ISO/IEC 27001 Lead Implementer Training (Incl. PECB Certification)
This training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001. During this training course, you will also gain a thorough understanding of the best practices of Information Security Management Systems to secure the organization`s sensitive information and improve the overall performance and effectiveness.
After mastering all the necessary concepts of Information Security Management Systems, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential. By holding a PECB Lead Implementer Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to implement ISO/IEC 27001 in an organization.
This training is for people interested in understanding how hackers think to protect their organization better. This course is suitable for:
- Managers or consultants involved in Information Security Management;
- Expert advisors seeking to master the implementation of an Information Security Management System;
- Individual responsible for maintaining conformance with ISMS requirements;
- ISMS team members.
Required skills & expertise
A fundamental understanding of ISO/IEC 27001 and comprehensive knowledge of implementation principles.
The duration of this training course is 5 days.
Day 1: Introduction to ISO/IEC 27001 and initiation of an ISMS
The training starts with a short introduction in standards and regulatory frameworks, Information Security Management System and initiating the implementation of an ISMS. This knowledge about the basic principles of ISMS is an absolute prerequisite to understand and clarify the Information Security objectives of the organisation and to analyse the existing management system.
- Course objectives and structure
- Standards and regulatory frameworks
- Information Security Management System
- Initiating the implementation of an ISMS
- Understanding the organization and clarifying the Information Security objectives
- Analysis of the existing management system
Day 2: Plan the implementation of an ISMS
- Leadership and approval of the ISMS project
- ISMS scope
- Information Security policies
- Risk assessment
- Statement of applicability and top management’s decision to implement the ISMS
- Definition of the organizational structure of Information Security
Day 3: Implementation of an ISMS
- Definition of the document management process
- Design of security controls and drafting of specific policies & procedures
- Communication plan
- Training and awareness plan
- Implementation of security controls
- Incident management
- Operations Management
Day 4: ISMS monitoring, measurement, continuous improvement and preparation for a certification audit
- Monitoring, measurement, analysis and evaluation
- Internal audit
- Management review
- Treatment of non-conformities
- Continual improvement
- Preparing for the certification audit
- Competence and evaluation of implementers
- Closing the training
Day 5: Certification Exam
The 'PECB Certified ISO/IEC 27001 Lead Implementer' 3-hour exam fully meets the requirements of the PECB Examination and Certification Programme (ECP).
- Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks
- Master the concepts, approaches, methods and techniques used for the implementation and effective management of an ISMS
- Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization
- Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS
- Acquire the expertise to advise an organization in implementing Information Security Management System best practices
Unfortunately, the registration for this open class training is closed. Check our agenda for more interactive training courses and hands-on hacking workshops that are open to join.
If you would like to enquire about the possibility of hosting an interactive tailor-made threat modeling session in your company, please let us know via the contact form, by telephone + 31 40 23 77 990 or email firstname.lastname@example.org. Want to be the first to know more about out latest training courses and workshops? Sign up here!