Course Code

iso2700leadimpl
 

     Duration

35 Hours
 
 

     Requirements

The main requirement for participating in this training course is having a general knowledge of the ISMS concepts and ISO/IEC 27001.

 

     Overview

Information security threats and attacks increase and improve constantly. The best form of defense against them is the proper implementation and management of information security controls and best practices. Information security is also a key expectation and requirement of customers, legislators, and other interested parties.

This training course is designed to prepare participants in implementing an information security management system (ISMS) based on ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement.

After attending the training course, you can take the exam. If you successfully pass it, you can apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which demonstrates your ability and practical knowledge to implement an ISMS based on the requirements of ISO/IEC 27001.

Who Can Attend?

  • Project managers and consultants involved in and concerned with the implementation of an ISMS 
  • Expert advisors seeking to master the implementation of an ISMS
  • Individuals responsible for ensuring conformity to information security requirements within an organization
  • Members of an ISMS implementation team

General information

  • Certification fees are included in the exam price
  • Training material containing over 450 pages of information and practical examples will be distributed
  • A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued
  • In case of exam failure, you can retake the exam within 12 months free of charge

Educational approach

  • This training course contains essay-type exercises, multiple-choice quizzes, examples, and best practices used in the implementation of an ISMS.
  • The participants are encouraged to communicate with each other and engage in discussions when completing quizzes and exercises. 
  • The exercises are based on a case study. 
  • The structure of the quizzes is similar to that of the certification exam.

Learning objectives

This training course will help you:

  • Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of an ISMS
  • Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
  • Understand the operation of an information security management system and its processes based on ISO/IEC 27001
  • Learn how to interpret and implement the requirements of ISO/IEC 27001 in the specific context of an organization
  • Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an ISMS
 

     Course Outline

Day 1: Introduction to ISO/IEC 27001 and initiation of an ISMS 

Day 2: Planning the implementation of an ISMS 

Day 3: Implementation of an ISMS

Day 4: ISMS monitoring, continual improvement, and preparation for the certification audit

Day 5: Certification exam Preperation

At the end of the course we will issue delegates with an exam voucher, which allows them to schedule an exam online on a date to suit using the PECB online exams app.

The “PECB Certified ISO/IEC 27001 Lead Implementer” exam meets the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains:

  • Domain 1: Fundamental principles and concepts of an information security management system (ISMS)
  • Domain 2: Information security management system (ISMS)
  • Domain 3: Planning an ISMS implementation based on ISO/IEC 27001
  • Domain 4: Implementing an ISMS based on ISO/IEC 27001
  • Domain 5: Monitoring and measurement of an ISMS based on ISO/IEC 27001
  • Domain 6: Continual improvement of an ISMS based on ISO/IEC 27001 
  • Domain 7: Preparing for an ISMS certification audit

For specific information about exam type, languages available, and other details, please visit the List of PECB Exams and the Examination Rules and Policies.

 

     Feedback (33)

Ann is very knowledgeable on the subject. She is constantly varying pace according to the feedback. There is a lot of room for discussing attendee's own experiences. It was a great joy !.

Sjoerd Hulzinga - KPN p/a Bloomville


It was quite informal.

- Capita Business Services Ltd


Trainer covered a lot of ground over a relatively short period.

- Capita Business Services Ltd


I found it very interesting to learn all about what happens behind the scenes when it comes to IT systems. I also enjoyed learning about security and what hackers do as ethical hacking is an avenue I'm very keen in pursuing.

- Knowledge Pool/ DVLA


Richard was very knowledgeable in his field.

- Knowledge Pool/ DVLA


It was pitched at the right level - challenging but understandable & informative.

Louise Voisey - Capita Business Services Ltd


Hacking

Mohalmald Salim - PSO


Level of expertise from the trainer Use case examples

Pierre Maillot - Bosch


His deep knowledge of the IoT topic.

Bosch


Ron's experience on how to successfully implement IoT projects and the deep technical subjects covered.

