Register Online Now
IMPORTANT: Please kindly take note that we do not take cash, our banking details and references are provided on our website. Thank you kindly for choosing us as your preferred training provider of choice.

ISO/IEC 27001:2013 Foundation & Practitioner

ISO/IEC 27001:2013 Foundation & Practitioner
Course Description Overview

Course Specifications

The use of these materials assumes delivery by a properly accredited trainer through an appropriately certified training organization.  

Course Number:


Course Length:

5 days

Course Description Overview:

ISO/IEC 27001:2013 is an international standard that provides the basis for effective management of confidential and sensitive information, and for the application of information security controls. It enables organisations to demonstrate excellence and prove best practice in Information Security management. Conformance with the standard requires commitment to continually improve control of confidential and sensitive information, providing reassurance to sponsors, shareholders and customers alike.


This five-day course includes the foundation and practitioner training for this recently revised version of 2013. Delivered together as one seamless training event, this course provides both an overview of the standard and a deeper understanding about how to actually apply the standard for implementation, management and improvement. ISO/IEC 27001:2013 builds upon established foundations as the most widely recognised international standard specifically aimed at information security management. The adoption of an Information Security Management System (ISMS) is a strategic decision driving the coordination of operational security controls across all of the organisations electronic and physical information resources.


ISO/IEC 27001:2013 is the formal specification and defines the requirements for an ISMS, which includes:

· ISMS planning, support and operational requirements

· Leadership responsibilities

· Performance evaluation of the ISMS

· Internal ISMS audits

· ISMS improvement

· Control objectives and controls


Course Objectives:

This course will ensure delegates understand the value to the business of the ISO/IEC 27001:2013 standard. There is an in-depth review of the key concepts and activities needed to properly plan for the implementation, management and improvement of an Information Security Management System. The course also ensures a thorough understanding of associated activities, roles, responsibilities, challenges, risks and critical success factors:

· Best practice in Information Security Management and how to apply this within your organisation

· Scope and purpose of the ISO/IEC 27001 standard and how it can be implemented within an organisation

· Understand the key terms and definitions used in ISO/IEC 27001 to effectively roll out the principles

· Leverage the fundamental ISO/IEC 27001 requirements for an ISMS to address the need to continually improve

· Recognise the purpose of internal audits and external certification audits, their operation and the associated terminology

· Apply your knowledge to business scenarios to enhance control of information.

· Establish a structured approach to information security management to secure information assets

· Improve information security through adoption of best practices

· Understand how ISO/IEC 27001 provides a competitive differentiator when tendering for business contracts

· Build reputation with the secure management of confidential and sensitive information

· Demonstrate compliance with an internationally recognised standard and the ability to satisfy customer security requirements


Target Student:

Although there is no mandatory requirement, ideally candidates should have at least two years’ professional experience working within IT Service or Security Management. The ISO/IEC 27001:2013 Foundation and Practitioner would suit candidates working in the following professions or areas:

· Both IT and business people will benefit from this course

· Those requiring a basic understanding of the Information Security

· IT professionals or others working within an organisation that is aligned or planning to be aligned with the ISO/IEC 27000 suite of standards

· Anyone involved in or contributing to an on-going service improvement programme

· The Information Security Foundation is open to all individuals who may have an interest in the subject


The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.



This course leads to Foundation certification in the initial stages of training. Assuming candidates pass their Foundation examination, there is no prerequisite to attending this course. To complete the latter stage of training and sit the Practitioner examination the Foundation certification is required. It is strongly recommended that candidates should have a good understanding of security management.

Course-specific Technical Requirements Hardware:


Course-specific Technical Requirements Software:
Course Content:

Module 1 – Course overview and introduction


Module 2 – Overview and vocabulary


Module 3 – ISO/IEC 27001 requirements


Module 4 – Information risk management


Module 5 – ISO/IEC 27001 controls


Module 6 – ISMS implementation


Module 7 – ISMS audit and certification

Register Now
Certification reference (where applicable)