ISO/IEC 27001 Lead Implementer

ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.

Course description:

During this training course, you will also gain a thorough understanding of the best practices of Information Security Management Systems to secure the organization`s sensitive information and improve the overall performance and effectiveness.

Course objectives:

  • Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks
  • Master the concepts, approaches, methods and techniques used for the implementation and effective
  • management of an ISMS
  • Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization
  • Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS
  • Acquire the expertise to advise an organization in implementing Information Security Management System best practices


  • Managers or consultants involved in Information Security Management
  • Expert advisors seeking to master the implementation of an Information Security Management System
  • Individuals responsible for maintaining conformance with ISMS requirements
  • ISMS team members


A fundamental understanding of ISO/IEC 27001 and comprehensive knowledge of implementation principles.

Course outline:

  • Introduction to ISO/IEC 27001 and initiation of an ISMS

    1. Course objectives and structure
    2. Standards and regulatory frameworks
    3. Information Security Management System (ISMS)
    4. Fundamental principles of Information Security Management Systems
    5. Initiating the implementation of an ISMS
    6. Understanding the organization and clarifying the
    7. Information Security objectives
    8. Analysis of the existing management system
  • Plan the implementation of an ISMS

    1. Leadership and approval of the ISMS project
    2. ISMS scope
    3. Information Security policies
    4. Risk assessment
    5. Statement of Applicability and top management`s decision to implement the ISMS
    6. Definition of the organizational structure of Information Security


  • Implementation of an ISMS

    1. Definition of the document management process
    2. Design of security controls and drafting of specific policies & procedures
    3. Communication plan
    4. Training and awareness plan
    5. Implementation of security controls
    6. Incident Management
    7. Operations Management
  • ISMS monitoring, measurement, continuous improvement and preparation for a certification audit

    1. Monitoring, measurement, analysis and evaluation
    2. Internal audit
    3. Management review
    4. Treatment of non-conformities
    5. Continual improvement
    6. Preparing for the certification audit
    7. Competence and evaluation of implementers
  • Certification Exam

    1. Preparation for exam
    2. Exam
    • The exam duration is three (3) hours. Non-native speakers receive an additional half an hour.
    • The exam contains essay type questions.

    As the exam is “open book”, candidates are authorized to use:

    • A copy of the standard
    • Course notes from the Participant Handout;
    • Any personal notes made by the student during the course; and
    • A hard copy dictionary


    Examination rules and policies

Other relevant courses

6. February
2 days
Classroom Startup guarantee
3. February
5 days
Classroom Startup guarantee
1 days