Not All Training Is Created Equal

The Kelmac Group® has developed a unique tradition of creating learning services that shape the future of conformity and compliance learning solutions for Executive Management, Practitioners and Auditors. 

Where others train followers, we train leaders™

ISMS Fundamentals based on ISO/IEC 27001:2013 Training Course

Course Overview Who is this course for?

The focus of the ISO 27001 Fundamentals Training Course is to comprehensively introduce Learners to Information Security Management Systems and provide them with a highly insightful introduction to the purpose, intent and requirements of ISO 27001 plus the business case for adopting ISO 27001.

Key Course Learning Outcome Why this course is unique?

Our training demonstrates to the Learner the benefits of adopting the unique Kelmac Group® One System Model for enhancing organizational compliance, effectiveness and efficiency based on utilizing Business Process Management to enhance ISO.



Course Basics What is essential to know?

  • This is a 1-day (8hr) learning event.
  • Start/Finish Times: 08:00am – 17:30pm
  • Ideal for those looking to get started & understand the requirements of Information Security Management Systems & ISO/IEC 27001:2013. 

 

iso 27001 fundamentals training certification uk
 Where are you looking to attend this training?

We are sorry but there are currently no public training dates available for this course at the moment! If you would like to send us your details, we will contact you when a course becomes available near you. If you have any questions about this course, call +353.61.491224.

Course Learning TopicsWhat does the course cover?
  • Course Introduction

    • The Business Case for ISO/IEC 27001:2013 and the Relationship with Confidentiality, Integrity and Availability of the Organization’s Assets*
    • Overview of ISO 27000 Family of Standards
    • Purpose and Impact of Annex SL
    • New and Revised Terminology
    • External and Internal Issues, Interested Party Requirements, Risks and Opportunities
    • Top Management & Business Processes*

    ISO/IEC 27001 - Context of the Organization

    • The New Requirements for Context of the Organization
    • The Organizations External and Internal Issues, Interested Parties, their Needs, Significance, Monitoring and Measurement
    • The PDCA Cycle and the Process-based Information Security Management System Model for ISO/IEC 27001:2013
    • The Organization Business Model, Alignment with the Information Security Management System Process Model and Benefits*
    • Audit Evidence & Sources*

    ISO/IEC 27001 - Leadership

    • The New and Enhanced Requirements for Leadership
    • The ISACA
    • The Information Security Forum (ISF) and (ISC)² Twelve Principles of Information Security*
    • Audit Evidence and Sources*
  • ISO/IEC 27001 - Planning of the ISMS

    • The Requirements for Planning of the Information Security Management System
    • Process Terminology, Processes & Process Controls, Risks and Opportunities*
    • Objectives and Plans to Achieve Them
    • Management of Change
    • Audit Evidence and Sources*

    ISO/IEC 27001 - Support

    • The Requirements for Support
    • Awareness and Communications
    • Annex SL Requirements for Documented Information and How It Differs from Previous Management System Requirements

    ISO/IEC 27001 - Operation

    • The Requirements for Operation
    • The New and Enhanced Requirements for Operational Planning and Control, specifically Outsourcing
    • Audit Evidence and Sources*
  • ISO/IEC 27001 - Performance Evaluation*

    • The Requirements for Performance Evaluation*
    • The Requirements for Monitoring, Measurement, Analysis and Evaluation*
    • Internal Auditing and Management Review*

    ISO/IEC 27001 - Improvement*

    • The Requirements for Improvement*
    • The Requirements for Managing Non-Conformity and Corrective Action, and Continual Improvement*
    • Certification and Accreditation*

*Kelmac Group cover this topic in more depth compared to our competitors.
**Kelmac Group proven added value as this material is not covered by the IRCA specification or our competitors.

Course Certification

This course is fully certified by Kelmac Group.

 

How Will I Be Assessed?

Each Learner is assessed based on participation and performance throughout the duration of the course. This includes all exercises, role plays, case studies and all other activities during the course.

Please note, full attendance is required during the training course.

 

Who Should Attend?
  • Senior managers
  • IT Security officers
  • IT Managers
  • Management systems managers
  • Auditors involved in introducing ISO/IEC 27002 or ISO/IEC 27001 into an organization
  • Chief security officers
  • Information security consultants
Our Course vs. Our CompetitorsWhy is our course the best?

Working with a Case Study: Almost Full Documented ISMS Why is this important?

 

Each Learner will audit the almost full documented ISMS from the unique Kelmac Group® assurance perspective. The Kelmac Group® assurance perspective is unique as we audit like many professional financial audit practices where the focus is on providing top management with the quality of insight to make decisions and actions aimed at improving performance of the organization. 

We boast the most comprehensive documented ISMS Case Study available including an ISO 27001:2013 Policy Manual; Statement of Applicability; Asset/Risk Register and Risk Treatment Plan, 13 SIPOC processes [Value chain, Support and Management]; 19 procedures; the organization’s statutory and regulatory and other legal obligations register, and the organization’s risk register, and related documented Information Security templates and records.

 

One System ModelWhy is this important?

 

The one system model is based on utilizing Business Process Management to enhance ISO based Management Systems.

Our course is unlike our competitors as we will outline a methodology for developing and implementing an Information Security Management System based upon the requirements of ISO/IEC 27001:2013, where the ISMS is integrated with the organization’s business model. 

Others train followers, we train leaders™

 

More Topics Covered In More DepthWhy is this important?

 

In this course, we cover 14 topics in more depth than any of our competitors!

If you look at other courses, they are largely focused on knowledge based learning which does not cover all requirements of ISO 27001.

 

    No review available.

All Our Training Is Available In HouseCan’t come to us?
WE CAN COME TO YOU

Do you wish to join our mailing list to receive our newsletter including information about industry insights, upcoming courses & special pricing or discounts?

  • Available Nationwide
  • Tailored to you
  • Fixed Fees, No Expenses*
  • Groups of 5+
  • *Exclusions, T&Cs apply

Companies That Trust In Kelmac Group ®

The Ultimate Business Training Experience

The Kelmac Group® has developed a unique tradition of creating learning services that shape the future of conformity and compliance learning solutions for Executive Management, Practitioners and Auditors. Where others train followers, we train leaders™

Course Summary
Course Summary
Course type : Classroom
Course Duration : 8 hours
Certification : Kelmac Group (IS1381 )
Continuing Education : units
How Will I Be Assessed?

Each Learner is assessed based on participation and performance throughout the duration of the course. This includes all exercises, role plays, case studies and all other activities during the course.

Please note, full attendance is required during the training course.

 

Who Should Attend?
  • Senior managers
  • IT Security officers
  • IT Managers
  • Management systems managers
  • Auditors involved in introducing ISO/IEC 27002 or ISO/IEC 27001 into an organization
  • Chief security officers
  • Information security consultants
0 Reviews

No review available.