Pour les demandes entreprises : (+212) 703173603

Pour les demandes particuliers : (+212) 702062126

A propos de la formation ISO 27001 Lead Auditor

The ISO 27001 Lead Auditor Training focuses on the ISO 27001 standard, guiding professionals in leading and conducting audits of Information Security Management Systems (ISMS). This course is designed for Information Security Managers, Compliance Officers, Auditors, Risk Managers, Cybersecurity Engineers, Data Protection Officers, Sustainability Professionals, and Consultants.

Détails
Objectifs pédagogiques de la formation ISO 27001 Lead Auditor
  • Gain in-depth knowledge of information security
  • Understand organizational needs for information security Identify common threats to information security
  • Grasp the scope of an ISMS
  • Describe policies-roles and responsibilities related to ISO 27001
  • Learn actions for addressing risks and opportunities in planning.

Qui devrait suivre cette formation ISO 27001 Lead Auditor ?

Public visé par la formation ISO 27001 Lead Auditor

Professionals leading and conducting audits of Information Security Management Systems (ISMS) based on ISO 27001 will benefit from the ISO 27001 Lead Auditor Training Course. This includes roles such as Information Security Managers, Compliance Officers, Auditors, Risk Managers, Cybersecurity Engineers, Data Protection Officers, and Sustainability Professionals.  

Prérequis de la formation ISO 27001 Lead Auditor

No formal prerequisites are required for this ISO 27001 Lead Auditor Course. However, a basic familiarity with information security and the ISO 27001 standard can be beneficial for participants.

Formations Similaires

  • CISA – Certified Information Systems Auditor Détails
  • Cobit 5 Détails
  • CISSP – Certified Information Systems Security Professional Détails
  • TOGAF® 9.2 Foundation Détails
  • ISO 45001 Lead Auditor Détails
  • ISO 14000 Détails
  • ISO 27001 Lead Auditor Détails
  • ISO 27001 Lead Implementer Détails
  • ISO 45001 Lead Implementer Détails
  • ISO 27000 Détails
  • ISO 27005 Risk Manager Détails
  • IS0 27002 Détails
  • IT Management – COBIT Détails
  • IT Management – COBIT. Détails
  • SOC Analyst (Blue Team) Détails
  • Zero Trust Security Framework Détails
  • Sustainability & Green IT pour Collectivités Détails
  • Cyber-resilience des Services Publics Détails
  • Cybersecurity & Cloud Security for Enterprises Détails
  • Pentesting Web Apps & Mobile Apps Détails
  • Offensive Security Certified Professional (OSCP) Détails
  • Smart Cities & Gouvernance Digitale Détails
  • Data for Public Policy & Urban Analytics Détails
  • TOGAF – Enterprise Architecture Framework Détails
  • ISO 19011 Internal Auditor & ISO 27001 (LA) Détails
  • CISM – Certified Information Security Manager Détails
  • SSCP – Systems Security Certified Practitioner Détails
  • DPS-CISA et CISSP Détails
  • Computer Security (SSO Session) Détails
  • ITIL Détails
  • ITIL4 Strategic Leader Certification – Module 1 & 2 Détails
  • IEC 62443 Certification Détails
  • ISO/IEC 27001 – Système de Management de la Sécurité de l’Information Détails
  • ISO 22000 – Système de Management de la Sécurité des Denrées Alimentaires Détails
  • Citrix Certified Advanced Administrator (CCAA) Détails
  • Palo Alto Networks PCCET (Certified Cybersecurity Entry-level Technician) Détails
  • Palo Alto Networks PCNSE (Certified Network Security Engineer) Détails
  • Analyste Cybersécurité Détails
  • ISO/IEC 27001:2022 Détails
  • Veeam Data Platform v12 – Backup, Réplication & Protection des Données Détails
  • Formation ISO/IEC 27001:2022 – Implementation Détails

Déroulé de la formation ISO 27001 Lead Auditor


Module 1: Introduction to ISO 27001

Introduction

Compatibility with Other Management System Standards

ISO 27001:2022 and its Clauses


Module 2: Information Security

What is Business?

Industries

Risk

SWOT Analysis

Constructs and Characteristics of Assets

Security and Privacy

Triad of Information Security

Cyber Security is Everyone’s Responsibility

Cybersecurity Landscape

What is Information Security?

