Best Practice
Consultancy & Training
Effective Governance, Risk, and Compliance (GRC) related programmes
Comprehensive portfolio of public and in-house training programmes

Certified ISO/IEC 27001 Foundation Training

Training Topic: 
Information Security and Data Privacy
Training Framework/Standard: 
ISO/IEC 27001

The growing strategic importance of risk management, coupled with the vulnerability of IT, has highlighted the need for an organisation to protect its most valuable asset – INFORMATION

ISO/IEC 27002: 2013 - Information Technology - Security techniques -Code of practice for information security controls

ISO/IEC 27002:2013 gives guidelines for organisational information security standards and information security management practices including the selection, implementation and management of controls taking into consideration the organisation's information security risk environment(s).

ISO/IEC 27001:2013 Information Technology - Security techniques - Information security management systems -- Requirements

ISO/IEC 27001:2013 specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. It also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organisation. The requirements set out in ISO/IEC 27001:2013 are generic and are intended to be applicable to all organisations, regardless of type, size or nature.

Day 1 – ISO/IEC 27002:2013

Introduction to Information Security

  • Individual introductions and learning objectives.
  • Background to IT Governance & need for IT controls
  • Background to ISO 27002 and ISO 27001
  • What ISO 27002 means to your organisation
  • What is Information Security, whys is it needed?
  • How to establish security requirements
  • Assessing security risks
  • Information Security Drivers
  • Selecting Information Security controls


Understanding the ISO 27002 Code of Practice

  • ISO 27001 Information Security Standard, History, Transition, Requirements, Important Areas
  • ISO 27002- Clauses, Controls, Policies
  • Organisation of Information Security
  • Human Resource Security
  • Asset Management
  • Access Control
  • Cryptography
  • Physical and Environmental Security
  • Operations Security
  • Communications Security
  • Supplier Relationships
  • Information Security Incident Management
  • Information Security Aspects of Business Continuity Management
  • Compliance
  • Starting point - Identifying your Information Security objectives and Critical Success Factors
  • Setting the scope and boundaries of the programme and developing your own guidelines
  • Effective gap analysis
  • Handling complex programmes
  • Risk Assessment and treatment for ISO 27002


Day 2 – ISO/IEC 27001:2013

Introduction to ISO 27001

  • Background to ISO 27001
  • Description of a process approach to the adoption of an (ISMS)
  • The application of the Plan, Do, Check, Act (PDCA) to the ISMS process
  • Understanding the ISMS concept


Implementing and ISMS using ISO 27001

  • Compatibility with other Management System Standards
  • Information Security Management Requirements
  • ISMS Implementation Lifecycle
  • ISMS Implementation Phases
    • Plan and Establish ISMS
    • Implement and Operate and ISMS
    • Monitor and Review ISMS
    • Maintain and Improve ISMS
  • Identifying timescales, resources, key end products
  • Wrap-up


Examination Preparation

  • Examination Cram sheet
  • Mock-exams

This two-day practical course introduces delegates to the de-facto Information Security Standard and describes how to perform each step towards developing an Information Security Management System (ISMS), and obtaining ISO/IEC 27001 certification.

The course is designed for Information Security Professionals, Internal Auditors and management that deal with the complexities on Information Security requirements within the organisation.

The objective is to provide delegates with the necessary skills to develop an information security framework for their organisation. Attendees will learn how to asses their information assets and protect these assets against threats seeking to exploit potential vulnerabilities. Delegates will furthermore learn how to benchmark their existing security practices against the standard and implement a cost-effective security strategy that is compliant with international best practices.

This course also covers preparing for formal certification and offers clear explanations and practical solutions. Importance is placed on explaining not only how to comply with the Standard, but also how to demonstrate compliance to external auditors. Most importantly, it explains how to realise the true business benefits of implementing ISO/IEC 27001/2: 2013.

  • CIO’s
  • IT Directors
  • IT Managers
  • Information Security Managers/Officers/Professionals
  • Project Managers
  • Operations Managers
  • Business Managers
  • Auditors involved in Information Security

APMG Certified ISO/IEC 27001 Foundation Examinations

  • 50 multiple choice questions
  • 40 minutes to complete
  • The pass mark is 50% overall (25/50)
  • Examination is closed book