The Business Process & IT Best Practices Specialist!
Contact Us
+91 9810609560

ISO 27001 Lead Implementer Training Course


Course Overview

This Three -day intensive course leading to Lead Implementer Certification is designed to give a walk through of the business process of establishing, implementing and maintaining an Information Security Management System (ISMS) using the 7 Secure Seven Step ISMS Implementation Framework based on the ISO/IEC 27001 :2005 standards.
Its core focus is to train participants on practical steps involved in building and implementing an ISMS . It equips and prepares delegates for the necessary skills to implement an ISMS that is compliant with the requirements of ISO/IEC 17799 :2005 and meets the certification requirements of ISO/IEC 27001 :2005 .

Course Objective

Upon completion of this course, students should be able to:

  • Understand the purpose of an information security management system
  • Define the scope of an Information Security Management System.
  • The processes involved in establishing, implementing, operating, monitoring, reviewing and improving an ISMS as defined in ISO/IEC 27001:2005
  • Receive hands-on exposure to variety of Risk Assessment Tools and Techniques
  • Undertake a Risk Assessment and Implement Risk Treatment Procedures
  • Define control Objectives to be included in a security policy
  • Prepare a Statement of Applicability
  • Prepare an effective security improvement plan
  • Gain Knowledge and Skills for advising on compliance to the standard
  • Prepare for ISO/IEC 27001:2005 Certification. Audit

By the end of the program, you will have gained a complete knowledge of Information Security, how to implement ISO/IEC 27001:2005 in your organization. From the course delegates will be able to take the skills learned back to their organization and implement ISO/IEC 27001:2005 to certification standards.

Course Benefits

The Three day workshop will cover

  • Basics of an Information Security Management System
  • ISMS Scope : Defining the ISMS Scope
  • Security Policy: Designing Security Policy and procedures
  • Risk Assessment: Techniques
  • Risk Treatment: Control selection based on ISO/IEC 27001:2005.
  • ISMS Documentation including Preparation of Statement of Applicability.
  • ISMS Implementation: Deployment and Operation of an ISMS
  • Certification process, surveillance visits and re-certification
  • The continual improvement program including
    • Monitoring, reviewing and checking the ISMS
    • Implementing corrective and preventive controls

Who should attend?

  • Individuals who want to become a Certified Lead Implementer for ISO/IEC 27001 :2005
  • Individuals leading their companies to ISO 27001 registration

Required Prerequisites

  • Participants are expected to have exposure to information security and the ISO/IEC 27000 standards .

Award of Certificate

  • Information Security Lead Implementer