close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

Course Information

ISO 27002 Lead Auditor Training Course Outline

Module 1: Introduction to ISO 27002

  • Scope
  • Terms and Definitions
  • Abbreviated Terms

Module 2: Information Security

  • What is Information Security?
  • CIA
  • Principles of Information Security
  • Need for Information Security
  • Threats
  • Active and Passive Attacks

Module 3: Cybersecurity

  • What is Cybersecurity?
  • Cybersecurity Domains
  • Dangerous Cybersecurity Myths
  • Common Cyber Threats
  • Key Cybersecurity Technologies and Best Practices
  • Zero Trust Security Strategy
  • Difference Between Cybersecurity and Information Security 
  • Roles and Responsibilities of Cybersecurity Professionals

Module 4: Information Security Management System (ISMS)

  • Introduction to ISMS
  • Need
  • What Does an ISMS Do?
  • Benefits

Module 5: Themes and Controls

  • Control Type
  • Information Security Properties
  • Cybersecurity Concepts
  • Operational Capabilities
  • Security Domains
  • Control Layout

Module 6: Organisational Controls

  • Policies for Information Security
  • Information Security Roles and Responsibilities
  • Segregation of Duties
  • Management Responsibilities
  • Contact with
    • Authorities
    • Special Interest Groups
  • Threat Intelligence
  • Information Security in Project Management
  • Inventory of Information and Other Associated Assets
  • Acceptable Use of Information and Other Associated Assets
  • Return of Assets
  • Classification of Information
  • Labelling of Information
  • Information Transfer
  • Access Control
  • Identity Management
  • Authentication Information
  • Access Rights
  • Information Security in Supplier Relationships
  • Addressing Information Security within Supplier Agreements
  • Managing Information Security in the ICT Supply Chain
  • Monitoring, Review, and Change Management of Supplier Services
  • Information Security for Use of Cloud Services
  • Information Security Incident Management Planning and Preparation
  • Assessment and Decision on Information Security Events
  • Response to Information Security Incidents
  • Learning from Information Security Incidents
  • Collection of Evidence
  • Information Security During Disruption
  • ICT Readiness for Business Continuity
  • Legal, Statutory, Regulatory, and Contractual Requirements
  • Intellectual Property Rights
  • Protection of Records
  • Privacy and Protection of PII
  • Independent Review of Information Security
  • Compliance with Policies, Rules, and Standards for Information Security
  • Documented Operating Procedures

Module 7: People Controls

  • Screening
  • Terms and Conditions of Employment.
  • Information Security Awareness, Education, and Training
  • Disciplinary Process
  • Responsibilities After Termination or Change of Employment
  • Confidentiality or Non-Disclosure Agreements
  • Remote Working
  • Information Security Event Reporting

Module 8: Physical Controls

  • Physical Security Perimeters
  • Physical Entry
  • Securing Offices, Rooms, and Facilities
  • Physical Security Monitoring
  • Protecting Against Physical and Environmental Threats
  • Working in Secure Areas
  • Clear Desk and Clear Screen
  • Equipment Siting and Protection
  • Security of Assets Off-Premises
  • Storage Media
  • Supporting Utilities
  • Cabling Security
  • Equipment Maintenance
  • Secure Disposal or Re-Use of Equipment

Module 9: Technological Controls

  • User Endpoint Devices
  • Privileged Access Rights
  • Information Access Restriction
  • Access to Source Code
  • Secure Authentication
  • Capacity Management
  • Protection Against Malware
  • Management of Technical Vulnerabilities
  • Configuration Management
  • Information Deletion
  • Data
    • Masking
    • Leakage Prevention
  • Information Backup
  • Redundancy of Information Processing Facilities
  • Logging
  • Monitoring Activities
  • Clock Synchronisation
  • Use of Privileged Utility Programs
  • Installation of Software on Operational Systems
  • Networks Security
  • Security of Network Services
  • Segregation of Networks
  • Web Filtering
  • Use of Cryptography
  • Secure Development Life Cycle
  • Application Security Requirements
  • Secure System Architecture and Engineering Principles
  • Secure Coding
  • Security Testing in Development and Acceptance
  • Outsourced Development
  • Separation of Development, Test, and Production Environments
  • Change Management
  • Test Information
  • Protection of Information Systems During Audit Testing

Module 10: Audit Plan and Process

  • Audit Plan
  • Preparing for an Audit
  • Audit Process

Module 11: Internal Auditor

  • Understanding an Internal Auditor (IA)
  • Internal Auditing Process
  • Requirements for Internal Auditors
  • Internal Auditor Vs External Auditor
  • Benefits of an Internal Auditor (IA)

Module 12: ISMS Audit

  • Introduction
  • Principles
  • Audit Management
  • Auditing Process
  • Competence and Evaluation of Auditors

Module 13: Cybersecurity Auditing

  • What is Cybersecurity Audit?
  • How it helps Organisation?
  • Cybersecurity and the Role of Internal Audit

Module 14: Information Security Audit

  • What is IT Security Audit?
  • Benefits
  • Types
  • Importance
  • How to Conduct an IT Security Audit?
  • Roles and Responsibilities of Information Security Auditor

