Shadow - Lead Implementer Course

The best training ever. Suitable for your business ! 

Lead Implementer Course

Recent high profile information security breaches and the value of information are highlighting the ever increasing need for organizations to protect their information. An Information Security Management System (ISMS) is a controlled approach to managing sensitive company information so that it remains secure. It encompasses people, processes and Information Management Security Systems.

The objective of this information security training course is to provide delegates with the necessary skills and tools to implement an Information Security Management System that meets the certification requirements of ISO 27001:2013 and is based on the code of practice defined by ISO 17799. The information security training course will prepare delegates for the ISO 27001 Lead Implementer Certificate and provide delegates with useful tools and a reference framework for implementation.

  • » Staff tasked with the implementation and management of an ISO 27001:2005 Information Security Management System
  • » Information Security Consultants
  • » The information security training course is designed for people who have a good understanding of ISO 27001:2013 and ISO 17799:2005 Information Security Management Systems, (attendance of Introduction to Information Security or the ISO 27001:2013 Lead Auditor course is recommended)

Both the objective and result of the information security training course is the development of a skeleton Information Security Management System, including key processes, policies and procedures which can be used the moment you step back into your office to start implementing an effective Information Security Management System in your organization. The knowledge and skills imparted during this information security training course will prove invaluable in improving and protecting your business.

A combination of tutorials, syndicate exercises and role-play, including the following topics:

  • » Information security
  • » The importance of information security
  • » ISO 27001:2013
  • » Reviewing security threats and vulnerabilities
  • » Management of security risks
  • » Selecting security controls
  • » How to build an Information Security Management System
  • » ISO 27001:2013 auditing techniques
  • » Managing and leading an ISO 27001:2013 audit team
  • » Interview techniques
  • » Audit reporting
  • » Examination to prove competency.
  • For further details, Kindly contact:
  • Email: info@shadowsec.com
  • Telephone: +351 968 120 426  
  • Telephone: +44 203 286 1538  
  • Schedule: 18th to 22nd May
  • Expected date: 13rd to 17th July
    Expected date: 12nd to 16th October