• ISO 27001 Internal Controls Architect Certification

    CICA 180The IRMCB ISO 27001 Information Security Management training and certification program has three distinct tiers. Certification candidates begin the process by becoming trained and certified in the core principles of Enterprise Risk Management with IRMCB's ISO 31000 Certified Internal Controls Risk Analyst program. ISO 27001 Information Security certification candidates then become trained and certified in establishing an ISO 27001 Information Security Management System, strategy, and policy in IRMCB's ISO 27001 Certified Internal Controls Architect (CICA) program. ISO 27001 Information security certification candidates complete their BCM training and certification development with IRMCB's ISO 27001 Lead Auditor program.

    Together, ISO 31000 CICRA, ISO 27001 CICA, and ISO 27001 Lead Auditor credentials by IRMCB certify participants' understanding of how ISO/IEC 27001, 27002, 27003, 27005, and 27007 standards can be used to develop a custom fit-for-purpose risk management methodology and Information Security Management System that fulfills the requirements of ISO/IEC 27001. These certifications also help fulfil the organizational competence requirements of the ISO/IEC 27001 standard itself. For complete certification eligibility requirements, see:

    Foundation Risk Certification   ISO 27001 Architecture & Strategy   ISO 27001 Auditing
    CICRA 180 next arrow th CICA 180 next arrow th CLA 180
    Certification Steps   Certification Steps   Certification Steps


    Getting IRMCB standardized training and taking certification exams

     

    IRMCB courses are delivered by Authorized Training and Education Centers (ATECs) in standardized live and online formats. Select ATECs are also authorized to proctor exams and issue certificates.

    Authorized Training and Education Center

    Headquarters

    Authorized for Live Instructor-Led Training

    Authorized for Web-Based Training

    Authorized exam center

    Certified Information Security

    United States

    SCHEDULED EVENTS

    REGISTER

    REGISTER

  • Content Outline

    Your ISO 27001 training will include:

    1. Information Security, Information Security Management, and ISO 27000 Standards
      • Principles of information security
      • Review of ISO 27001, ISO 27002, ISO 27003, ISO 27005, ISO 27007, and ISO 27008
      • Achieving the benefits of Information Security
    2. Information Security Management
      • Planning and designing
      • Implementing and benchmarking
      • Measuring and monitoring
      • Learning and reporting

    Establish a firm program starting point by using ISO 27000 standards to build out the initial information security core policy. Throughout the class, our expert instructor will convert ISO 27000 series concepts and requirements into a real ISO 27001 Information Security Policy. Along with the instructor, you will get your information security program properly initiated by constructing:

      • Information Security Policy Statement
      • Information Security General Terms and Definitions
      • Information Security Scope Document
      • Information Security Strategy Statement including identification of requirements for the Information Security program setup, initiation, operation, maintenance, and improvement
      • Information Security Organizational Roles and Responsibilities Statement
      • Information Security Risk Policy

    * ISO Standards are NOT included in this course, nor provided in class. Students are encouraged to bring their own hard-copies of the standards to the class. ISO standards are available for purchase at www.iso.org.

  • Policy Workshop: ISO 27001 Risk Management

    Get a thorough understanding of ISO 27000 standards for information security governance, and how to leverage the ISO 27000 standards to establish and maintain an information security management system (ISMS) program.

    Information Security Governance

    CICA 180ISO 27001 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. This ISO standard is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties.

    This 2-day ISO 27001 training and certification workshop  provides thorough coverage of the ISO 27000 standards, as well as setting out advice on the implementation of an information security initiative. The purpose of the course is to:

    • Describe the principles and processes of information security governance and management;
    • Provide thorough coverage of the requirements of ISO 27001;
    • Give practical guidance on designing a suitable framework;
    • Give practical advice on implementing information security management;
    • Prepare you for your ISO 27001 certification exams required for Certified Internal Controls Architect (CICA) professional credentialing.
    • Establish a firm program starting point by using ISO 27001, ISO 27002, and 27003 to build out the initial Information Security Management core policy.

    * ISO Standards are NOT included in IRMCB risk management training, nor provided in class. Students are encouraged to bring their own hard-copies of the standards to the class. ISO standards are available for purchase at www.iso.org.



     

    Who should attend?

    Recommended participants by role for this ISO 27001 training include:

    • Policy Approvers / Strategy Decision Makers
    • Chief Information Officer (CIO / CISO)
    • Information security managers
    • Compliance officers
    • IT managers
    • Risk managers
    • Business Continuity Managers
    • Operations department heads (business unit managers)
    • Auditors

     


     

    Getting IRMCB standardized training and taking certification exams

    IRMCB courses are delivered by Authorized Training and Education Centers (ATECs) in standardized live and online formats. Select ATECs are also authorized to proctor exams and issue certificates.

    Authorized Training and Education Center

    Headquarters

    Authorized for Live Instructor-Led Training

    Authorized for Web-Based Training

    Authorized exam center

    Certified Information Security

    United States

    SCHEDULED EVENTS

    REGISTER

    REGISTER

.

iso 27001 information security management 

iso 27001 information security management

professional ISO 27001 training

iso 27001 certification training

online iso 27001 certification training

iso 27001 certification training atlanta

information security manager workshop

information security policy workshop

information security training course

informaiton security strategy training
certified infomration security manager
cism certification training program
information security strategy workshop
information security strategy training
information security certification
pecb information security
policy development workshop
online information security certification
isms strategy planning workshop

cissp cism cisa training

allen keele cisa superreview

information security management system

information security management

ISO 27001 training certification, iso 27001 certification training, lead auditor, lead implementerlead auditorlead implementer