Module 15: Information Security in Project Management

  • Project Management
  • Attributes Table
  • Purpose of Control 5.8
  • Meet Requirements
  • ISO 27002:2013 Vs ISO 27002:2022

Module 16: Components of Information Security

  • Confidentiality
  • Integrity
  • Availability
  • Authenticity
  • Non-Repudiation

Module 17: Information Security Risk Management (ISRM)

  • Introduction
  • Stages
  • Ownership

Module 18: Control and Compliance

  • Security Controls
  • Importance of Compliance
  • Legal Requirements for Information Security
  • Information Technology Compliance 
  • Information Security Compliance Standards

Module 19: Management Responsibilities

  • Control 5.4 Management Responsibilities
  • What is an Information Security Policy?
  • Attributes Table
  • Purpose of Control 5.4
  • Implementation Guidelines

Module 20: Competence and Evaluation of Auditors

  • Auditor Competence
  • Demonstration of Auditor Competence

Module 21: Lead Auditor

  • What is Lead Auditor?
  • Roles
  • Planning Phase
  • Audit Phase
  • Audit Report

Module 22: Conformity Assessment

  • What is Conformity Assessment?
  • Need of Conformity Assessment
  • Conformity Assessment and Standards
  • Types of Conformity Assessment

Show moredowndown

Prerequisites

There are no formal prerequisites for attending this ISO 27002 Lead Auditor Training course.

Audience

This training is designed for everyone who wants to gain the skills and knowledge of planning and conducting external and internal audits in compliance with ISO/IEC 17021 and ISO 19011 certifications. However, it will much more beneficial for:

  • Auditors
  • Managers
  • Technical Experts
  • Expert Advisors

ISO 27002 Lead Auditor Training Course Overview

ISO 27002 gives a reference set of information security, cyber security, and privacy protection controls that includes implementation guidance on the basis of internationally recognised best practices. This standard is curated to help organisations establish information security controls based on internationally recognised best practises and create guidelines for organisation-specific information security management. Studying this training equips learners with this ISO standard, information security management system principles, and evaluates ISMS conformity. It is essential for organisations to secure their information systems from risks and threats while collecting, using, and processing data. Attending this training will enable individuals to plan and manage audit programmes as well as auditing guidelines concerning ISO 19011.

This 5-day ISO 27002:2022 Lead Auditor Training course is designed to provide delegates with a thorough understanding of auditing techniques and how to evaluate the auditing process. During this training, delegates will learn about the fundamental concepts of information security management systems and ISO 27002. They will also learn about various themes and controls, including organisational, physical, and technical controls. Our highly skilled and knowledgeable instructor with years of experience will conduct this course and give delegates deep knowledge of lead auditor responsibilities and techniques.

Course Objectives:

  • To attain knowledge of information systems and their principles
  • To monitor, review, and change management of supplier services
  • To plan and prepare for information security incident management
  • To learn about the active and passive attacks on information systems
  • To understand the roles and responsibilities of cybersecurity professionals
  • To get in touch with conformity assessment that determines product requirements

At the end of this training, delegates will be able to manage audit programmes and report the audit findings by applying audit techniques, principles, and processes. They will also be able to secure information systems by applying cryptographic techniques of encryption and decryption.

Show moredowndown

  • Delegate pack consisting of course notes and exercises
  • Courseware
  • Experienced Instructor

Show moredowndown

Why choose us

Ways to take this course

Our easy to use Virtual platform allows you to sit the course from home with a live instructor. You will follow the same schedule as the classroom course, and will be able to interact with the trainer and other delegates.

Our fully interactive online training platform is compatible across all devices and can be accessed from anywhere, at any time. All our online courses come with a standard 90 days access that can be extended upon request. Our expert trainers are constantly on hand to help you with any questions which may arise.

What our customers are saying

ISO 27002 Lead Auditor Training FAQs

FAQ's

ISO 27002 gives a reference set of information security, cyber security, and privacy protection controls that includes implementation guidance on the basis of internationally recognised best practices.
There are no formal prerequisites for attending this ISO 27002 Lead Auditor Training course.
This training is designed for everyone who wants to gain the skills and knowledge of planning and conducting external and internal audits in compliance with ISO/IEC 17021 and ISO 19011 certifications.
Auditing is the process of determining and reviewing an organisation's operational, financial, and strategic objectives and processes in order to determine conformity with stated principles.
ISO lead auditor is responsible for managing a team of internal auditors, appointing duties and roles to internal audit team members, auditing organisations, and identifying organisational processes.
ISO 27002 gives best practise guidance on applying controls, including organisational, physical, people, and technological controls, whereas ISO 27001 is the specification for ISMS, containing risk management process requirements.
In this ISO 27002:2022 Lead Auditor Training course, you will learn about information security, cybersecurity, themes and controls, audit plan and process, ISMS audit, cybersecurity auditing, components of information security, management responsibilities, and other essential topics.
The price for ISO 27002 Lead Auditor Training certification in the United States starts from $2295
The Knowledge Academy is the Leading global training provider for ISO 27002 Lead Auditor Training.
Please see our ISO 27002 Training courses available in the United States

Why choose us

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on ISO 27002 Training?

backBack to course information

Get a custom course package

We may not have any package deals available including this course. If you enquire or give us a call on +1 7204454674 and speak to our training experts, we should be able to help you with your requirements.