ISO/IEC 27001 Lead Implementer – E-Learning – English

This course includes:

  • Price £995.00 excluding VAT

Why should you attend

Information security threats and attacks increase and improve constantly. The best form of defense against them is the proper implementation and management of information security controls and best practices. Information security is also a key expectation and requirement of customers, legislators, and other interested parties. This eLearning training course is designed to prepare you for implementing an information security management system (ISMS) based on the requirements of ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement. After attending the eLearning training course, you can take the exam. If you successfully pass it, you can apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which demonstrates your ability and practical knowledge to implement an ISMS based on the requirements of ISO/IEC 27001

Who can attend:

  • Project managers and consultants involved in and concerned with the implementation of an ISMS
  • Expert advisors seeking to master the implementation of an ISMS
  • Individuals responsible for ensuring conformity to information security requirements within an organization
  • Members of an ISMS implementation team

Learning objectives:

  • Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of an ISMS
  • Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
  • Understand the operation of an information security management system and its processes based on ISO/IEC 27001
  • Learn how to interpret and implement the requirements of ISO/ IEC 27001 in the specific context of an organization
  • Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an ISMS

Educational approach:

  • The entire training course and examination is carried out electronically (hence the “e” in eLearning), so all you need in order to access these training courses is a device (e.g., computer, tablet, smartphone), working internet access, and the KATE application.
  • Having access to the training courses 24/7 enables you to dictate the pace of your study. You do not have to worry about schedules, traveling, and accommodation, or having to take days off from work.
  • The unlimited access allows you to go back to any section of the training course as you need them.
  • Every training course consists of several video sections
  • This was done with the sole purpose of making the information easy to receive and process.

Course agenda:

Section 1:  Training course objectives and structure

Section 2: Standards and regulatory frameworks

Section 3: Information Security Management System (ISMS)

Section 4: Fundamental information security concepts and principles

Section 5: Initiation of the ISMS implementation

Section 6: Understanding the organization and its context

Section 7: ISMS scope

Section 8:  Leadership and project approval

Section 9: Organizational structure

Section 10: Analysis of the existing system

Section 11: Information security policy

Section 12: Risk management

Section 13: Statement of Applicability

Section 14: Documented information management

Section 15: Selection and design of controls

Section 16:  Implementation of controls

Section 17: Trends and technologies

Section 18:  Communication

Section 19: Competence and awareness

Section 20: Security operations management

Section 21: Monitoring, measurement, analysis, and evaluation

Section 22: Internal audit

Section 23:  Management review

Section 24: Treatment of nonconformities

Section 25: Continual improvement

Section 26:  Preparing for the certification audit

Section 27: Closing of the training course