If you want to take a training course at your own pace and in a location of your choosing, you can do so through self-study, where all you need is access to the training course materials.
One of the primary benefits of our self-study training course delivery format is that you can control and direct your own learning. This format is appropriate for participants who have extensive knowledge of the subject and do not require assistance with lecturing.
Irrespective of the format of the training course, all participants will have digital access to the course material via KATE. You can take the exam from anywhere in the world after completing the training. Those who pass the exam will then be invited to apply for certification.
Fees
COURSE OUTLINES
- Training course objectives and structure
- Standards and regulatory frameworks
- Certification process
- Fundamental concepts and principles of information security
- Information security management system (ISMS)
- Fundamental audit concepts and principles
- The impact of trends and technology in auditing
- Evidence-based auditing
- Risk-based auditing
- Initiation of the audit process
- Stage 1 audit
- Preparing for stage 2 audit
- Stage 2 audit
- Communication during the audit
- Audit procedures
- Creating audit test plans
- Drafting audit findings and nonconformity reports
- Audit documentation and quality review
- Closing of the audit
- Evaluation of action plans by the auditor
- Beyond the initial audit
- Managing an internal audit program
- Closing of the training course
COURSE DETAILS
- Auditors seeking to perform and lead Information Security Management System (ISMS) certification audits.
- Managers or consultants seeking to master an Information Security Management System audit process.
- Individuals responsible for maintaining conformance with Information Security Management System requirements.
- Technical experts seeking to prepare for an Information Security Management System audit.
- Expert advisors in Information Security Management.
- Explain the fundamental concepts and principles of an information security management system (ISMS) based on ISO/IEC 27001.
- Interpret the ISO/IEC 27001 requirements for an ISMS from the perspective of an auditor.
- Evaluate the ISMS conformity to ISO/IEC 27001 requirements, in accordance with the fundamental audit concepts and principles.
- Plan, conduct, and close an ISO/IEC 27001 compliance audit, in accordance with ISO/IEC 17021-1 requirements, ISO 19011 guidelines, and other best practices of auditing.
- Manage an ISO/IEC 27001 audit program.
- This training is based on both theory and best practices used in ISMS audits.
- Lecture sessions are illustrated with examples based on case studies.
- Practical exercises are based on a case study which includes role playing and discussions.
- Practice tests are similar to the Certification Exam.