ISO/IEC 27002 Introduction Training Course
Why attend this course?
The Introduction to ISO/IEC 27002 training course equips you with the knowledge to understand Information Security Management Systems (ISMS) and Information Security Controls as outlined in ISO/IEC 27002.
By participating in this course, you will gain a clear understanding of the significance of ISMS and Information Security Controls, along with the benefits they bring to businesses, society, and government bodies.
Who is this course for?
- Individuals with an interest in Information Security Management and Information Security Controls
- Individuals who wish to acquire knowledge about the core processes of Information Security Management Systems and Information Security Controls
Learning objectives
- Grasp the Information Security standards and management practices utilized to implement and manage Information Security Controls
- Identify the controls required to effectively manage Information Security risks
Course Outline
Day 1: Introduction to Information Security Controls based on ISO/IEC 27002
Open Training Courses require 5+ participants.
ISO/IEC 27002 Introduction Training Course - Booking
ISO/IEC 27002 Introduction Training Course - Enquiry
ISO/IEC 27002 Introduction - Consultancy Enquiry
Testimonials (3)
The trainer was helpful..
Attila - Lifial
Course - Compliance and the Management of Compliance Risk
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Risk optimization is more clear than the other subjects
Munirah Alsahli - GOSI
Course - CGEIT – Certified in the Governance of Enterprise IT
Upcoming Courses
Related Courses
Basel III – Certified Basel Professional
21 HoursDescription:
Basel III represents a comprehensive global regulatory framework focused on bank capital adequacy, stress testing, and market liquidity risk. Initially established by the Basel Committee on Banking Supervision in 2010–11, the Accord’s implementation timeline has been extended to March 31, 2019. This framework enhances bank capital requirements by boosting liquidity reserves and reducing leverage ratios.
Unlike Basel I & II, Basel III introduces differentiated reserve requirements based on the specific types of deposits and borrowings, functioning alongside its predecessors rather than entirely replacing them. Navigating this intricate and evolving regulatory landscape can be challenging. Our course and training programs are designed to assist you in managing potential regulatory shifts and their implications for your institution. As an accredited training partner of the Basel Certification Institute, we guarantee that our materials and training quality remain current, relevant, and effective.
Objectives:
- Prepare participants for the Certified Basel Professional Examination.
- Develop practical strategies and techniques to define, measure, analyze, improve, and control operational risk within banking organizations.
Target Audience:
- Board members with risk oversight responsibilities
- Chief Risk Officers (CROs) and Heads of Risk Management
- Members of the Risk Management team
- Staff in compliance, legal, and IT support functions
- Equity and Credit Analysts
- Portfolio Managers
- Rating Agency Analysts
Overview:
- Introduction to Basel norms and amendments to the Basel Accord (III)
- Regulatory frameworks for market, credit, counterparty, and liquidity risk
- Stress testing methodologies for various risk measures, including formulation and delivery
- Projected effects of Basel III on the international banking industry, supported by practical demonstrations
- Rationale for adopting new Basel norms
- Overview of the Basel III Norms
- Objectives of The Basel III Norms
- Implementation Timeline for Basel III
Certified Fraud Examiner (CFE) Preparation
70 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at advanced-level professionals who wish to gain a comprehensive understanding of fraud examination concepts and prepare for the Certified Fraud Examiner (CFE) exam.
By the end of this training, participants will be able to:
- Gain comprehensive knowledge of fraud examination principles and the fraud examination process.
- Learn to identify, investigate, and prevent various types of financial fraud schemes.
- Understand the legal environment related to fraud, including the legal elements of fraud, relevant laws, and regulations.
- Acquire practical skills in conducting fraud investigations, including evidence collection, interviewing techniques, and data analysis.
- Learn to design and implement effective fraud prevention and deterrence programs within organizations.
- Gain confidence and knowledge to successfully pass the Certified Fraud Examiner (CFE) exam.
CGEIT – Certified in the Governance of Enterprise IT
28 HoursDescription:
This intensive four-day course (CGEIT training) serves as the premier preparation for the examination, designed to equip you with the knowledge needed to successfully pass the challenging CGEIT exam on your first attempt.
