iso 27001 information security management 

iso 27001 lead auditor

 

professional ISO training

iso certification lead auditor

online certification training

certification training atlanta

security manager workshop

policy workshop

online training course

strategy training
certified cyber security manager
cism certification training program
strategy workshop
cyber security strategy training
cyber security certification
pecb information security
policy development workshop
online certification
isms strategy planning workshop
ISO 27001 lead auditor  training
policy toolkit
risk assessment
lead auditor
lead implementer
lead auditor
lead implementer

information security management system isms, management system isms, management system, iec 27001 training, iso iec, management system

Strategy, Policy, and Certification Workshop: ISO 27001 Information Security Management

  •  

    Information Security Management

    Course Duration: 2-Days

    Recommended Prerequisite training

    • CIS Policy Workshop Series: ISO 31000 Enterprise Risk Management

    Recommended Follow-On Session

    • CIS Policy Workshop Series: How to Conduct ISO 31010 Risk Assessments
    • CIS Policy Workshop Series: ISO 22301 Business Continuity Management

    Certification

    This course fulfills all prerequisite training requirements for certification exams #ISMS101 and #ISMS102 for the Certified ISO 27001 Internal Controls Architect (CICA) professional credential.

    Continuing Professional Education (CPE) Credit

    cpeUpon course completion, we will provide you with an achievement certificate for 16 continuing professional education (CPE) credits that can be used to fulfill requirements for maintaining a variety of professional credentials for fraud examination, accounting, auditing, and information security.

    Get a thorough understanding of ISO 27000 standards for information security governance, and how to leverage the ISO 27000 standards to establish and maintain an information security management system (ISMS) program.

    Then build-out the initial ISO-conforming information security program policy right in class!

    Information Security Governance

    iso 27001 lead auditorISO 27001 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security program within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. This ISO standard is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties.

    This 2-day ISO 27001 training and certification workshop  provides thorough coverage of the ISO 27000 standards, as well as setting out advice on the implementation of an information security initiative. The purpose of the course is to:

    • Describe the principles and processes of information security governance and management;
    • Provide thorough coverage of the requirements of ISO 27001;
    • Give practical guidance on designing a suitable framework;
    • Give practical advice on implementing information security management;
    • Prepare you for your ISO 27001 certification exams required for Certified Internal Controls Architect (CICA) professional credentialing.
    • Establish a firm program starting point by using ISO 27001, ISO 27002, and 27003 to build out the initial Information Security Management core policy. Soft-copy editable templates are provided in class:
      • Complete ISO 27001-conforming Information Security System Policy (15-Page template provided)
      • Procedure document for Training and Development Needs Analysis (9-Page template provided)
      • Kick-off ISMS project plan (9-Page template provided)
      • Procedure document for Identification of Requirements (4-Page template provided)
      • Procedure document for identification of statutory, regulatory, contractual, and other requirements (1-Page template provided)
  • Recommended Attendance by Position

    Recommended participants by role for this training include:

    • Policy Approvers / Strategy Decision Makers
    • Chief Information Officer (CIO / CISO)
    • Information security managers
    • Compliance officers
    • Revenue protection managers
    • IT managers
    • Risk managers
    • Business Continuity Managers
    • Operations department heads (business unit managers)
    • Auditors

    iso 27001 certification trainingiso 27001 certification trainingiso 27001 certification trainingiso 27001 certification training
  • Your ISO 27001 training will include:

    1. Information Security and ISO 27000 Standards
      • Principles of information security
      • Review of ISO 27001, ISO 27002, ISO 27003, ISO 27005, ISO 27007, and ISO 27008
      • Achieving the benefits of information security
    2. Managing InfoSec
      • Planning and designing
      • Implementing and benchmarking
      • Measuring and monitoring
      • Learning and reporting
    3. Establish a firm program starting point by using ISO 27000 standards to build out the initial information security core policy. Throughout the class, our expert instructor will convert ISO 27000 series concepts and requirements into a real ISO 27001 InfoSec Policy. Bring your laptop, and you can work right along with the instructor using electronic (MS Word format) templates we provide in class!* Along with the instructor, you will get your information security program properly initiated by constructing:
      • Information Security Policy Statement
      • General Terms and Definitions
      • Scope Document
      • Strategy Statement including identification of requirements for the Information Security program setup, initiation, operation, maintenance, and improvement
      • Organizational Roles and Responsibilities Statement
      • Risk Policy

    * ISO Standards are NOT included in this course, nor provided in class. Students are encouraged to bring their own hard-copies of the standards to the class. ISO standards are available for purchase at www.iso.org.

  • CICA 180IRMCB AccreditedIt’s convenient! Certified Information Security provides the training and credentialing you need to become recognized as an authority in information security governance and cyber risk management.  You choose the method of delivery: online through our secure website, or in-person at a publicly available course or privately at your facility.  We take care of the rest – from administration, to record keeping, to providing certificates of completion and certification.

    Online students have the additional convenience of taking courses whenever they want. Our program allows users to start and stop without losing their place or data.  Learning and certifying expertise has never been so easy! 

    Get complete CICA details

  • Allen Keele Allen Keele, CEO of Certified Information Security

     

    My Guarantee to You.

    Preparing for Certified Information Security's professional certification exams #ISMS101 and #ISMS102 is serious business.

    This is where I can help you. If you first successfully complete:

    • All prerequisite  ISO 27001 training; and
    • All ISMS101 and ISMS102 online practice exams

    Certified Information Security guarantees your success in passing certification exams #ISMS101 and #ISMS102.

    If you do not pass exams #ISMS101 and #ISMS102 on your first attempt after completion of your required course and practice exams, Certified Information Security will allow you to re-test at no additional charge until you successfully pass your certification exams.

  • Public Live Training:

    Search Live Events

     
    Private Group Live Training:

    Request Proposal

     

     
    Online On-Demand Training:

    2. CIS Policy Workshop: ISO 27001 Information Security Management

    2. CIS Policy Workshop: ISO 27001 Information Security Management

    Product details

    Salesprice with discount:
    Sales price: $299.95
    Discount:



.

 

0
Shares
Cookie Alert and Privacy Policy Consent
This website uses cookies to improve your experience. By continuing to use this website you are providing accepting our cookie policy, and are providing implied consent to our privacy policy and use of cookies. I understand and agree. Close this notification.