ISO/IEC 27001 Lead Auditor (certification course) Training Course
Who can attend?
- Auditors who wish to conduct and lead information security management system (ISMS) audits
- Managers or consultants aiming to master the ISMS audit process
- Individuals responsible for maintaining compliance with ISMS requirements within an organization
- Technical experts preparing to undertake ISMS audits
- Expert advisors in information security management
Learning objectives
By the end of this training course, participants will be able to:
- Explain the fundamental concepts and principles of an information security management system (ISMS) based on ISO/IEC 27001
- Interpret the ISO/IEC 27001 requirements for an ISMS from an auditor's perspective
- Evaluate whether an ISMS complies with ISO/IEC 27001 requirements, in line with fundamental audit concepts and principles
- Plan, conduct, and conclude an ISO/IEC 27001 compliance audit, adhering to ISO/IEC 17021-1 requirements, ISO 19011 guidelines, and other auditing best practices
- Manage an ISO/IEC 27001 audit program
Educational approach
- This training combines theoretical knowledge with practical experience in ISMS audits
- Lecture sessions are enriched with examples drawn from case studies
- Practical exercises involve a case study that includes role-playing and discussions
- Practice tests mirror the Certification Exam format
Course Outline
Day 1: Introduction to the information security management system (ISMS) and ISO/IEC 27001
Day 2: Audit principles, preparation, and initiation of an audit
Day 3: On-site audit activities
Day 4: Closing the audit
Day 5: Certification Exam (if face to face, remote exams scheduled separately)
After successfully completing the exam, you can apply for the credentials shown on the table below. You will receive a certificate once you comply with all the requirements related to the selected credential. For more information about ISO/IEC 27001 certifications and the PECB certification process, please refer to the Certification Rules and Policies.
Requirements
A fundamental understanding of ISO/IEC 27001 and comprehensive knowledge of audit principles.
Need help picking the right course?
ISO/IEC 27001 Lead Auditor (certification course) Training Course - Enquiry
ISO/IEC 27001 Lead Auditor (certification course) - Consultancy Enquiry
Testimonials (5)
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
The knowledge and understanding of the trainer on the training material was exceptional. The trainer was well aware of the subject, provided practical examples in relevance. I would highly recommend him as a trainer for this training.
Tayyeb Mahmood - Ajman Municipality
Course - COBIT 2019 Foundation
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.
Marco van den Berg - ZiuZ Medical B.V.
Course - HIPAA Compliance for Developers
Related Courses
AML OFFICER MASTERCLASS
21 HoursThere is a global focus on combating money laundering. Compliance officers, AML Officers, MLROs, KYC analysts, auditors, and managers need to understand how to ensure adherence to Subsidiary 373.01, the Prevention of Money Laundering and Funding of Terrorism Regulations (PMLFTR).
Under the PMLFTR, all Subject Persons, including those in the regulated financial services sector, are required to appoint a Money Laundering Reporting Officer (MLRO).
This practical course provides you with the knowledge and necessary guidance on how to approach AML compliance within your organization, with particular attention to the regulatory environment in Malta.
Basel III – Certified Basel Professional
21 HoursDescription:
Basel III is a global regulatory framework for bank capital adequacy, stress testing, and market liquidity risk. Initially agreed upon by the Basel Committee on Banking Supervision between 2010 and 2011, the implementation of these standards was extended to March 31, 2019. Basel III enhances bank capital requirements by improving liquidity and reducing leverage.
Unlike Basel I and II, Basel III requires different levels of reserves for various types of deposits and borrowings, complementing rather than replacing the earlier accords.
Navigating this complex and evolving regulatory landscape can be challenging. Our course and training will help you manage these changes and their impact on your institution effectively. We are accredited by the Basel Certification Institute and ensure that our training materials are up-to-date and of the highest quality.
Objectives:
- Prepare for the Certified Basel Professional Examination.
- Develop practical strategies and techniques for defining, measuring, analyzing, improving, and controlling operational risk within a banking organization.
Target Audience:
- Board members with risk management responsibilities
- Chief Risk Officers (CROs) and Heads of Risk Management
- Risk Management team members
- Compliance, legal, and IT support staff
- Equity and Credit Analysts
- Portfolio Managers
- Rating Agency Analysts
Overview:
- An introduction to Basel norms and the amendments in Basel III
- Regulations for market, credit, counterparty, and liquidity risk
- Stress testing methodologies, including how to design and conduct stress tests
- The potential impact of Basel III on the international banking sector, with practical demonstrations of its application
- The necessity for new Basel norms
- The components of Basel III
- The objectives of Basel III
- The timeline for Basel III implementation
Certified Fraud Examiner (CFE) Preparation
70 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at advanced-level professionals who wish to gain a comprehensive understanding of fraud examination concepts and prepare for the Certified Fraud Examiner (CFE) exam.
