ISO 27001 Lead Auditor Implementer Training
ISO 27001 Lead Implementer Auditor Training
![]()
![]()
& cybersecurity management
Establish, govern, and operate
ISO 27001-based information security management.
Get a thorough understanding of ISO 27000 standards for information security governance, and how to leverage the ISO 27000 standards to establish and maintain an information security management system (ISMS) program.
ISO 27001 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security program within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations.
Designed to follow our 3-day ISO 31000 Enterprise Risk Management program, this 2-day ISO 27001 training and certification workshop continues our information security risk assessment training to provide thorough coverage of the ISO 27000 standards, as well as setting out advice on the implementation of an information security initiative. The purpose of the course is to:
- Describe the principles and processes of information security governance and management;
- Provide thorough coverage of the requirements of ISO 27001;
- Give practical guidance on designing a suitable framework;
- Give practical advice on implementing information security management;
- Prepare you for your ISO 27001 certification exams required for professional credentialing.
- Establish a firm program starting point by using ISO 27001, ISO 27002, and 27003 to build out the initial Information Security Management core policy. Soft-copy editable templates are provided in class:
- Complete ISO 27001-conforming Information Security System Policy (15-Page template provided)
- Procedure document for Training and Development Needs Analysis (9-Page template provided)
- Kick-off ISMS project plan (9-Page template provided)
- Procedure document for Identification of Requirements (4-Page template provided)
- Procedure document for identification of statutory, regulatory, contractual, and other requirements (1-Page template provided)

Certified Information Security provides the training and credentialing you need to become recognized as an authority in information security governance and risk management. You choose the method of delivery: online through our secure website, or in-person at a publicly available course or privately at your facility. We take care of the rest – from administration, to record keeping, to providing certificates of completion and certification.







