, establish, implement, operate, monitor, review, maintain, and continually improve a system to protect against, reduce the likelihood of occurrence, prepare for, respond to, and recover from disruptive incidents when they arise. This training course tells you how to implement the requirements of the standard itself, through various activities, exercises, case studies, multiple-choice standalone quizzes, and scenario-based quizzes. This class is for students looking to get a detailed introduction to the standard and a step-by-step understanding of how an ISMS or cyber security type requirements be put in place. This course can be taken in-person or instructor driven via Zoom.