cybersecurity workshop for business
Who Should Attend?
Anyone who wants to minimize cybercrime risks when they use online communication services like email and social networks.
Duration:
1 Day
pecb cERTIFIED iso/iec 27001 lead implementer
What is PECB Certified ISO/IEC 27001 Lead Implementer?
ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001. During this training course, you will also gain a thorough understanding of the best practices of Information Security Management Systems to secure the organization`s sensitive information and improve the overall performance and effectiveness.
After mastering all the necessary concepts of Information Security Management Systems, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential. By holding a PECB Lead Implementer Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to implement ISO/IEC 27001 in an organization.
Who Should Attend?
ISMS Manager, ISMS Consultants, ISMS Advisors, ISMS Team Members
Duration:
5 Days
Language:
English
Class Format:
Instructor-lead Classroom
Student Materials:
Training material containing over 450 pages of information and practical examples
Certification:
PECB Certified ISO/IEC 27001 Lead Implementer
COURSE CONTENT
Day 1: Introduction to ISO/IEC 27001 and initiation of an ISMS
a) Course Objectives and Structure
b) Standard and regulatory framework
c) Information Security Management System (ISMS)
d) Fundamental principles of Information Security Management
Systems
e) Initiating the implementation of an ISMS
f) Understanding the organization and clarifying the Information
Security objective
g) Analysis of the existing management system
Day 2: Plan the implementation of an ISMS
a) Leadership and approval of the ISMS project
b) ISMS scope
c) Information Security policies
d) Risk assessment
e) Statement of Applicability and top management's decision to
implement the ISMS
f) Definition of the organizational structure of Information Security
Day 3: Implementation of an ISMS
a) Definition of the document management process
b) Design of security controls and drafting of specific policies &
Procedures
c) Communication plan
d) Training and awareness plan
e) Implementation of security controls
f) Incident Management
g) Operations Management
Day 4: ISMS monitoring, measurement, continuous improvement and
preparation for a certification audit
a) Monitoring, measurement, analysis and evaluation
b) Internal audit
c) Management review
d) Treatment of non-conformities
e) Continual improvement
f) Preparing for the certification audit
g) Competence and evaluation of implementers
Day 5: Certification Exam