Lead Auditor Training Course on Information Security (ISMS) - ISO 27001:2013
5 DAY LEAD AUDITOR TRAINING COURSE On INFORMATION SECURITY MANAGEMENT SYSTEM
(ISMS)ON ISO 27001 :2013
Intertek is one of the leading certification, inspection, testing and training organization. Our worldwide list of clients includes leading organizations both from manufacturing & service sectors. Our India operation is headquartered in Delhi and has 52 offices spread across the country.
TRAINING COURSES
Training is one of the most effective methods for an organization to ensure continuity of the management of the activities and to ensure effective control and improvement, provided the training is effective. Intertek every training course, whilst following an established & approved syllabus is tailored to suit the client's requirement both culturally & industrially. This personalized approach provides the assurance that the training will be effective, relevant and enjoyable.
Course Objectives
This course is designed to:
Module 1: Sensitization of Information Security – Threats & Concept
Module 2: Introduction and approach of ISO27001
Module 4: Risk Assessment
Module 5: Requirements of ISO27001
Module 6: Focal Control of ISO17799
Module 7: Brief Explanation of some Key Controls
Module 8: Auditing Concepts and Techniques
Methodology
Presentation, Case Studies & Role Plays.
Timings
The course will begin at 9.30 A.M. and will go up to 6.00 P.M. On last day of the course there will be 2 hours written examination.
Certifications
A certificate of successful completion of the course will be issued to those participants who satisfactorily complete the continuous assessment and written examination. However, participants who do not qualify either in continuous assessment or the written examination will be given certificate of attendance only.
Course Contents
The following audit topics/activities shall also be covered:-
a) Examine ISO 27001:2005 and ISO/IEC 27002:2005
b) Risk Assessment Methodology and Practice
c) Reviewing ISMS Management System Requirements
d) Audit Situation Studies
e) Role Play and Verbal Presentations
f) Audit terminology/definitions as per ISO 19011.
g) Purpose and scope of first, second and third party audits.
h) Different phases of audit.
i) Planning of audits
j) Preparation for audits including preparation of check lists. How to collect audit evidence
k) Questioning techniques during audits.
l) How to evaluate collected audit evidence to determine the extent of compliance with the audit criteria.
m) How to decide and document non-conformities, observations and suggestions/ recommendations for improvement.
n) Evaluation and acceptance of corrective action plan proposed by the audited department.
o) Verification and actions taken on non-conformities and closure of NCRs.
p) Written examination.
Benefits of the Course
What You Achieve After the Course
Benefits for organization:
ü Information classification and management is a priority issue in companies and candidates get overview of best approaches of its management.
ü With Legal acts in European and USA becoming stringent, companies need qualified and trained persons to submit reports pertaining to information security.
ü Organizations get a trained individual to implement Information Security management System.
Benefits for Candidate:
ü A trained internal Security Auditor is a recognized degree in the industry
ü It gives important perspective to the Technical people about the pillars of Information security
ü At the highest level of management, knowledge about Emergency preparedness, Business continuity planning, is necessary.
Tags – Lead Auditor Training Certification Course IRCA, UK Approved- Chandigarh, Mohali, Baddi, Solan, Parwanoo, Rajpura, Karnal, Moga, Ludhiana, Jalandhar, Punjab, Haryana, Jammu, Srinagar, Shimla, Sangrur, Panchkula, Karnala, Kurukshetra, Panipat, Ambala, Lalru, Derabassi, Dehradoon, Haridwar, Punjab, Haryana, India, Kullu, Manali,
ISO 27001 Auditor Training, Internal Auditor Training, Information Security Management System Training Course, Internal Auditor Training Course, Cyber Laws, Data Privacy, Cyber Crime,
5 DAY LEAD AUDITOR TRAINING COURSE On INFORMATION SECURITY MANAGEMENT SYSTEM
(ISMS)ON ISO 27001 :2013
Intertek is one of the leading certification, inspection, testing and training organization. Our worldwide list of clients includes leading organizations both from manufacturing & service sectors. Our India operation is headquartered in Delhi and has 52 offices spread across the country.
TRAINING COURSES
Training is one of the most effective methods for an organization to ensure continuity of the management of the activities and to ensure effective control and improvement, provided the training is effective. Intertek every training course, whilst following an established & approved syllabus is tailored to suit the client's requirement both culturally & industrially. This personalized approach provides the assurance that the training will be effective, relevant and enjoyable.
Course Objectives
This course is designed to:
Module 1: Sensitization of Information Security – Threats & Concept
Module 2: Introduction and approach of ISO27001
Module 4: Risk Assessment
Module 5: Requirements of ISO27001
Module 6: Focal Control of ISO17799
Module 7: Brief Explanation of some Key Controls
Module 8: Auditing Concepts and Techniques
Methodology
Presentation, Case Studies & Role Plays.
Timings
The course will begin at 9.30 A.M. and will go up to 6.00 P.M. On last day of the course there will be 2 hours written examination.
Certifications
A certificate of successful completion of the course will be issued to those participants who satisfactorily complete the continuous assessment and written examination. However, participants who do not qualify either in continuous assessment or the written examination will be given certificate of attendance only.
Course Contents
The following audit topics/activities shall also be covered:-
a) Examine ISO 27001:2005 and ISO/IEC 27002:2005
b) Risk Assessment Methodology and Practice
c) Reviewing ISMS Management System Requirements
d) Audit Situation Studies
e) Role Play and Verbal Presentations
f) Audit terminology/definitions as per ISO 19011.
g) Purpose and scope of first, second and third party audits.
h) Different phases of audit.
i) Planning of audits
j) Preparation for audits including preparation of check lists. How to collect audit evidence
k) Questioning techniques during audits.
l) How to evaluate collected audit evidence to determine the extent of compliance with the audit criteria.
m) How to decide and document non-conformities, observations and suggestions/ recommendations for improvement.
n) Evaluation and acceptance of corrective action plan proposed by the audited department.
o) Verification and actions taken on non-conformities and closure of NCRs.
p) Written examination.
Benefits of the Course
What You Achieve After the Course
Benefits for organization:
ü Information classification and management is a priority issue in companies and candidates get overview of best approaches of its management.
ü With Legal acts in European and USA becoming stringent, companies need qualified and trained persons to submit reports pertaining to information security.
ü Organizations get a trained individual to implement Information Security management System.
Benefits for Candidate:
ü A trained internal Security Auditor is a recognized degree in the industry
ü It gives important perspective to the Technical people about the pillars of Information security
ü At the highest level of management, knowledge about Emergency preparedness, Business continuity planning, is necessary.
Tags – Lead Auditor Training Certification Course IRCA, UK Approved- Chandigarh, Mohali, Baddi, Solan, Parwanoo, Rajpura, Karnal, Moga, Ludhiana, Jalandhar, Punjab, Haryana, Jammu, Srinagar, Shimla, Sangrur, Panchkula, Karnala, Kurukshetra, Panipat, Ambala, Lalru, Derabassi, Dehradoon, Haridwar, Punjab, Haryana, India, Kullu, Manali,
ISO 27001 Auditor Training, Internal Auditor Training, Information Security Management System Training Course, Internal Auditor Training Course, Cyber Laws, Data Privacy, Cyber Crime,