Bosch


relevance of content to our I4.0 business environment

Bosch


Very knowledgeable trainer, was able to adjust to audience knowledge, excellent industry experience and ability to relate to audience needs Excellent content preparation , tailored to needs discussed beforehand. Good supplement reading materials prepared by trainer

Oliver Steinig - Bosch


Ron was very mindful of his audience and addressed everyone's questions. He checked his audience for clarity and was willing to spend the time to review a topic until everyone understood the topic. He gauged the audience for energy levels and suggested a break when he saw that the energy from the group was waning. This was much appreciated.

Bosch


The pace of training delivery.

Ian McInally - KnowledgePool


the exercises and group discussions.

KnowledgePool


The trainer was very knowledgeable and was happy to go at the pace of the attendees. He was polite and respectful to all those in attendance. I felt I learnt a lot from the course as the trainer was very succinct in his delivery when going through the PP slides. A really good, worth while course from my personal point of view.

Julie Price - KnowledgePool


The environment was really relaxed and open so everyone could ask questions or put across points of view or experience. David the trainer was a SME on the subject and his style was very good.

KnowledgePool


Tutorials

ICAO


The example and exercise

ICAO


I got more information regarding the web applications' security issues, the different tools that could be used to cope with these issues, and more advice from the trainer to handle all these issues.

ICAO


the list of tools

ICAO


how it was broken into the technical and security mindset aspects.

ICAO


Excercises.

ICAO


he is very knowledgeable and comprehensive.

ICAO


Matthew was very knowledge and has lot experience to share with us. it was very pleasant, as he take the time to listen to us and answer to our questions. Thank you Matthew, it was awesome.

ICAO


The second day, scenarios exercises.

Christina Hutchings - KnowledgePool


The real life examples Ron gave.

Bosch


I liked the trainer's introduction and anecdotes to make the learning more real

KnowledgePool


David's in depth knowledge. His relationship building skills with the audience. I really enjoyed the way he managed to make us (as a collective audience) enjoy the quite dry and uninteresing subject matter. He had anecdotes and knowledge of specific examples of security failings - hacker attacks - BCP 'breakdowns' etc which put flesh on the bones to the piece of legislation or 'best practice' for BCP that he was trying to teach us about. A really engaging, down to earth and personable man: A very good listener and a fabulous, charismatic trainer.

Cris Bollin - KnowledgePool


All is excellent

Manar Abu Talib - Dubai Electronic Security Center


- Understanding that ATT&CK creates a map that makes it easy to see, where an organization is protected and where the vulnerable areas are. Then to identify the security gaps that are most significant from a risk perspective. - Learn that each technique comes with a list of mitigations and detections that incident response teams can employ to detect and defend. - Learn about the various sources and communities for deriving Defensive Recommendations.

CHU YAN LEE - PacificLight Power Pte Ltd


He took his time to make sure everyone understood and were on the same wave length

Tina Hopkins - Capita Business Services Ltd


I found the training too in depth for IT beginners. There was too many high level subjects that i felt were too advanced for a beginner level.

Capita Business Services Ltd


The course could be tailored to suit your needs and objectives. It can also be delivered on your premises if preferred.


  
  
  


  

Online Price per participant 6000 AED

  

Classroom Price per participant 6000 AED

Starts

 

Ends

 

  Workday courses take place between 9:30 and 16:30

Location


  Show venue details


Number of Participants






Related Courses

Total Courses 4


Certificate of Cloud Security Knowledge

  14 hours

 

Comprehensive C# and .NET Application Security

  21 hours

C/C++ Secure Coding

  21 hours

Advanced Java Security

  21 hours

Standard Java Security

  14 hours

Java and Web Application Security

  21 hours

Advanced Java, JEE and Web Application Security

  28 hours

.NET, C# and ASP.NET Security Development

  14 hours

Advanced C#, ASP.NET and Web Application Security

  21 hours

Microsoft SDL Core

  14 hours

Security Testing

  14 hours

Web Application Security

  14 hours

 

Fundamentals of Corporate Cyber Warfare

  14 hours

 
Open Source Intelligence (OSINT)

Open Source Intelligence (OSINT)

What is Open Source Intelligence (OSINT)?

Open Source Intelligence (OSINT) Advanced

  21 hours

Open Source Cyber Intelligence - Introduction

  7 hours



Discounted Public Courses



This site in other countries/regions