Specialist - Data Security

Data Security Training

Our Data security workshops and courses help your organisation to protect digital data from the malicious actions of unauthorized users, such as a cyberattack or a data breach.

Please select the course that you’re interested in

ISO 27001 Foundation

Course Overview

Audience:

The Course has been designed for Individuals involved in Information Security Management, Individuals seeking to gain knowledge about the main processes of Information Security Management Systems (ISMS) and Individuals interested to pursue a career in Information Security Management.

This course enables participants to learn about the best practices for implementing and managing an Information Security Management System (ISMS) as specified in ISO/IEC 27001:2013, as well as the best practices for implementing the information security controls of the eleven domains of the ISO 27002.

The ISO 27001 Foundation Course provides dynamic learning experience where learners can explore foundational knowledge of Information Security management.

Prerequisite:

There are no formal prerequisites.

Duration:

This is a one-day ISO 27001 Foundation course. The course starts at 09:30 and runs until 16:30.

Alternate timings can be arranged upon request. The course can be held on a date that suits you.

Location:

Our ISO 27001 Foundation course will be delivered Online Remotely using online training platforms. It can also be run at our training venue near Liverpool Street (London) or any preferred location in the UK or Europe.

ISO 27001 Foundation Course Outline

INTRODUCTION TO ISO 27001 – INFORMATION SECURITY MANAGEMENT SYSTEM (ISMS)

Introduction to the ISO/IEC 27000 family of standards

Introduction to management systems and the process approach

Fundamental principles of information security
General requirements of ISO/IEC 27001

Implementation phases of ISO/IEC 27001 framework

Continual improvement of Information Security

Conducting an ISO/IEC 27001 certification audit


INFORMATION SECURITY CONTROLS ACCORDING TO ISO/IEC 27002

Principles and design of information security controls

Documentation of an information security control environment

Monitoring and reviewing the information security controls

Examples of implementation of information security controls based on ISO 27002 best practices

 

 
Show more
One to One

(which includes a tailor-made training programme for the individual where they can mix and match the topics from various levels to get the most cost-effective training

Group for up to 8 learners
The Course outlines on our website are standard, however, we would be happy to tailor them to your specific requirements. Please call us on 020 3696 2796 or send us a message to discuss further.

What Our Clients Say

Extras

This is a sample of some of the Short training videos. Please note that you can get access to many more, once you have done a course with us and are registered as one of our delegates.