Information Security Lead Foundation

This course is already delivered, please contact us for the next available session tel:+357 22 44 14 92
Course Outline in PDF

Overview:

This course enables participants to learn about the best practices for implementing and managing an Information Security Management System (ISMS) as specified in ISO/IEC 27001:2013, as well as the best practices for implementing the information security controls of the eleven domains of the ISO 27002. This training also helps to understand how ISO 27001 and ISO 27002 relate with ISO 27003 (Guidelines for the implementation of an ISMS), ISO 27004 (Measurement of information security) and ISO 27005 (Risk Management in Information Security.

Who Should Attend:

•Members of an information security team
•IT Professionals wanting to gain a comprehensive knowledge of the main processes of an Information Security Management System (ISMS)
•Staff involved in the implementation of the ISO 27001 standard
•Technicians involved in operations related to an ISMS
•Auditors
•CxO and Senior Managers responsible for the IT governance of an enterprise and the
management of its risks

At Course Completion:
After completing this course, students should have learnt how to:

•Understand the implementation of an Information Security Management System in accordance with ISO27001
•Understand the relationship between an Information Security Management System, including risk management, controls and compliance with the requirements of different stakeholders of the organization
•Know the concepts, approaches, standards, methods and techniques allowing to effectively managing an Information Security Management System
•Acquire the necessary Knowledge to contribute in implementing an Information Security Management System (ISMS) as specified in ISO 2700

Outline:     

Day 1: Introduction to Information Security Management System (ISMS) concepts as required by ISO 27001


•Introduction to the ISO 27000 family of standards
•Introduction to management systems and the process approach
•Fundamental principles information security
•General requirements: presentation of the clauses 4 to 8 of ISO 27001
•Implementation phases of ISO 27001 framework
•Continual improvement of Information Security
•Conducting an ISO 27001 certification audit

Day 2: Implementing controls in information security according to ISO 27002 and Certification Exam

•Principles and design of information security controls
•Documentation of an information security control environment
•Monitoring and reviewing the information security controls
•Examples of implementation of information security controls based on ISO 27002 best practices
•Certified ISO/IEC 27001 Foundation exam

sd sd sd sd sd sd sd sd sd sd sd sd