close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

Course Information

ISO 27002 Internal Auditor Training Course Outline

Module 1: Introduction to ISO 27002 

  • Scope 
  • Terms and Definitions 
  • Abbreviated Terms 

Module 2: Information Security 

  • What is Information Security? 
  • CIA 
  • Principles of Information Security 
  • Need for Information security 
  • Threats 
  • Active and Passive Attacks 

Module 3: Cybersecurity 

  • What is Cybersecurity? 
  • Cybersecurity Domains 
  • Dangerous Cybersecurity Myths 
  • Common Cyber Threats 
  • Key Cybersecurity Technologies and Best Practices 
  • Zero Trust Security Strategy 
  • Difference Between Cybersecurity and Information Security   
  • Roles and Responsibilities of Cybersecurity Professionals 

Module 4: Information Security Management System (ISMS) 

  • Introduction to ISMS 
  • Need 
  • What Does an ISMS Do? 
  • Benefits 

Module 5: Themes and Controls 

  • Control Type 
  • Information Security Properties 
  • Cybersecurity Concepts 
  • Operational Capabilities 
  • Security Domains 
  • Control Layout 

Module 6: Organisational Controls 

  • Policies for Information Security 
  • Information Security Roles and Responsibilities 
  • Segregation of Duties 
  • Management Responsibilities  
  • Contact with  
    • Authorities 
    • Special Interest Groups 
  • Threat Intelligence 
  • Information Security in Project Management 
  • Inventory of Information and Other Associated Assets 
  • Acceptable Use of Information and Other Associated Assets 
  • Return of Assets 
  • Classification of Information 
  • Labelling of Information  
  • Information Transfer  
  • Access Control 
  • Identity Management 
  • Authentication Information 
  • Access Rights 
  • Information Security in Supplier Relationships  
  • Addressing Information Security within Supplier Agreements  
  • Managing Information Security in the ICT Supply Chain 
  • Monitoring, Review, and Change Management of Supplier Services 
  • Information Security for Use of Cloud Services 
  • Information Security Incident Management Planning and Preparation 
  • Assessment and Decision on Information Security Events 
  • Response to Information Security Incidents 
  • Learning from Information Security Incidents 
  • Collection of Evidence 
  • Information Security During Disruption 
  • ICT Readiness for Business Continuity  
  • Legal, Statutory, Regulatory, and Contractual Requirements 
  • Intellectual Property Rights 
  • Protection of Records 
  • Privacy and Protection of PII 
  • Independent Review of Information Security 
  • Compliance with Policies, Rules, and Standards for Information Security 
  • Documented Operating Procedures 

Module 7: People Controls 

  • Screening 
  • Terms and Conditions of Employment. 
  • Information Security Awareness, Education, and Training 
  • Disciplinary Process 
  • Responsibilities After Termination or Change of Employment 
  • Confidentiality or Non-Disclosure Agreements 
  • Remote Working 
  • Information Security Event Reporting 

Module 8: Physical Controls 

  • Physical Security Perimeters 
  • Physical Entry 
  • Securing Offices, Rooms, and Facilities  
  • Physical Security Monitoring 
  • Protecting Against Physical and Environmental Threats  
  • Working in Secure Areas  
  • Clear Desk and Clear Screen 
  • Equipment Siting and Protection  
  • Security of Assets Off-Premises 
  • Storage Media 
  • Supporting Utilities 
  • Cabling Security 
  • Equipment Maintenance 
  • Secure Disposal or Re-use of Equipment 

Module 9: Technological Controls  

  • User Endpoint Devices  
  • Privileged Access Rights 
  • Information Access Restriction 
  • Access to Source Code 
  • Secure Authentication 
  • Capacity Management 
  • Protection Against Malware 
  • Management of Technical Vulnerabilities 
  • Configuration Management 
  • Information Deletion 
  • Data  
    • Masking  
    • Leakage Prevention 
  • Information Backup 
  • Redundancy of Information Processing Facilities 
  • Logging 
  • Monitoring Activities 
  • Clock Synchronisation 
  • Use of Privileged Utility Programmes 
  • Installation of Software on Operational Systems 
  • Networks Security 
  • Security of Network Services 
  • Segregation of Networks 
  • Web Filtering 
  • Use of Cryptography  
  • Secure Development Life Cycle 
  • Application Security Requirements 
  • Secure System Architecture and Engineering Principles 
  • Secure Coding 
  • Security Testing in Development and Acceptance 
  • Outsourced Development 
  • Separation of Development, Test, and Production Environments 
  • Change Management 
  • Test Information 
  • Protection of Information Systems During Audit Testing 

Module 10: Audit Plan and Process 

  • Audit Plan 
  • Preparing for an Audit 
  • Audit Process 

Module 11: Internal Auditor 

  • Understanding an Internal Auditor (IA) 
  • Internal Auditing Process 
  • Requirements for Internal Auditors 
  • Internal Auditor Vs External Auditor 
  • Benefits of an Internal Auditor (IA) 

Module 12: ISMS Audit 

  • Introduction 
  • Principles 
  • Audit Management 
  • Auditing Process 
  • Competence and Evaluation of Auditors 

Module 13: Cybersecurity Auditing 

  • What is Cybersecurity Audit? 
  • How it helps Organisation? 
  • Cybersecurity and the Role of Internal Audit 

Module 14: Information Security Audit 

  • What is IT Security Audit? 
  • Benefits  
  • Types  
  • Importance  
  • How to Conduct an IT Security Audit? 
  • Roles and Responsibilities of Information Security Auditor

Show moredowndown

Prerequisites 

There are no formal prerequisites for attending this 27002:2022 Internal Auditor Training course.

