Home / Training / ISO 27001 Certified Lead Implementer

ISO 27001 Certified Lead Implementer

Become an expert in implementing and managing an Information Security Management System (ISMS) according to ISO 27001.

Objective

The ISO 27001 Lead Implementer training enables you to acquire the expertise needed to assist an organization in establishing, implementing, managing, and maintaining an Information Security Management System (ISMS) compliant with ISO 27001. You will master best practices to improve customer satisfaction, efficiency, and the overall performance of the organization.

Specific objectives:

  • Understand the correlation between ISO 27001 and other standards and regulatory frameworks
  • Know how to interpret the requirements of ISO 27001 in the context of the organization

Prerequisites

  • Basic knowledge of information systems security

General Information

  • Code: ISO 27001 LI
  • Duration: 5 days
  • Schedule: 8:30 AM - 5:30 PM
  • Location: Training Center, North Urban Center, Tunis

Target Audience

  • IT expert consultants
  • Technical experts looking to move into information security or security project management

Resources

  • Course materials
  • 40% demonstration
  • 40% theory
  • 20% practical exercises

Training Program

  • Day 1: Introduction to ISO/IEC 27001 and ISMS initiation
    • Training objectives and structure
    • Normative and regulatory frameworks
    • Information Security Management System
    • Fundamental principles and concepts of ISMS
    • Initialization of ISMS implementation
    • Understanding the organization and clarifying security objectives
    • Analysis of existing management system
  • Day 2: Planning the implementation of an ISMS
    • Leadership and project approval
    • ISMS scope
    • Information security policies
    • Risk assessment
    • Statement of Applicability and management decision
    • Definition of security organizational structure
  • Day 3: Implementing an ISMS
    • Definition of a documentation management process
    • Design of security measures and writing of procedures and policies
    • Communication plan
    • Training and awareness plan
    • Implementation of security measures
    • Incident management
    • Operational activities management
  • Day 4: Monitoring, measurement, continuous improvement and certification audit preparation
    • Monitoring, measurement, analysis and evaluation
    • Internal audit
    • Management review
    • Treatment of non-conformities
    • Continuous improvement
    • Certification audit preparation
    • Competence and evaluation of implementers
    • Training closure
  • Day 5: Certification exam
Download the PDF Program

Do not hesitate to contact our experts for any additional information, free study and calculation of an audit service.

Information security is essential for any business that needs to protect and enhance its information assets.

Contact us