ISO/IEC 27001 Foundation

Duration
2 Days
Price
950,00 €
Course Type
Virtual / Physical
The ISO 27001 Foundation Course provides participants with a comprehensive introduction to the principles and core elements of the ISO/IEC 27001 standard, the internationally recognized framework for Information Security Management Systems (ISMS). This foundational training is designed for individuals seeking to understand the structure, concepts, and requirements of ISO 27001.

Participants will gain a solid understanding of the principles, requirements, and key controls of ISO 27001, preparing them to support or participate in the implementation and controls of ISO 27001, preparing them to support or participate in the implementation and maintenance of an ISMS. The course equips learners with essential knowledge for contributing to organizational information security compliance and risk management efforts.

Learning Objectives

By the end of the programme, participants will be able to:
At Knowledge Level:
List key terms and concepts related to ISO/IEC 27001 and information security.
Convey the purpose and benefits of an Information Security Management System (ISMS).
Identify the key clauses and control objectives of ISO 27001.
Describe the structure of the ISO/IEC 27001 standard.
Clarify the roles and responsibilities related to information security within an organization
Convey the concepts of risk, threat, and vulnerability in the context of ISO 27001.
At Skills Level:
Choose the application of ISO 27001 concepts to real-world information security scenarios.
Perform basic risks and security controls in the context of an ISMS.
Interpret ISO 27001 clauses to understand how they influence organizational policies and
procedures.
Assess their organization’s current position in relation to ISO 27001 readiness at a high level.
At Attitudes Level:
Evaluate the importance of aligning security practices with ISO 27001.
Defend the implementation of an ISMS within their department or organization
Motivate a security-aware mindset among peers and teams.
Appraise the importance of information security and their role in supporting an effective ISMS.
Motivate the adoption and promotion of a culture of information security awareness.

Course Outline

1 - Introduction to Information Security and ISO 27001
  • Fundamentals of Information Security, Concepts & Importance
  • Introduction toISO/IEC 27000 Series (Focus on ISO 27001)
  • Purpose and Benefits of an ISMS
  • Overview of ISO/IEC
  • 27001 Certification and Compliance
2 - Structure and Core Principles of ISO/IEC 27001
  • Understanding the High-Level Structure (HLS)
  • Key Terms and Definitions
  • Core Principles of Information Security (CIA Triad, Risk-Based Approach)
  • Roles in Supporting ISMS (e.g., Management,Staff, IT)
3 - ISO 27001 Clauses 4–10 – Requirements of the Standard
  • Context of the Organization (Clause 4)
  • Leadership and Commitment (Clause 5)
  • Planning: Risk Management and Objectives (Clause 6)
  • Support: Resources, Awareness, and Documented Info (Clause 7)
  • Operation:Implementing Controls (Clause 8)
  • Performance Evaluation: Audits & Reviews (Clause 9)
  • Improvement: Nonconformities & Continual Improvement (Clause 10)
4 - Annex A and ISO 27002 – Overview of Information Security Controls
  • Introduction to Annex A and ISO 27002
  • Themes of Controls (Organizational, People, Physical, Technological)
  • Examples of Key Controls (e.g., Access Control, Asset Management), Incident Management)
  • The Statement of Applicability (SoA)
5 - ISMS Risk Management Essentials
  • Introduction to Risk Assessment and RiskTreatment
  • A pplying the Risk-Based Approach in ISO 27001
  • Understanding Risk Documentation Requirements
  • Sample Risk Scenarios and Mitigation Steps
6 - Supporting ISMS Implementation and Certification Readiness
  • Key Stages in ISMS Implementation
  • Common Pitfalls and Success Factors
  • Supporting Roles and Responsibilities for Implementation
  • Introduction to Certification and the Audit Process
7 - Case Studies/ Examples
  • Case Studies/ Examples of implementation of information security controls based on ISO 27002 best practices & Discussion
8 - Wrap-up, Q&A, Feedback
  • Wrap-up, Q&A, Course Feedback

Target Audience

This course is ideal for individuals who are involved in, responsible for, or affected by information security management within their role, such as (but not limited to):

Information Security & IT professionals
Governance, Risk & Compliance professionals
Operations managers
Project managers
Quality assurance managers
C-Level Executives

Please Note: some classes are run in multiple half-day sessions. Please contact us to confirm exact session dates/times.

Upcoming Class Dates and Times
Sep 24
Sep 24, 09:00 AM - 02:15 PM
950,00 €
Login