By the end of this training, participants will be able to:
- Gain comprehensive knowledge of fraud examination principles and the fraud examination process.
- Learn to identify, investigate, and prevent various types of financial fraud schemes.
- Understand the legal environment related to fraud, including the legal elements of fraud, relevant laws, and regulations.
- Acquire practical skills in conducting fraud investigations, including evidence collection, interviewing techniques, and data analysis.
- Learn to design and implement effective fraud prevention and deterrence programs within organizations.
- Gain confidence and knowledge to successfully pass the Certified Fraud Examiner (CFE) exam.
CGEIT – Certified in the Governance of Enterprise IT
28 HoursDescription:
This four-day event (CGEIT training) is the ultimate preparation to help you pass the challenging CGEIT exam on your first attempt. The CGEIT qualification is an internationally recognized symbol of excellence in IT governance, awarded by ISACA. It is designed for professionals responsible for managing IT governance or those with significant advisory or assurance responsibilities in this area. Achieving CGEIT status will enhance your recognition in the marketplace and increase your influence at the executive level.
Objectives:
This seminar is tailored to prepare participants for the CGEIT examination by enhancing their existing knowledge and understanding, ensuring they are better equipped to pass the exam as defined by ISACA.
Target Audience:
Our training course is aimed at IT and business professionals with substantial IT governance experience who are preparing to take the CGEIT exam.
COBIT 2019 Foundation
21 HoursLearning Objectives
This COBIT 2019 Foundation course is designed as an introduction to COBIT 2019 and aims to help you understand how an integrated business framework for the governance and management of enterprise IT can be leveraged to achieve seamless IT-business integration, cost savings, and enhanced productivity. The course covers the following areas:
- Introduction to the new framework
- Key concepts and terminology
- Governance and Framework Principles
- Components of the governance system
- Governance and management objectives
- Performance management
- Designing a customized governance system
Compliance for Payment Services in Japan
7 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at payment services compliance professionals who wish to create, implement, and enforce a compliance program within an organization.
By the end of this training, participants will be able to:
- Understand the rules set forth by government regulators for payment service providers.
- Create the internal policies and procedures needed to satisfy government regulations.
- Implement a compliance program that adheres to relevant laws.
- Ensures that all corporate processes and procedures comply with the compliance program.
- Uphold the business's reputation while protecting it from lawsuits.
Governance, Risk Management & Compliance (GRC) Fundamentals
21 HoursCourse Goal:
To ensure that participants have a solid understanding of GRC processes and capabilities, and the skills needed to integrate governance, performance management, risk management, internal control, and compliance activities effectively.
Overview:
- Fundamental terms and definitions in GRC
- Key principles of GRC
- Core components, practices, and activities within GRC
- The relationship between GRC and other disciplines
HIPAA Compliance for Developers
7 HoursHIPAA (Health Insurance Portability and Accountability Act of 1996) is a U.S. legislation that sets standards for data privacy and security in the handling and storage of medical information. These guidelines serve as an excellent standard for developing health applications, regardless of location. Applications that comply with HIPAA are recognized and trusted globally.
In this instructor-led, live training (conducted remotely), participants will gain a foundational understanding of HIPAA through a series of hands-on exercises in a live-lab environment.
By the end of this training, participants will be able to:
- Comprehend the fundamental principles of HIPAA
- Develop health applications that adhere to HIPAA standards
- Utilize developer tools for achieving HIPAA compliance
Audience
- Developers
- Product Managers
- Data Privacy Officers
Format of the Course
- The course combines lectures, discussions, exercises, and extensive hands-on practice.
Note
- To request a customized training for this course, please contact us to arrange.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
ISO 27002 Lead Manager
35 HoursThe ISO/IEC 27002 Lead Manager training equips you with the essential expertise and knowledge needed to support an organization in implementing and managing Information Security controls as outlined in ISO/IEC 27002.
Upon completing this course, you will be eligible to take the exam and apply for the “PECB Certified ISO/IEC 27002 Lead Manager” certification. This PECB Lead Manager Certification demonstrates that you have a thorough understanding of the principles and techniques required for implementing and managing Information Security Controls based on ISO/IEC 27002.
Who should attend?
