cybersecurity workshop for business
Who Should Attend?
Anyone who wants to minimize cybercrime risks when they use online communication services like email and social networks.
pecb cERTIFIED iso/iec 27001 lead implementer
Who Should Attend?
ISMS Manager, ISMS Consultants, ISMS Advisors, ISMS Team Members
Training material containing over 450 pages of information and practical examples
PECB Certified ISO/IEC 27001 Lead Implementer
What is PECB Certified ISO/IEC 27001 Lead Implementer?
ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001. During this training course, you will also gain a thorough understanding of the best practices of Information Security Management Systems to secure the organization`s sensitive information and improve the overall performance and effectiveness.
After mastering all the necessary concepts of Information Security Management Systems, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential. By holding a PECB Lead Implementer Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to implement ISO/IEC 27001 in an organization.
Day 1: Introduction to ISO/IEC 27001 and initiation of an ISMS
a) Course Objectives and Structure
b) Standard and regulatory framework
c) Information Security Management System (ISMS)
d) Fundamental principles of Information Security Management
e) Initiating the implementation of an ISMS
f) Understanding the organization and clarifying the Information
g) Analysis of the existing management system
Day 2: Plan the implementation of an ISMS
a) Leadership and approval of the ISMS project
b) ISMS scope
c) Information Security policies
d) Risk assessment
e) Statement of Applicability and top management's decision to
implement the ISMS
f) Definition of the organizational structure of Information Security
Day 3: Implementation of an ISMS
a) Definition of the document management process
b) Design of security controls and drafting of specific policies &
c) Communication plan
d) Training and awareness plan
e) Implementation of security controls
f) Incident Management
g) Operations Management
Day 4: ISMS monitoring, measurement, continuous improvement and
preparation for a certification audit
a) Monitoring, measurement, analysis and evaluation
b) Internal audit
c) Management review
d) Treatment of non-conformities
e) Continual improvement
f) Preparing for the certification audit
g) Competence and evaluation of implementers
Day 5: Certification Exam