Introduction
ISO 27001 assists organizations to establish, implement, maintain, and continually improve an ISMS that preserves the confidentiality, integrity, and availability of information. The adoption of ISO 27001 can help organizations identify and address information security risks, comply with legal and regulatory requirements, and gain the trust of stakeholders. This course aims to equip participants with the knowledge and skills necessary to understand, implement, and audit ISO 27001 effectively. As a result, participants will have the capability to contribute effectively to developing robust information security policies, implementing effective security controls, and taking proactive steps to mitigate risks.
Course Outline
- Module 1
- Module 2
- Module 3
- Module 4
- Module 5
- Course Objectives
- Target Audience
ISO 27001 & ISMS
- ISM principles.
- Key requirements of ISO 27001.
- IS policy and leadership commitment.
- The scope of the ISMS.
- Conducting risk assessments.
Implementing ISMS Controls
- Risk treatment options and security controls.
- Implementing information security controls.
- Developing security awareness and training programs.
- Managing documentation and document control.
Monitoring & Operating ISMS
- Monitoring and evaluation of the ISMS.
- Internal audit principles and practices for ISMS.
- Management review of the ISMS.
- Corrective action and preventive action.
Incident Management & Business Continuity
- Incident management and response.
- Reviewing and testing incident response.
- Maintaining and improving incident response.
- Business continuity management.
- Business continuity plans.
Effective ISMS
- Integrating ISM into organizational culture.
- Information security communication and training.
- The role of management in information security.
- Emerging trends and future of ISM.
By the end of this course, participants will be able to:
- Explore ISO 27001 principles, requirements, and its role in information security.
- Apply an Information Security Management System aligned with ISO 27001 standards.
- Identify security controls, risk assessments, and manage incidents.
- Monitor and evaluate the ISMS continuously to ensure compliance with laws and regulations.
- Participate actively in information security initiatives and protect sensitive data.
.
This course is ideal for:
- Risk managers.
- Data protection officers.
- Compliance officers & auditors.
- IT managers & system administrators.
- Information security managers & officers.
Course Schedule & Fees
- Kuala Lumpur
- Singapore
- Amsterdam
- Online
- Course Fees
This course will take place in Kuala Lumpur on the following dates:
26/05/2025 | 09/06/2025 | 23/06/2025 | 07/07/2025 |
21/07/2025 | 04/08/2025 | 18/08/2025 | 01/09/2025 |
15/09/2025 | 29/09/2025 | 13/10/2025 | 27/10/2025 |
10/11/2025 | 24/11/2025 | 08/12/2025 | 22/12/2025 |
05/01/2026 | 19/01/2026 | 02/02/2026 | 16/02/2026 |
This course will take place in Singapore on the following dates:
19/05/2025 | 09/06/2025 | 30/06/2025 | 21/07/2025 |
11/08/2025 | 01/09/2025 | 22/09/2025 | 13/10/2025 |
03/11/2025 | 15/12/2025 | 05/01/2026 | 26/01/2026 |
16/02/2026 |
This course will take place in Amsterdam on the following dates:
26/05/2025 | 16/06/2025 | 07/07/2025 | 28/07/2025 |
18/08/2025 | 08/09/2025 | 29/09/2025 | 20/10/2025 |
10/11/2025 | 01/12/2025 | 22/12/2025 | 12/01/2026 |
02/02/2026 | 23/02/2026 |
This course will take place Online the following dates:
20/05/2025 | 17/06/2025 | 15/07/2025 | 12/08/2025 |
09/09/2025 | 07/10/2025 | 04/11/2025 | 02/12/2025 |
30/12/2025 | 27/01/2026 | 24/02/2026 |
Kuala Lumpur | Singapore | Amsterdam | Online |
USD$ 3,580 | USD$ 5,600 | USD$ 5,600 | USD$ 1,920 |