- Managers or consultants aiming to implement an Information Security Management System (ISMS) in line with ISO/IEC 27001 and ISO/IEC 27002
- Project managers or consultants looking to master the process of implementing an Information Security Management System
- Individuals responsible for information security, compliance, risk management, and governance within an organization
- Members of information security teams
- Expert advisors in information technology
- Information Security officers
- Privacy officers
- IT professionals
- Chief Technology Officers (CTOs), Chief Information Officers (CIOs), and Chief Information Security Officers (CISOs)
Learning objectives
- Acquire the skills to implement Information Security controls in accordance with the framework and principles of ISO/IEC 27002
- Gain a thorough understanding of the concepts, approaches, standards, methods, and techniques necessary for effectively implementing and managing Information Security controls
- Understand the interrelationships among the components of Information Security controls, including responsibility, strategy, acquisition, performance, conformance, and human behavior
- Recognize the significance of information security in the strategic planning of an organization
- Become proficient in implementing information security management processes
- Master the formulation and implementation of security requirements and objectives
Educational approach
- This training combines theoretical knowledge with practical application
- Lectures are complemented by real-world examples to illustrate key concepts
- Practical exercises based on case studies are included
- Review exercises are provided to assist with exam preparation
- A practice test similar to the certification exam is also part of the training
General Information
- The cost of certification is included in the exam fee
- Participants will receive a comprehensive training manual containing over 500 pages of information and practical examples
- A participation certificate with 31 CPD (Continuing Professional Development) credits will be issued to participants
- If you do not pass the exam, you can retake it within 12 months at no additional cost
PECB ISO/IEC 27001 Lead Implementer
35 HoursInformation security threats and attacks are constantly evolving. The best defense against these threats is the effective implementation and management of information security controls and best practices. Ensuring robust information security is also a key expectation from customers, legislators, and other stakeholders.
This training course is designed to equip participants with the skills needed to implement an Information Security Management System (ISMS) based on ISO/IEC 27001. It aims to provide a thorough understanding of ISMS best practices and a framework for its continuous management and improvement.
After completing the training, you will be eligible to take the exam. If you pass, you can apply for the “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which confirms your ability and practical knowledge in implementing an ISMS according to the requirements of ISO/IEC 27001.
Who Can Attend?
- Project managers and consultants involved in or concerned with the implementation of an ISMS
- Expert advisors looking to master the implementation of an ISMS
- Individuals responsible for ensuring compliance with information security requirements within an organization
- Members of an ISMS implementation team
General Information
- Certification fees are included in the exam price.
- Training materials containing over 450 pages of information and practical examples will be provided.
- A participation certificate with 31 CPD (Continuing Professional Development) credits will be issued.
- If you fail the exam, you can retake it within 12 months at no additional cost.
Educational Approach
- The training course includes essay-type exercises, multiple-choice quizzes, examples, and best practices for implementing an ISMS.
- Participants are encouraged to communicate with each other and engage in discussions while completing quizzes and exercises.
- Exercises are based on a case study.
- The structure of the quizzes mirrors that of the certification exam.
Learning Objectives
This training course will help you:
- Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for implementing and effectively managing an ISMS.
- Recognize the relationship between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks.
- Understand how an information security management system operates and its processes based on ISO/IEC 27001.
- Learn to interpret and implement the requirements of ISO/IEC 27001 in the context of a specific organization.
- Acquire the knowledge needed to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an ISMS.
Compliance and the Management of Compliance Risk
21 HoursAudience
This course is designed for all staff who require a comprehensive understanding of Compliance and Risk Management.
Format of the Course
The course is structured as a blend of:
- Facilitated Discussions
- Slide Presentations
- Case Studies
- Practical Examples
Course Objectives
By the end of this course, participants will be able to:
- Grasp the key aspects of Compliance and the national and international initiatives aimed at managing associated risks.
- Identify the methods for establishing a Compliance Risk Management Framework within a company and its workforce.
- Explain the roles of the Compliance Officer and Money Laundering Reporting Officer, and how these positions should be integrated into business operations.
- Recognize other critical areas in Financial Crime, particularly those relevant to International Business, Offshore Centers, and High-Net-Worth Clients.
PCI-DSS Practitioner
14 HoursThis instructor-led, live Payment Card Industry Professional training in Uzbekistan (online or onsite) provides an individual qualification for industry practitioners who wish to demonstrate their professional expertise and understanding of the PCI Data Security Standard (PCI DSS).
By the end of this training, participants will be able to:
- Understand the payment process and the PCI standards designed to protect it.
- Understand the roles and responsibilities for entities involved in the payment industry.
- Have deep insight into, and understanding of, the 12 PCI DSS requirements.
- Demonstrate knowledge of PCI DSS and how it applies to organizations that are involved in the transaction process.
Secrets of Boardroom Leadership
7 HoursThe governance of any enterprise is only as strong as its board of directors, and the effectiveness of that board hinges on the capabilities of its chairman. However, the role of board leadership is not only the most critical for ensuring board efficiency; it is also the least supported with training and resources. Board leaders and chief executives frequently find themselves in power struggles. Here are the insights and strategies from some of the world’s top board leaders, drawn from their extensive experience and practical wisdom in the boardroom.
Welcome to the Boardroom!
7 HoursYou might be looking to secure your first board seat, or perhaps you have already secured a role on the board and are preparing for your initial meeting. A company may also want to bring its emerging managers and diverse talents up to speed on what they need to know to be effective in the boardroom. This one-day program will equip you with all the necessary knowledge to be confident, informed, and ready as soon as you step into the boardroom.