The CGEIT qualification is an internationally recognized mark of excellence in IT governance, awarded by ISACA. It is tailored for professionals responsible for managing IT governance or those with significant advisory or assurance responsibilities in this domain.
Achieving CGEIT status will broaden your professional recognition in the marketplace and enhance your influence at the executive level.
Objectives:
This seminar aims to prepare delegates for the CGEIT examination by helping them supplement their existing knowledge and understanding, thereby better positioning them to pass the exam as defined by ISACA.
Target Audience:
This training course is intended for IT and business professionals who possess substantial IT governance experience and are undertaking the CGEIT exam.
Compliance for Payment Services in Japan
7 HoursThis instructor-led, live training in Norway (online or onsite) is designed for compliance professionals in the payment services sector who aim to design, implement, and enforce a robust compliance program within their organizations.
Upon completion of this training, participants will be equipped to:
- Grasp the regulatory requirements imposed by government authorities on payment service providers.
- Develop internal policies and procedures that align with governmental regulations.
- Establish a compliance program that adheres to applicable laws.
- Ensure that all corporate processes and procedures remain consistent with the compliance framework.
- Protect the business's reputation and shield it from legal liabilities.
Cybersecurity Governance, Risk & Compliance (GRC)
14 HoursThis instructor-led, live training in Norway (online or onsite) targets intermediate-level cybersecurity professionals who wish to enhance their understanding of GRC frameworks and apply them to secure and compliant business operations.
By the end of this training, participants will be able to:
- Understand the key components of cybersecurity governance, risk, and compliance.
- Conduct risk assessments and develop risk mitigation strategies.
- Implement compliance measures and manage regulatory requirements.
- Develop and enforce security policies and procedures.
Accessibility by Design (Compliance with EU ACT)
21 HoursThis course offers a comprehensive introduction to the recently enacted Accessibility Law, providing developers with the practical expertise needed to design, develop, and sustain fully accessible applications. Beginning with an analysis of the law's significance and broader implications, the curriculum rapidly transitions into practical coding techniques, essential tools, and testing methodologies to guarantee compliance and inclusivity for users with disabilities.
GDPR - Certified Data Protection Officer
35 HoursThe PECB Certified Data Protection Officer training programme empowers you with the essential knowledge, skills, and competence required to effectively assume the role of a Data Protection Officer (DPO) within an organisation implementing GDPR compliance measures.
Why should you attend?
As the value of data protection continues to rise, organisations face growing demands to safeguard this information. Non-compliance with data protection regulations not only infringes upon the fundamental rights and freedoms of individuals but also exposes organisations to significant risks that can damage their credibility, reputation, and financial standing. It is here that the expertise of a Data Protection Officer becomes crucial.
The PECB Certified Data Protection Officer training course provides the knowledge and skills needed to serve as a DPO, helping organisations meet the requirements of the General Data Protection Regulation (GDPR).
Through practical exercises, you will master the DPO role, gaining the competence to advise, monitor GDPR compliance, and liaise effectively with supervisory authorities.
Upon completing the training, you are eligible to sit for the examination. Passing the exam allows you to apply for the “PECB Certified Data Protection Officer” credential. This internationally recognised certificate demonstrates your professional capability and practical knowledge in advising controllers and processors on fulfilling their GDPR obligations.
Who should attend?
- Managers or consultants aiming to prepare and support an organisation in planning, implementing, and maintaining a GDPR-based compliance programme.
- Existing DPOs and individuals responsible for maintaining conformance with GDPR requirements.
- Members of information security, incident management, and business continuity teams.
- Technical and compliance professionals preparing for a Data Protection Officer role.
- Expert advisors involved in securing personal data.
Learning objectives
- Understand GDPR concepts and interpret its requirements.
- Grasp the relationship between the General Data Protection Regulation and other regulatory frameworks and applicable standards, such as ISO/IEC 27701 and ISO/IEC 29134.
- Acquire the competence to perform the daily tasks and responsibilities of a Data Protection Officer within an organisation.
