For business inquiries : (+971) 561803315

For special requests : (+971) 561803315

A propos de la formation ISO 27001 Lead Auditor

The ISO 27001 Lead Auditor Training focuses on the ISO 27001 standard, guiding professionals in leading and conducting audits of Information Security Management Systems (ISMS). This course is designed for Information Security Managers, Compliance Officers, Auditors, Risk Managers, Cybersecurity Engineers, Data Protection Officers, Sustainability Professionals, and Consultants.

Détails
Objectifs pédagogiques de la formation ISO 27001 Lead Auditor
  • Gain in-depth knowledge of information security
  • Understand organizational needs for information security Identify common threats to information security
  • Grasp the scope of an ISMS
  • Describe policies-roles and responsibilities related to ISO 27001
  • Learn actions for addressing risks and opportunities in planning.

Qui devrait suivre cette formation ISO 27001 Lead Auditor ?

Public visé par la formation ISO 27001 Lead Auditor

Professionals leading and conducting audits of Information Security Management Systems (ISMS) based on ISO 27001 will benefit from the ISO 27001 Lead Auditor Training Course. This includes roles such as Information Security Managers, Compliance Officers, Auditors, Risk Managers, Cybersecurity Engineers, Data Protection Officers, and Sustainability Professionals.  

Prérequis de la formation ISO 27001 Lead Auditor

No formal prerequisites are required for this ISO 27001 Lead Auditor Course. However, a basic familiarity with information security and the ISO 27001 standard can be beneficial for participants.

Formations Similaires

  • CISA – Certified Information Systems Auditor Détails
  • NIST CyberSecurity Framework 2.0 Détails
  • Security Manager Détails
  • COBIT 2019 Détails
  • TOGAF 9.2 Détails
  • ISO 45001 Lead Auditor Détails
  • ISO 27001 Lead Auditor Détails
  • ISO 27001 Lead Implementer Course Détails
  • ISO 45001 Lead Implementer Détails
  • ISO 27001 Lead Auditor Training Course Détails
  • ISO 27005 Training Détails
  • ISO 27002 Foundation Détails
  • Offensive Security Certified Professional (OSCP) Détails
  • EBios Détails
  • TOGAF® 10 Détails
  • ISO 22301 Lead Implementer Détails
  • Stormshield Détails
  • Configuring BIG-IP - Application Security Manager (ASM) Détails
  • ForgeRock Détails
  • Spring Security 5 Détails
  • Certified Ethical Hacker (CEH) v12 Détails
  • Implementing PowerShell Security Détails
  • Veeam Backup and Replication v12 Détails
  • KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
  • LPIC-3 Exam 303: Security Détails
  • SSO (Single Sign-On) Détails
  • IT Governance Détails
  • CCSA, Check Point Certified Security Administrator R81 Détails
  • CCSE - Check Point Certified Security Expert R80.10 Détails
  • Securing Email with Cisco Email Security Appliance SESA Détails
  • Certified Ethical Hacker CEH v12 Détails
  • FCNSA Fortinet Certified Network Security Administrator Détails
  • NSE 4 FortiGate Network Security Professional Détails
  • NSE5 FortiManager 7.0 Détails
  • Securing the Web with Cisco Web Security Appliance Détails
  • Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
  • CCNP Security Détails
  • Android app security Détails
  • Mastering IT Project Audit: Techniques and Best Practices Détails
  • SharePoint : Planification et administration (70-339) Détails

Déroulé de la formation ISO 27001 Lead Auditor


Module 1: Introduction to ISO 27001

Introduction

Compatibility with Other Management System Standards

ISO 27001:2022 and its Clauses


Module 2: Information Security

What is Business?

Industries

Risk

SWOT Analysis

Constructs and Characteristics of Assets

Security and Privacy

Triad of Information Security

Cyber Security is Everyone’s Responsibility

Cybersecurity Landscape

What is Information Security?

