Home / Training / Lead Implementer ISO 27001

Lead Implementer ISO 27001

Become an expert in implementing and managing an Information Security Management System (ISMS) according to ISO 27001.

Objective

The ISO 27001 Lead Implementer training allows you to acquire the necessary expertise to support an organization in establishing, implementing, managing, and maintaining an Information Security Management System (ISMS) compliant with ISO 27001. You will master best practices to improve customer satisfaction, efficiency, and overall organizational performance.

Specific objectives:

  • Understand the correlation between ISO 27001 and other standards and regulatory frameworks
  • Know how to interpret the requirements of ISO 27001 in the organizational context

Prerequisites

  • Basic knowledge of information systems security

General Information

  • Code: ISO 27001 LI
  • Duration: 5 days
  • Schedule: 8:30 AM - 5:30 PM
  • Location: 4-star hotel, Tunis

Target audience

  • Expert IT consultants
  • Technical experts wishing to move into information security or security project management

Resources

  • Course materials
  • 40% demonstration
  • 40% theory
  • 20% practical exercises

Training Program

  • Day 1 : Introduction to ISO/IEC 27001 and ISMS initiation
    • Objectives and training structure
    • Normative and regulatory frameworks
    • Information Security Management System
    • Fundamental principles and concepts of ISMS
    • Initiation of ISMS implementation
    • Understanding the organization and clarifying security objectives
    • Analysis of the existing management system
  • Day 2 : Planning ISMS implementation
    • Leadership and ISMS project approval
    • ISMS scope
    • Information security policies
    • Risk assessment
    • Statement of applicability and management decision
    • Defining the organizational structure of security
  • Day 3 : ISMS implementation
    • Defining a documentation management process
    • Designing security measures and writing procedures and policies
    • Communication plan
    • Training and awareness plan
    • Implementing security measures
    • Incident management
    • Operational activities management
  • Day 4 : Monitoring, measurement, continuous improvement, and preparation for certification audit
    • Monitoring, measurement, analysis, and evaluation
    • Internal audit
    • Management review
    • Handling non-conformities
    • Continuous improvement
    • Preparation for certification audit
    • Competence and evaluation of "implementers"
    • Training closure
  • Day 5 : Exam session
Download PDF program

Do not hesitate to contact our experts for any additional information, free study and calculation of an audit service.

Information security is essential for any company that needs to protect and improve its information assets.

Contact us