Menu

search

ISO 27001:2013 Practitioner

ISO/IEC 27001:2013 Practitioner

 

ISO/IEC 27001:2013 is an international standard that provides the basis for effective management of confidential and sensitive information, and for the application of information security controls.  It enables organisations to demonstrate excellence and prove best practice in Information Security management. Conformance with the standard requires commitment to continually improve control of confidential and sensitive information, providing reassurance to sponsors, shareholders and customers alike.

 

 

Course Profile


This two-day course expands on the foundational overview of this recently revised version of 2013.  The practitioner training develops a deeper understanding about how to actually apply the standard for implementation, management and improvement.  ISO/IEC 27001:2013 builds upon established foundations as the most widely recognised international standard specifically aimed at information security management. The adoption of an Information Security Management System (ISMS) is a strategic decision driving the coordination of operational security controls across all of the organizations electronic and physical information resources.

 

Target Audience


Attendance on this course requires candidates to have successfully completed the ISO/IEC 27001:2013 foundation training and achieved the foundation certification.  Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working within IT Service or Security Management.  The ISO/IEC 27001:2013 Foundation would suit candidates working in the following professions or areas:

  • Both IT and business people will benefit from this course
  • Those requiring a basic understanding of the Information Security
  • IT professionals or others working within an organization that is aligned or planning to be aligned with the ISO/IEC 27000 suite of standards
  • Anyone involved in or contributing to an on-going service improvement program
  • The Information Security Foundation is open to all individuals who may have an interest in the subject

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.

 

Course Content


This course will ensure delegates understand the value to the business of the ISO/IEC 27001:2013 standard.  There is an in-depth review of the key concepts and activities needed to properly plan for the implementation, management and improvement of an Information Security Management System. The course also ensures a thorough understanding of associated activities, roles, responsibilities, challenges, risks and critical success factors:

  • Best practice in Information Security Management and how to apply this within your organization
  • Scope and purpose of the ISO/IEC 27001 standard and how it can be implemented within an organization
  • Understand the key terms and definitions used in ISO/IEC 27001 to effectively roll out the principles
  • Leverage the fundamental ISO/IEC 27001 requirements for an ISMS to address the need to continually improve
  • Recognise the purpose of internal audits and external certification audits, their operation and the associated terminology
  • Apply your knowledge to business scenarios to enhance control of information
  • Establish a structured approach to information security management to secure information assets
  • Improve information security through adoption of best practices
  • Understand how ISO/IEC 27001 provides a competitive differentiator when tendering for business contracts
  • Build reputation with the secure management of confidential and sensitive information
  • Demonstrate compliance with an internationally recognised standard and the ability to satisfy customer security requirements

ISO/IEC 27001:2013 is the formal specification and defines the requirements for an ISMS, which includes:

  • ISMS planning, support and operational requirements
  • Leadership responsibilities
  • Performance evaluation of the ISMS
  • Internal ISMS audits
  • ISMS improvement
  • Control objectives and controls

 

 

 

 

 

Contact Information

3295 River Exchange Drive
Suite 212
Sandy Springs, Georgia 30092
USA

Call

(678) 752-7542 x104

Mail

This email address is being protected from spambots. You need JavaScript enabled to view it.

Stay Connected

Be sure to stay connected for the latest news and updates :)

 Facebook Twitter Google+ RSS Dribbble

 

Join Our Email List