EtusivuTietoturvajohtaminenISO/IEC 27001 Lead Implementer eLearning Course, PECB Certified

ISO/IEC 27001 Lead Implementer eLearning Course, PECB Certified

The ISO/IEC 27001 Lead Implementer eLearning training course is designed to help you gain a theoretical and practical understanding of the implementation of an Information Security Management System (ISMS) based on the requirements of ISO/IEC 27001. This would help organizations ensure the confidentiality, integrity, and availability of information by applying a risk management process.




4 päivää


1835 €



Target Group

  • Project managers and consultants involved in and concerned with the
    implementation of an ISMS
  • Expert advisors seeking to master the implementation of an ISMS
  • Individuals responsible for ensuring conformity to information security requirements within an organization
  • Members of an ISMS implementation team


  • Gain a comprehensive understanding of the concepts,
    approaches, methods, and techniques used for the
    implementation and effective management of an ISMS
  • Acknowledge the correlation between ISO/IEC 27001, ISO/IEC
    27002, and other standards and regulatory frameworks
  • Understand the operation of an information security
    management system and its processes based on
    ISO/IEC 27001
  • Learn how to interpret and implement the requirements of ISO/
    IEC 27001 in the specific context of an organization
  • Acquire the necessary knowledge to support an organization in
    effectively planning, implementing, managing, monitoring, and
    maintaining an ISMS

Course Content

  • Section 1: Training course objectives and structure
  • Section 2: Standards and regulatory frameworks
  • Section 3: Information Security Management System (ISMS)
  • Section 4: Fundamental information security concepts and principles
  • Section 5: Initiation of the ISMS implementation
  • Section 6: Understanding the organization and its context
  • Section 7: ISMS scope
  • Section 8: Leadership and project approval
  • Section 9: Organizational structure
  • Section 10: Analysis of the existing system
  • Section 11: Information security policy
  • Section 12: Risk management
  • Section 13: Statement of Applicability
  • Section 14: Documented information management
  • Section 15: Selection and design of controls
  • Section 16: Implementation of controls
  • Section 17: Trends and technologies
  • Section 18: Communication
  • Section 19: Competence and awareness
  • Section 20: Security operations management
  • Section 21: Monitoring, measurement, analysis, and evaluation
  • Section 22: Internal audit
  • Section 23: Management review
  • Section 24: Treatment of nonconformities
  • Section 25: Continual improvement
  • Section 26: Preparing for the certification audit
  • Section 27: Closing of the training course