- Develop the ability to inform, advise, and monitor GDPR compliance, as well as cooperate with supervisory authorities.
Educational approach
- The training combines theoretical knowledge with best practices for exercising the DPO role.
- Lectures are reinforced with practical exercises based on case studies, including role-playing and discussions.
- Participants are encouraged to interact and engage actively in discussions and exercises.
- Practice exercises and quizzes mirror the format of the certification exam.
General Information
- Participants receive comprehensive training materials containing over 450 pages of explanatory content and practical examples.
- An Attendance Record awarding 31 CPD (Continuing Professional Development) credits is issued to those who complete the training.
Governance, Risk Management & Compliance (GRC) Fundamentals
21 HoursCourse objective:
Equip participants with a solid grasp of GRC processes and capabilities, enabling them to effectively integrate governance, performance management, risk management, internal control, and compliance activities.
Course summary:
- Essential GRC terminology and definitions
- Core principles of GRC
- Key components, best practices, and operational activities
- How GRC intersects with other professional disciplines
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
PECB ISO/IEC 27001 Lead Auditor
35 HoursISO/IEC 27001 Lead Auditor
The ISO/IEC 27001 Lead Auditor training equips you with the essential expertise to conduct Information Security Management System (ISMS) audits by applying internationally recognized audit principles, procedures, and techniques.
Why should you attend?
Through this training course, you will gain the knowledge and skills required to plan and execute both internal and external audits in compliance with ISO 19011 and the ISO/IEC 17021-1 certification process.
Through practical exercises, you will master audit techniques and develop the competence to manage an audit program, lead an audit team, communicate effectively with clients, and resolve conflicts.
Once you have acquired the necessary expertise to perform this audit, you can take the exam and apply for the “PECB Certified ISO/IEC 27001 Lead Auditor” credential. By holding a PECB Lead Auditor Certificate, you demonstrate that you possess the capabilities and competencies to audit organizations according to best practices.
Who should attend?
- Auditors looking to perform and lead Information Security Management System (ISMS) certification audits
- Managers or consultants aiming to master the Information Security Management System audit process
- Professionals responsible for maintaining conformance with Information Security Management System requirements
- Technical experts preparing for an Information Security Management System audit
- Expert advisors in Information Security Management
Learning objectives
- Understand the operations of an Information Security Management System based on ISO/IEC 27001
- Recognize the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
- Understand the auditor’s role to plan, lead, and follow up on a management system audit in accordance with ISO 19011
- Learn how to lead an audit and an audit team
- Learn how to interpret the requirements of ISO/IEC 27001 within the context of an ISMS audit
- Acquire the competencies of an auditor to plan an audit, lead an audit, draft reports, and follow up on an audit in compliance with ISO 19011
Educational approach
- This training combines theoretical knowledge with best practices used in ISMS audits
- Lecture sessions are supported by examples based on case studies
- Practical exercises are based on a case study involving role-playing and discussions
- Practice tests mirror the format of the Certification Exam
ISO 27002 Lead Manager
35 HoursThe ISO/IEC 27002 Lead Manager training equips you with the essential expertise and knowledge to help an organization implement and manage Information Security controls as outlined in ISO/IEC 27002.
Upon completion of this course, you are eligible to sit for the exam and apply for the "PECB Certified ISO/IEC 27002 Lead Manager" credential. This PECB Lead Manager Certification demonstrates that you have mastered the principles and techniques required for implementing and managing Information Security controls in accordance with ISO/IEC 27002.
Who should attend?