Information Security Management

Need of Information Security

Threats to Information Security

Active and Passive Attacks


Module 3: Context of the Organisation

Understanding the Organisation and Its Context

Understanding the Needs and Expectations of Interested Parties

Determining the Scope of the Information Security Management System

Information Security Management System


Module 4: Leadership

Leadership and Commitment

Policy

Organisational Roles, Responsibilities, and Authorities


Module 5: Planning

Organisational Roles, Responsibilities, and Authorities

Information Security Objectives and Planning to Achieve Them

Planning of Changes


Module 6: Support

Resources

Competence

Awareness

Communication

Documented Information


Module 7: Operation

Documented Information  

Information Security Risk Assessment

Information Security Risk Treatment


Module 8: Performance Evaluation

Monitoring, Measurement, Analysis, and Evaluation

Internal Audit

Management Review


Module 9: Improvement

Nonconformity and Corrective Action

Continual Improvement


Module 10: Introduction to Auditing

Internal Audit Charter

Communicate with Organisation and Audit Committee

Auditing Reflects

General and Internal Auditing Standards and Guidance

Auditing Types

Auditing Techniques

Auditing Principles

Phases of Audit


Module 11: Performing ISO 27001 Audits

Preparing an Audit Report

Assessment of Audit Reports and Documents

Report Preparation, Findings, Reconciliation, and Conclusions

Auditing Procedures

Reviewing Documents and Reports

Classifying Findings

Reliability of Audit Findings


Module 12: Internal Auditor

Roles and Responsibilities

Audit Plan

Opening Meeting

Record Review Activities

Internal Auditor Checklist

Communication Between Departments

Drafting Reports and Test Plans


Module 13: ISMS and the ISO 27001 Standards Family

What is an ISMS?

Project Plan

Management and Governance Frameworks

ISMS Benefits

Scope of ISMS in an organisation

Introduction to Management Systems

Process Approach

Fundamentals

PDCA Cycle


Module 14: Interaction with ISO 27005

What is ISO 27005?

ISO 27001 VS ISO 27005

Quantifying the Business Impact

Impact Severity


Module 15: Roles and Responsibilities of a Lead Implementer

Roles and Responsibilities

Case Study:  ABC’s ISO 27001 


Module 16: Launch and Implement an ISMS in an Organisation

Apply the Frameworks

Procedures and Controls

Implementing the Controls

Training and Awareness Programme

Management’s Role

Responsibilities of Employees


Module 17: Risk Management

Analysing and Evaluating Risks

Managing Risk Approaches

Case Study: Law Firm


Module 18: Risk Assessment and the Statement of Applicability (SOA)

Risk Assessment

Conducting Risk Assessments

Risk Assessment Methodology

ISMS Risk Assessment Report

Threats and Vulnerabilities


Module 19: Introduction to ISO 27001 Lead Auditor

Roles and Responsibilities of a Lead Auditor

Team Selection and Planning

Qualifications of an Auditor

Conformance and Compliance


Module 20: Preparing and Planning an Audit

Roles and Responsibility of an Auditor

Auditing Schedule and Time

Procedures and Process Flow

Activities of an Auditor

Audit Components

Purpose and Extent of an Audit

Formations Similaires
CISA – Certified Information Systems Auditor Détails
NIST CyberSecurity Framework 2.0 Détails
Security Manager Détails
COBIT 2019 Détails
TOGAF 9.2 Détails
ISO 45001 Lead Auditor Détails
ISO 27001 Lead Auditor Détails
ISO 27001 Lead Implementer Course Détails
ISO 45001 Lead Implementer Détails
ISO 27001 Lead Auditor Training Course Détails
ISO 27005 Training Détails
ISO 27002 Foundation Détails
Offensive Security Certified Professional (OSCP) Détails
EBios Détails
TOGAF® 10 Détails
ISO 22301 Lead Implementer Détails
Stormshield Détails
Configuring BIG-IP - Application Security Manager (ASM) Détails
ForgeRock Détails
Spring Security 5 Détails
Certified Ethical Hacker (CEH) v12 Détails
Implementing PowerShell Security Détails
Veeam Backup and Replication v12 Détails
KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
LPIC-3 Exam 303: Security Détails
SSO (Single Sign-On) Détails
IT Governance Détails
CCSA, Check Point Certified Security Administrator R81 Détails
CCSE - Check Point Certified Security Expert R80.10 Détails
Securing Email with Cisco Email Security Appliance SESA Détails
Certified Ethical Hacker CEH v12 Détails
FCNSA Fortinet Certified Network Security Administrator Détails
NSE 4 FortiGate Network Security Professional Détails
NSE5 FortiManager 7.0 Détails
Securing the Web with Cisco Web Security Appliance Détails
Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
CCNP Security Détails
Android app security Détails
Mastering IT Project Audit: Techniques and Best Practices Détails
SharePoint : Planification et administration (70-339) Détails

Vous pouvez faire l’inscription ou la demande du devis avec un seul click