ISO 27001 Lead Auditor Course & ISO 27001 Implementation Course
About the training:
Singular Security is now offering the ISO 27001 Lead Auditor course and the ISO 27001 Implementation course. These courses are developed for individuals to acquire the essential knowledge to provide the necessary assistance to other individuals and organizations that desire to conform to the standards.
ISO 27001 Lead Auditor Course
Based on the ISO 19011:2002 standard, "Guidelines relative to the audit of quality management systems and/or of environmental management systems" the ISO 27001 Lead Auditor course is conceived specifically for those who wish to perform external or internal audits according to the criteria of the ISO 27001:2005 standard. This training is aligned with the Generally Accepted Audit Principles (GAAP), the Practices of Internal Audit (Institute of Internal Auditors-IIA) as well as with the Practices of the International Federation of Accountants (IFAC).
ISO 27001 Implementation Course
Based on the ISO 27003 standard, the ISO 27001 Implementation course "Security Techniques -Information Technology (in development)" is envisioned specifically for those who wish to understand the ISMS implementation steps according to the criteria of the ISO 27001:2005 standard. The ISO 27001 Implementation course provides training aligned with best practices with regards to project management according to the Project Management Body of Knowledge (PMBOK) of the Project Management Institute (PMI) as well as with the ISO 10006 standard, "Guidelines for quality management in project".
Click ENROLL to sign up for the course. To obtain course objectives and prerequisites, schedules, price methods and locations, send an email to email@example.com or call Singular Security Sales at (888) 669-1618
Students participating in the courses should expect to review the ISO 27001:2005 prerequisites, understand the relations between ISO 27001:2005 and ISO/IEC 17799:2005, gain knowledge about security related threats and vulnerabilities, security controls and counter-measures, identification of the control use for ISMS, and much more...
Participants are expected to have initial knowledge of ISO/IEC 17799:2005 and ISO 27001:2005 standards, and general knowledge of Information Security.
As well, since the course is given during the day, from 8am to 5pm, it is necessary for the student to work and prepare during the evening. Attendance at the training and workshops is obligatory in order to obtain an attestation or certification following the training.