Information Security Management

Need of Information Security

Threats to Information Security

Active and Passive Attacks


Module 3: Context of the Organisation

Understanding the Organisation and Its Context

Understanding the Needs and Expectations of Interested Parties

Determining the Scope of the Information Security Management System

Information Security Management System


Module 4: Leadership

Leadership and Commitment

Policy

Organisational Roles, Responsibilities, and Authorities


Module 5: Planning

Organisational Roles, Responsibilities, and Authorities

Information Security Objectives and Planning to Achieve Them

Planning of Changes


Module 6: Support

Resources

Competence

Awareness

Communication

Documented Information


Module 7: Operation

Documented Information  

Information Security Risk Assessment

Information Security Risk Treatment


Module 8: Performance Evaluation

Monitoring, Measurement, Analysis, and Evaluation

Internal Audit

Management Review


Module 9: Improvement

Nonconformity and Corrective Action

Continual Improvement


Module 10: Introduction to Auditing

Internal Audit Charter

Communicate with Organisation and Audit Committee

Auditing Reflects

General and Internal Auditing Standards and Guidance

Auditing Types

Auditing Techniques

Auditing Principles

Phases of Audit


Module 11: Performing ISO 27001 Audits

Preparing an Audit Report

Assessment of Audit Reports and Documents

Report Preparation, Findings, Reconciliation, and Conclusions

Auditing Procedures

Reviewing Documents and Reports

Classifying Findings

Reliability of Audit Findings


Module 12: Internal Auditor

Roles and Responsibilities

Audit Plan

Opening Meeting

Record Review Activities

Internal Auditor Checklist

Communication Between Departments

Drafting Reports and Test Plans


Module 13: ISMS and the ISO 27001 Standards Family

What is an ISMS?

Project Plan

Management and Governance Frameworks

ISMS Benefits

Scope of ISMS in an organisation

Introduction to Management Systems

Process Approach

Fundamentals

PDCA Cycle


Module 14: Interaction with ISO 27005

What is ISO 27005?

ISO 27001 VS ISO 27005

Quantifying the Business Impact

Impact Severity


Module 15: Roles and Responsibilities of a Lead Implementer

Roles and Responsibilities

Case Study:  ABC’s ISO 27001 


Module 16: Launch and Implement an ISMS in an Organisation

Apply the Frameworks

Procedures and Controls

Implementing the Controls

Training and Awareness Programme

Management’s Role

Responsibilities of Employees


Module 17: Risk Management

Analysing and Evaluating Risks

Managing Risk Approaches

Case Study: Law Firm


Module 18: Risk Assessment and the Statement of Applicability (SOA)

Risk Assessment

Conducting Risk Assessments

Risk Assessment Methodology

ISMS Risk Assessment Report

Threats and Vulnerabilities


Module 19: Introduction to ISO 27001 Lead Auditor

Roles and Responsibilities of a Lead Auditor

Team Selection and Planning

Qualifications of an Auditor

Conformance and Compliance


Module 20: Preparing and Planning an Audit

Roles and Responsibility of an Auditor

Auditing Schedule and Time

Procedures and Process Flow

Activities of an Auditor

Audit Components

Purpose and Extent of an Audit

Formations Similaires
CISA – Certified Information Systems Auditor Détails
Cobit 5 Détails
CISSP – Certified Information Systems Security Professional Détails
TOGAF® 9.2 Foundation Détails
ISO 45001 Lead Auditor Détails
ISO 14000 Détails
ISO 27001 Lead Auditor Détails
ISO 27001 Lead Implementer Détails
ISO 45001 Lead Implementer Détails
ISO 27000 Détails
ISO 27005 Risk Manager Détails
IS0 27002 Détails
IT Management – COBIT Détails
IT Management – COBIT. Détails
SOC Analyst (Blue Team) Détails
Zero Trust Security Framework Détails
Sustainability & Green IT pour Collectivités Détails
Cyber-resilience des Services Publics Détails
Cybersecurity & Cloud Security for Enterprises Détails
Pentesting Web Apps & Mobile Apps Détails
Offensive Security Certified Professional (OSCP) Détails
Smart Cities & Gouvernance Digitale Détails
Data for Public Policy & Urban Analytics Détails
TOGAF – Enterprise Architecture Framework Détails
ISO 19011 Internal Auditor & ISO 27001 (LA) Détails
CISM – Certified Information Security Manager Détails
SSCP – Systems Security Certified Practitioner Détails
DPS-CISA et CISSP Détails
Computer Security (SSO Session) Détails
ITIL Détails
ITIL4 Strategic Leader Certification – Module 1 & 2 Détails
IEC 62443 Certification Détails
ISO/IEC 27001 – Système de Management de la Sécurité de l’Information Détails
ISO 22000 – Système de Management de la Sécurité des Denrées Alimentaires Détails
Citrix Certified Advanced Administrator (CCAA) Détails
Palo Alto Networks PCCET (Certified Cybersecurity Entry-level Technician) Détails
Palo Alto Networks PCNSE (Certified Network Security Engineer) Détails
Analyste Cybersécurité Détails
ISO/IEC 27001:2022 Détails
Veeam Data Platform v12 – Backup, Réplication & Protection des Données Détails
Formation ISO/IEC 27001:2022 – Implementation Détails

Vous pouvez faire l’inscription ou la demande du devis avec un seul click