ISO 27001 Lead Implementer

4.6 out of 5 rating

Jump to dates

Duration

4.125 Days

24.75 CPD hours

This course is intended for

The job roles best suited to the material in this course are: Project managers and consultants involved in and concerned with the implementation of an ISMS, expert advisors seeking to master the implementation of an ISMS, individuals responsible for ensuring conformity to information security requirements within an organization

Overview

Master the concepts, approaches, methods and techniques used for the implementation and effective management of an ISMS
Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization
Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks
Acquire the expertise to advise an organization in implementing Information Security Management System best practices

Description

This training course is designed to prepare you to implement an information security management system (ISMS) based on the requirements of ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement.

Introduction to ISO/IEC 27001 and initiation of an ISMS
  • Training course objectives and structure
  • Standards and regulatory frameworks
  • Information Security Management System (ISMS)
  • Fundamental information security concepts and principles
  • Initiation of the ISMS implementation
  • Understanding the organization and its context
  • ISMS scope
Planning the implementation of an ISMS
  • Leadership and project approval
  • Organizational structure
  • Analysis of the existing system
  • Information security policy
  • Risk management
  • Statement of Applicability
Implementation of an ISMS
  • Documented information management
  • Selection and design of controls
  • Implementation of controls
  • Trends and technologies
  • Communication
  • Competence and awareness
  • Security operations management
ISMS monitoring, continual improvement, and preparation for the certification audit
  • Monitoring, measurement, analysis, and evaluation
  • Internal audit h Management review
  • Treatment of nonconformities
  • Continual improvement
  • Preparing for the certification audit
  • Certification process and closing of the training course
Training Insurance Included!

When you organise training, we understand that there is a risk that some people may fall ill, become unavailable. To mitigate the risk we include training insurance for each delegate enrolled on our public schedule, they are welcome to sit on the same Public class within 6 months at no charge, if the case arises.

What people say about us


Find out more about this course

Interested in alternative dates? Would like to book a private session of this course for your company? Or for any other queries please simply fill out the form below.