Information Security Training Program

 

ISO/IEC 27001 Lead Implementer

Agility Business Services ISO/IEC 27001 Lead Implementer course is designed to provide trainees with an expert-level understanding of implementing an Information Security Management System (ISMS) based on the ISO/IEC 27001 standard. The course covers the Plan-Do-Act-Check model and related concepts, processes, methods, and techniques for a comprehensive overview of ISMS implementation.

Course Outline

  • Introduction to Information Security
  • ISMS Overview
  • IS Standards and Best Practices
  • Context of the Organization
  • Leadership
  • Planning
  • Support
  • Operation
  • Performance Evaluation
  • Improvement
  • Information Security Policies
  • Organization of Information Security
  • Human Resources
  • Asset Management
  • Access Control
  • Cryptography
  • Physical and Environmental Security
  • Operations Security
  • Communications Security
  • System Development and Maintenance
  • Supplier Relationships
  • Information Security Incident Management
  • IS Aspects of Business Continuity
  • Management
  • Compliance
  • Develop the ISMS Project Charter
  • Ensure Management Commitment
  • Identify the Interested Parties
  • Conduct a Gap Analysis
  • Establish the Context of Organization
  • Define the ISMS Scope
  • Establish the Objectives, Processes, and Procedures
  • Establish the ISMS Policy
  • Define the Risk Assessment Approach
  • Create the ISMS Implementation Plan
  • Management Authorization
  • Risk Treatment
  • Implement the Compliance Policy
  • Implementation of Controls
  • Manage ISMS Operations
  • Manage Resources
  • Monitor the ISMS
  • Conduct Internal Audits
  • Review the ISMS
  • Implement the Identified Improvements
  • Corrective and Preventive Actions
  • Communicate the Actions and Improvements
  • Ensure Continual Improvement of the ISMS
Learning Objectives
  • Be familiar with information security, including principles, fundamental concepts, standards, best practices, and laws/regulations.
  • Be familiar with ISO/IEC 27001 requirements and controls and explain their function and operation.
  • Be familiar with ISO/IEC 27001 – Annex A controls, and describe their purposes and implementation methods.
Target Audience
  • CISO, CTO
  • GDPR or Cybersecurity Consultant
  • Information Security Expert, Consultant, Manager, Project Manager or Officer
5 Days

04-Sep - 08-Sep 2023

Contact