- Managers or consultants aiming to implement an Information Security Management System (ISMS) based on ISO/IEC 27001 and ISO/IEC 27002
- Project managers or consultants seeking to master the process of implementing an Information Security Management System
- Individuals responsible for information security, compliance, risk, and governance within an organization
- Members of information security teams
- Expert advisors in information technology
- Information Security officers
- Privacy officers
- IT professionals
- CTOs, CIOs, and CISOs
Learning objectives
- Master the implementation of Information Security controls by adhering to the framework and principles of ISO/IEC 27002
- Gain a comprehensive understanding of the concepts, approaches, standards, methods, and techniques necessary for the effective implementation and management of Information Security controls
- Comprehend the interrelationships between the components of Information Security controls, including responsibility, strategy, acquisition, performance, conformance, and human behavior
- Understand the significance of information security to the organization's overall strategy
- Master the implementation of information security management processes
- Master the formulation and implementation of security requirements and objectives
Educational approach
- This training combines both theoretical knowledge and practical application
- Lecture sessions supplemented with examples from real-world cases
- Practical exercises based on case studies
- Review exercises designed to assist with exam preparation
- Practice tests that mirror the format of the certification exam
General Information
- Certification fees are included in the exam price
- Training material, comprising over 500 pages of information and practical examples, will be distributed to participants
- Participants will receive a certificate of participation awarding 31 CPD (Continuing Professional Development) credits
- In the event of an exam failure, you may retake the exam free of charge within 12 months
ISO 9001 and ISO 27001 – Interpretation and Internal Auditor
21 HoursISO 9001 and ISO 27001 stand as globally acknowledged benchmarks for quality management and information security management systems, respectively.
This instructor-led live training, available either online or onsite, is designed for intermediate-level professionals looking to master the interpretation of ISO 9001 and ISO 27001 standards and execute internal audits with confidence.
Upon completing this training, participants will be equipped to:
- Comprehend the core principles and mandatory requirements of both ISO 9001 and ISO 27001.
- Apply the interpretation of clauses and controls to real-world business contexts.
- Plan and carry out internal audits that align with ISO standards.
- Detect nonconformities and propose appropriate corrective measures.
Course Format
- Engaging lectures combined with group discussions.
- Simulated auditing exercises and in-depth case studies.
- Practical analysis of various quality and security scenarios.
Customization Options
- To arrange a tailored training session for this course, please reach out to us.
Compliance and the Management of Compliance Risk
21 HoursAudience
This course is designed for all staff members who need a practical grasp of Compliance and effective Risk Management.
Course Format
The training employs a blended methodology comprising:
- Facilitated discussions
- Slide-based presentations
- Case studies
- Real-world examples
Learning Objectives
Upon completion of the course, participants will be able to:
Gain a robust understanding of the fundamental aspects of Compliance, alongside national and international initiatives focused on managing associated risks.
Articulate how organizations and their teams can establish an effective Compliance Risk Management Framework.
Outline the responsibilities of the Compliance Officer and the Money Laundering Reporting Officer, and understand how these roles are integrated within a business structure.
Identify critical risk areas within Financial Crime, particularly concerning international operations, offshore centres, and high-net-worth clients.
Open Source Software (OSS) Management
14 HoursOpen Source Software (OSS) Management involves overseeing the entire lifecycle of open-source components within an organization to ensure their secure, compliant, and efficient utilization.
This instructor-led training, available online or onsite, targets intermediate-level IT professionals seeking to implement best practices for managing open-source software in enterprise and government settings.
Upon completion of this training, participants will be equipped to:
- Develop effective OSS policies and governance frameworks.
- Leverage SBOM and SCA tools to identify, track, and manage open-source dependencies.
- Reduce risks related to licensing and security vulnerabilities.
- Streamline the adoption of OSS while maximizing innovation and cost efficiencies.
Course Format
- Interactive lectures and discussions.
- Case studies and scenario-based exercises.
- Hands-on demonstrations with OSS management tools.
Customization Options
- This course can be tailored to align with your organization's specific OSS policies and toolchains. Please contact us to arrange customization.
PCI-DSS Practitioner
14 HoursThis instructor-led, live Payment Card Industry Professional training in Norway (online or onsite) provides an individual qualification for industry practitioners who wish to demonstrate their professional expertise and understanding of the PCI Data Security Standard (PCI DSS).
By the end of this training, participants will be able to:
- Understand the payment process and the PCI standards designed to protect it.
- Understand the roles and responsibilities for entities involved in the payment industry.
- Have deep insight into, and understanding of, the 12 PCI DSS requirements.
- Demonstrate knowledge of PCI DSS and how it applies to organizations that are involved in the transaction process.