Unlock Exceptional Learning at Unbeatable Price
Thank you!


Course Overview

ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.

During this training course, you will also gain a thorough understanding of the best practices of Information Security Management Systems to secure the organization`s sensitive information and improve the overall performance and effectiveness.

After mastering all the necessary concepts of Information Security Management Systems, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential. By holding a PECB Lead Implementer Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to implement ISO/IEC 27001 in an organization.

Course Objectives


  • Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks
  • Master the concepts, approaches, methods and techniques used for the implementation and effective
  • management of an ISMS
  • Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization
  • Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS
  • Acquire the expertise to advise an organization in implementing Information Security Management System best practices

Course Prequisites

A fundamental understanding of ISO/IEC 27001 and comprehensive knowledge of implementation principles.

Target Audience

  • Managers or consultants involved in Information Security Management
  • Expert advisors seeking to master the implementation of an Information Security Management System
  • Individuals responsible for maintaining conformance with ISMS requirements
  • ISMS team members


Introduction to ISO/IEC 27001 and initiation of an ISMS

  1. Course objectives and structure
  2. Standards and regulatory frameworks
  3. Information Security Management System (ISMS)
  4. Fundamental principles of Information Security Management Systems
  5. Initiating the implementation of an ISMS
  6. Understanding the organization and clarifying the
  7. Information Security objectives
  8. Analysis of the existing management system

Plan the implementation of an ISMS

  1. Leadership and approval of the ISMS project
  2. ISMS scope
  3. Information Security policies
  4. Risk assessment
  5. Statement of Applicability and top management`s decision to implement the ISMS
  6. Definition of the organizational structure of Information Security

Implementation of an ISMS

  1. Definition of the document management process
  2. Design of security controls and drafting of specific policies & procedures
  3. Communication plan
  4. Training and awareness plan
  5. Implementation of security controls
  6. Incident Management
  7. Operations Management


ISMS monitoring, measurement, continuous improvement and preparation for a certification audit

  1. Monitoring, measurement, analysis and evaluation
  2. Internal audit
  3. Management review
  4. Treatment of non-conformities
  5. Continual improvement
  6. Preparing for the certification audit
  7. Competence and evaluation of implementers


Certification Exam

  1. Preparation for exam
  2. Exam

What Our Students Have to Say

"As a client of Makintouch, I would recommend the company as a leading PC-based training school. When we needed half day courses to fit the schedules of our employees they were able to customize them to meet our company’s needs" – Java Struts
Taiwo Alaka
I would recommend this course as it is up to date with the current release which is quite rare as things move on so fast. The classroom set up worked well and the labs were good and relevant to the course.’ – Oracle
Kayode Akinpelu
Stanbic IBTC