The Business Process & IT Best Practices Specialist!
Contact Us
+91 9810609560

Implementing Information Security with ISO 27001


Course Description:

This Three -day intensive course leading to Certified Information Security Management System (ISMS) Lead Implementer for ISO/IEC 27001:2005 (CISMS-LI) Certification    is designed to give a walk through of the business process of establishing, implementing and maintaining an Information Security Management System (ISMS) using the 7 Secure Seven step ISMS Implementation Framework based on the ISO/IEC 27001:2005 standards.
Its core focus is to train participants on practical steps involved in building and implementing an ISMS . It equips and prepares delegates for the necessary skills to implement an ISMS that is compliant with the requirements of ISO/IEC 27001 :2005  and meets the certification requirements of ISO/IEC 27001 :2005 . 

Course Objectives:

  • Understand the purpose of an information security management system (ISMS)
  • Understand and ask the pertinent questions required for a ISO/IEC 27001 :2005 Gap Analysis
  • The processes involved in establishing, implementing, operating, monitoring, reviewing and improving an ISMS as defined in ISO/IEC 27001 :2005 .
  • Receive hands-on exposure to variety of Risk Assessment Tools and Techniques
  • Prepare an effective security improvement plan
  • Knowledge and Skills for advising on compliance to the standard

Course  Requirements

Participants are expected to have exposure to  information security and the ISO/IEC 27001 standards, or must have been exposed to other Management System Standards such as ISO 9000 or ISO 14000 series. as implementers or consultants

Course Topics:

A combination of tutorials, syndicate exercises & role play, covering in detail the 7 Secure Seven step ISMS Implementation Framework based on the ISO/IEC 27001:2005 standards for successfully managing and maintaining information Security in organizations:

The Three day workshop will cover:

  • Basics of an Information Security Management System
  • Security Policy: Designing Security Policy and procedures
  • ISMS Scope : Defining the ISMS Scope
  • Risk Assessment: Techniques
  • Risk Treatment: Control selection based on ISO/IEC 27001:2005.
  • ISMS Documentation including Preparation of Statement of Applicability.
  • ISMS Implementation: Deployment and Operation of an ISMS
  • Certification process, surveillance visits and re-certification
  • The continual improvement program

• Monitoring, reviewing and checking the ISMS
• Implementing corrective and preventive controls

Written Exam at the end of third day

 

Completion Conditions:

  • Delegates must clear the written ISMS lead Implementer examination for implementing 7 Secure Seven step ISMS Implementation Framework leading to Award of Certificate
  • Certified Information Security Management System (ISMS) Lead Implementer for ISO/IEC 27001:2005 (CISMS-LI)
  • To achieve the above delegates must Pass the Continuous Assessment by demonstrating acceptable levels of performance in a formal continuous assessment processes and Pass the written Examination.