Specialist - Data Security

Data Security Training

Our Data security workshops and courses help your organisation to protect digital data from the malicious actions of unauthorized users, such as a cyberattack or a data breach.

Please select the course that you’re interested in

ISO 27001 Lead Implementer (2 days)

Course Overview


The Course is Designed for Managers or consultants involved in Information Security Management, Expert advisors seeking to master the implementation of an Information Security Management System, Individuals responsible for maintaining conformance with ISMS requirements and ISMS team member.

Mastering the implementation and management of an Information Security Management System (ISMS) based on ISO/IEC 27001.

This two-day intensive course enables participants to develop the necessary expertise to support an organization in implementing and managing an Information Security Management System (ISMS) based on ISO/IEC 27001:2013. Participants will also gain a thorough understanding of best practices used to implement information security controls from all areas of ISO/IEC 27002.

This training is consistent with ISO/IEC 27032 (Guidelines for cybersecurity), ISO/IEC 27003 (Guidelines for the Implementation of an ISMS), ISO/IEC 27004 (Measurement of Information Security) and ISO/IEC 27005 (Risk Management in Information Security).


There are no formal prerequisites, however, basic knowledge of Information Security is recommended.


This is a Two-day ISO 27001 Lead Implementer course. The course starts at 09:30 and runs until 16:30.

Alternate timings can be arranged upon request. The course can be held on a date that suits you.


Our ISO 27001 Lead Implementer course will be delivered Online Remotely using online training platforms. It can also be run at our training venue near Liverpool Street (London) or any preferred location in the UK or Europe.

ISO 27001 Lead Implementer Course Outline

Introduction to Information Security Management System (ISMS)

Course objectives and structure

Standards and regulatory frameworks

Information Security Management System (ISMS)

Fundamental principles of Information Security Management Systems

Initiating the implementation of an ISMS

Understanding the organization and clarifying the Information Security objectives

Analysis of the existing management system

Planning the implementation of an ISMS based on ISO/IEC 27001

Leadership and approval of the ISMS project

ISMS scope

Information Security policies

Risk assessment

Statement of Applicability and top management`s decision to implement the ISMS

Definition of the organizational structure of Information Security

Implementing an ISMS based on ISO/IEC 27001

Definition of the document management process

Design of security controls and drafting of specific policies & procedures

Communication plan

Training and awareness plan

Implementation of security controls

Incident Management

Operations Management

ISMS monitoring, measurement, continuous improvement

Monitoring, measurement, analysis and evaluation

Internal audit

Management review

Treatment of non-conformities

Continual improvement

Preparing for a certification audit

Preparing for the certification audit

Competence and evaluation of implementers

Closing the training



Show more
One to One

(which includes a tailor-made training programme for the individual where they can mix and match the topics from various levels to get the most cost-effective training

Group for up to 8 learners
The Course outlines on our website are standard, however, we would be happy to tailor them to your specific requirements. Please call us on 020 3696 2796 or send us a message to discuss further.

What Our Clients Say


This is a sample of some of the Short training videos. Please note that you can get access to many more, once you have done a course with us and are registered as one of our delegates.