top of page

cybersecurity workshop for business

Who Should Attend?

Anyone who wants to minimize  cybercrime risks when they use online communication services like email and social networks.

Duration:

1 Day

pecb cERTIFIED iso/iec 27001 lead implementer

What is PECB Certified ISO/IEC 27001 Lead Implementer?

ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001. During this training course, you will also gain a thorough understanding of the best practices of Information Security Management Systems to secure the organization`s sensitive information and improve the overall performance and effectiveness.

After mastering all the necessary concepts of Information Security Management Systems, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential. By holding a PECB Lead Implementer Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to implement ISO/IEC 27001 in an organization.

Who Should Attend?

ISMS Manager, ISMS Consultants, ISMS Advisors, ISMS Team Members

Duration:

5 Days

Language:

English

Class Format:

Instructor-lead Classroom

Student Materials:

Training material containing over 450 pages of information and practical examples

Certification:

PECB Certified ISO/IEC 27001 Lead Implementer

COURSE CONTENT

Day 1: Introduction to ISO/IEC 27001 and initiation of an ISMS          

                  a) Course Objectives and Structure

                  b) Standard and regulatory framework

                  c) Information Security Management System (ISMS)

​                  d) Fundamental principles of Information Security Management

                      Systems

​                  e) Initiating the implementation of an ISMS

​                  f) Understanding the organization and clarifying the Information 

                      Security objective

​                  g) Analysis of the existing management system

Day 2: Plan the implementation of an ISMS

                  a) Leadership and approval of the ISMS project

                  b) ISMS scope

                  c) Information Security policies

​                  d) Risk assessment

​                  e) Statement of Applicability and top management's decision to

                      implement the ISMS

                   f) Definition of the organizational structure of Information Security

Day 3: Implementation of an ISMS          

                  a) Definition of the document management process

                  b) Design of security controls and drafting of specific policies &

                       Procedures

                  c) Communication plan

​                  d) Training and awareness plan

​                  e) Implementation of security controls

​                  f)  Incident Management

​                  g) Operations Management

Day 4: ISMS monitoring, measurement, continuous improvement and

            preparation for a certification audit         

                  a) Monitoring, measurement, analysis and evaluation

                  b) Internal audit

                  c) Management review

​                  d) Treatment of non-conformities

​                  e) Continual improvement

​                   f) Preparing for the certification audit

​                  g) Competence and evaluation of implementers

Day 5: Certification Exam

bottom of page