Audience 

This course is intended for those who need to gain knowledge about securing information and cyber security.

ISO 27002 Internal Auditor Training Course Overview

ISO 27002 specifies a set of controls for information security, cyber security, and privacy protection, as well as implementation recommendations based on internationally recognised best practices, and it is closely related to ISO 27001. This standard has been created to assist organisations in establishing information security controls based on internationally recognised best practises and in developing guidelines for organisation-specific information security management. This training provides learners with this ISO standard, information security management system principles, and the need for ISMS. It is essential for organisations to protect their information systems from risks and threats while collecting, using, and processing data. Pursuing this training helps individuals get equipped with the necessary skills and techniques that will ultimately enhance their career opportunities and upgrade their earnings.

In this 2-day ISO 27002:2022 Internal Auditor Training course, delegates will gain knowledge of all the comprehensive concepts of ISO 27002 Internal Auditor. During this training, delegates will learn principles of information security, dangerous cybersecurity myths, and common cyber threats. They will also learn about the classification of information, labelling of information, information transfer, access control, identity management, and authentication of information. Our highly professional trainer with years of experience in teaching ISO training courses will conduct this training and help delegates gain a comprehensive understanding of this course.

Course Objectives:

  • To understand the roles and responsibilities of cybersecurity professionals
  • To gain a deep knowledge of the inventory of information and other associated assets
  • To learn about addressing information security within supplier agreements
  • To attain the knowledge of managing information security in the ICT supply chain
  • To stay in touch with responsibilities after termination or change of employment
  • To become familiar with the protection of information systems during audit testing

At the end of this course, delegates will be able to secure their data and information with the help of cybersecurity techniques and information security. They will also be able to manage audit programmes and report the audit findings by following audit principles, processes, and techniques.

Show moredowndown

  • Delegate pack consisting of course notes and exercises
  • Courseware
  • Experienced Instructor

Show moredowndown

Why choose us

Ways to take this course

Our easy to use Virtual platform allows you to sit the course from home with a live instructor. You will follow the same schedule as the classroom course, and will be able to interact with the trainer and other delegates.

Our fully interactive online training platform is compatible across all devices and can be accessed from anywhere, at any time. All our online courses come with a standard 90 days access that can be extended upon request. Our expert trainers are constantly on hand to help you with any questions which may arise.

This is our most popular style of learning. We run courses in 1200 locations, across 200 countries in one of our hand-picked training venues, providing the all important ‘human touch’ which may be missed in other learning styles.

best_trainers

Highly experienced trainers

All our trainers are highly qualified, have 10+ years of real-world experience and will provide you with an engaging learning experience.

venues

State of the art training venues

We only use the highest standard of learning facilities to make sure your experience is as comfortable and distraction-free as possible

small_classes

Small class sizes

We limit our class sizes to promote better discussion and ensuring everyone has a personalized experience

value_for_money

Great value for money

Get more bang for your buck! If you find your chosen course cheaper elsewhere, we’ll match it!

This is the same great training as our classroom learning but carried out at your own business premises. This is the perfect option for larger scale training requirements and means less time away from the office.

tailored_learning_experience

Tailored learning experience

Our courses can be adapted to meet your individual project or business requirements regardless of scope.

budget

Maximise your training budget

Cut unnecessary costs and focus your entire budget on what really matters, the training.

team_building

Team building opportunity

This gives your team a great opportunity to come together, bond, and discuss, which you may not get in a standard classroom setting.

monitor_progress

Monitor employees progress

Keep track of your employees’ progression and performance in your own workspace.

What our customers are saying

ISO 27002 Internal Auditor Training FAQs

FAQ's

ISO 27002 provides a set of controls for information security, cyber security, and privacy protection, as well as implementation guidelines based on internationally, recognised best practises.
There are no formal prerequisites for attending this 27002:2022 Internal Auditor Training course.
This course is intended for those who need to gain knowledge about securing information and cyber security.
Cybersecurity is defined as the shielding of internet-connected systems like software, hardware, and data from cyber threats.
Auditing is the process of determining and reviewing the operational, financial, and strategic goals and processes of an organisation to determine compliance with established principles.
Information Security (InfoSec) is defined as the tools and processes deployed and designed to secure sensitive information within a business from disruption, inspection, destruction, and modification.
In this ISO 27002:2022 Internal Auditor training, policies for information security, information security roles and responsibilities, segregation of duties, management responsibilities, security of assets off-premises, storage media, supporting utilities, cabling security, equipment maintenance, etc.
The Knowledge Academy is the Leading global training provider in the world for ISO 27002 Internal Auditor Training.
Please see our ISO 27002 Training courses available in the United Kingdom

Why choose us

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on ISO 27002 Training?

backBack to course information

Get a custom course package

We may not have any package deals available including this course. If you enquire or give us a call on 01344203999 and speak to our training experts, we should be able to help you with your requirements.