Course Outline

Day 1: Introduction to ISO/IEC 27001 and initiation of an ISMS 

Day 2: Planning the implementation of an ISMS 

Day 3: Implementation of an ISMS

Day 4: ISMS monitoring, continual improvement, and preparation for the certification audit

Day 5: Certification exam Preperation

At the end of the course we will issue delegates with an exam voucher, which allows them to schedule an exam online on a date to suit using the PECB online exams app.

The “PECB Certified ISO/IEC 27001 Lead Implementer” exam meets the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains:

  • Domain 1: Fundamental principles and concepts of an information security management system (ISMS)
  • Domain 2: Information security management system (ISMS)
  • Domain 3: Planning an ISMS implementation based on ISO/IEC 27001
  • Domain 4: Implementing an ISMS based on ISO/IEC 27001
  • Domain 5: Monitoring and measurement of an ISMS based on ISO/IEC 27001
  • Domain 6: Continual improvement of an ISMS based on ISO/IEC 27001 
  • Domain 7: Preparing for an ISMS certification audit

For specific information about exam type, languages available, and other details, please visit the List of PECB Exams and the Examination Rules and Policies.

Requirements

The main requirement for participating in this training course is having a general knowledge of the ISMS concepts and ISO/IEC 27001.

  35 Hours
 

Testimonials

Related Courses

Cloud Computing Security Knowledge (CCSK) Preparation Course

 21 hours

Cloud Computing Security Knowledge (CCSK) Preparation Course The CCSK course is intended to provide understanding of security issues and best practices over a broad range of cloud computing domains. As cloud computing is becoming the dominant IT

Certificate of Cloud Security Knowledge

 14 hours

Description: This 2-day CCSK Plus course includes all content from the CCSK Foundation course, and expands on it with extensive hands-on labs in a second day of training. Students will learn to apply their knowledge by performing a series of

Certificate of Cloud Security Knowledge (CCSK) Foundation (CSA authorized)

 14 hours

The CCSK Foundation course starts with the fundamentals, then increases in complexity as it works through all 16 domains of the CSA Security Guidance, recommendations from the European Union Agency for Network & Information Security (ENISA), and

Certificate of Cloud Security Knowledge (CCSK) Plus (CSA authorized)

 21 hours

The CCSK Plus builds on the foundation class with expanded material and offers extensive hands-on activities that reinforce classroom instruction. Students engage in a scenario of bringing a fictional organization securely into the cloud, which

Certified Chief Information Security Officer (CCISO)

 35 hours

EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program

Certified Ethical Hacker

 35 hours

Objectives: To prepare the student for the Ethical Hacking and Countermeasures examination. On passing this examination you will be awarded the Certified Ethical Hacker certification Target Audience: This course will significantly benefit

Incident Response

 21 hours

Threat Hunting

 21 hours

C/C++ Secure Coding

 21 hours

This three day course covers the basics of securing the C/C++ code against the malicious users who may exploit many vulnerabilities in the code with memory management and input handling, the course cover the principals of writing secure

Standard Java Security

 14 hours

Description The Java language and the Runtime Environment (JRE) was designed to be free from the most problematic common security vulnerabilities experienced in other languages, like C/C++. Yet, software developers and architects should not only

Java and Web Application Security

 21 hours

Description Beyond solid knowledge in using Java components, even for experienced Java programmers it is essential to have a deep knowledge in web-related vulnerabilities both on server and client side, the different vulnerabilities that are

Microsoft SDL Core

 14 hours

The Combined SDL core training gives an insight into secure software design, development and testing through Microsoft Secure Development Lifecycle (SDL). It provides a level 100 overview of the fundamental building blocks of SDL, followed by design

Fundamentals of Corporate Cyber Warfare

 14 hours

Cyber Warfare is a growing problem for enterprises. As attackers employ more and more sophisticated technologies to launch their attacks, it is vital for companies to understand the nature of these attacks and the defense mechanisms needed to keep

Open Source Intelligence (OSINT) Advanced

 21 hours

Open Source Intelligence (OSINT) refers to any information that can legally be gathered from free, public sources about an individual or organization. OSINT also refers to the process of collecting this data, analyzing it, and using it for

Open Source Cyber Intelligence - Introduction

 7 hours

This Introduction to Open Source Intelligence (OSINT) course will provide delegates with skills to become more efficient and effective at finding those key pieces of intelligence on the Internet and World Wide Web. The course is highly practical