Information Security Training Program
ISO/IEC 27001 Lead Implementer
Agility Business Services ISO/IEC 27001 Lead Implementer course is designed to provide trainees with an expert-level understanding of implementing an Information Security Management System (ISMS) based on the ISO/IEC 27001 standard. The course covers the Plan-Do-Act-Check model and related concepts, processes, methods, and techniques for a comprehensive overview of ISMS implementation.
Course Outline
- Introduction to Information Security
- ISMS Overview
- IS Standards and Best Practices
- Context of the Organization
- Leadership
- Planning
- Support
- Operation
- Performance Evaluation
- Improvement
- Information Security Policies
- Organization of Information Security
- Human Resources
- Asset Management
- Access Control
- Cryptography
- Physical and Environmental Security
- Operations Security
- Communications Security
- System Development and Maintenance
- Supplier Relationships
- Information Security Incident Management
- IS Aspects of Business Continuity
- Management
- Compliance
- Develop the ISMS Project Charter
- Ensure Management Commitment
- Identify the Interested Parties
- Conduct a Gap Analysis
- Establish the Context of Organization
- Define the ISMS Scope
- Establish the Objectives, Processes, and Procedures
- Establish the ISMS Policy
- Define the Risk Assessment Approach
- Create the ISMS Implementation Plan
- Management Authorization
- Risk Treatment
- Implement the Compliance Policy
- Implementation of Controls
- Manage ISMS Operations
- Manage Resources
- Monitor the ISMS
- Conduct Internal Audits
- Review the ISMS
- Implement the Identified Improvements
- Corrective and Preventive Actions
- Communicate the Actions and Improvements
- Ensure Continual Improvement of the ISMS
Learning Objectives
- Be familiar with information security, including principles, fundamental concepts, standards, best practices, and laws/regulations.
- Be familiar with ISO/IEC 27001 requirements and controls and explain their function and operation.
- Be familiar with ISO/IEC 27001 – Annex A controls, and describe their purposes and implementation methods.
Target Audience
- CISO, CTO
- GDPR or Cybersecurity Consultant
- Information Security Expert, Consultant, Manager, Project Manager or Officer