C)ISMS-LI - Certified Information Security Management Systems-Lead Implementer
Home Courses Categories Information Security Management

C)ISMS-LI – Certified Information Security Management Systems-Lead Implementer

Duration: 3 days
Format: Instructor-led classroom, Live-virtual Training
Prerequisites: A basic familiarity with information systems and an interest in implementation.
CPEs: 24 Hours
Certification Exams: C)ISMS-LA: Information Security Management Systems-Lead Auditor
Who Should Attend: Internal Auditor, IT Auditor, IT Consultant, Chief Information Officer, Security Consultant
Training Schedule: November 19-23, 2017

The Certified Information Security Management Systems—Lead Implementer certification course prepares students to help any organization through the process of implementing an information security management systems (“ISMS”) that is compliant with ISO/IEC 27001:2013 standard. ISO/IEC 27001 was developed to set a higher standard for information security as a result of increased cyber security risk. Students will not only implement the ISO/IEC 27001 standard but also help organizations set up controls, processes, and procedures for using a ISMS that will facilitate enhanced information security.

The C)ISMS-LI is perfect for anyone looking to implement the ISO/IEC 27001 standard or to certify their ISO/IEC 27001 implementation expertise.

1. Introduction

Agenda
Housekeeping
Exercise 1
Agenda
Learning objectives
Implementation objectives
Course structure
Examination
Certification

2: History and Development of the ISMS

Agenda
The ISMS
Integration
Suitable for
Organizations of all Sizes
Assessment
The Evolution of ISO27001, 2
Recent Updates
ISO27002
Control Hierarchy
ISO27001
The ISMS
Constant Change and Improvement
Adoption of the ISMS
Exclusions

3: Information Security Principles

Agenda
Key Terms
Information
Information Security Definition
Information Security
Context of the Organization
Leadership
Planning
Support
Operation
Performance evaluation
Improvement

4: Risk Management

Agenda
Risk
Risk cont.
Risk Management
Define a Risk
Assessment Approach
Identify Risks
What Is the Value of an Asset?
What Is a Threat Source/Agent?
What Is a Threat?
What Is a Vulnerability?
Assess and Evaluate Risk
Risk Definitions
Risk Acceptance
Risk Treatment
Definition of Controls
Examples of Types of Controls
Control Usage
Controls (from Annex A)
Comparing Cost and Benefit
Cost of a Countermeasure
Appropriate Controls
Statement of Applicability

5: Implementing an ISMS

Agenda
Clause 4 Context
of the Organization
Leadership
Policy
Roles,
Responsibilities and Authorities
Planning
Risk Assessment
Support
Operation
Performance Evaluation
Performance
Evaluation Continued
Management Review
Improvement

6: Auditing an ISMS

Agenda
Audit
Audit Standards
Nonconformity Report Format
Major nonconformity
Major Nonconformity Examples
Minor Nonconformity
Minor nonconformity examples
Agenda
Summary
The Examination

Upon completion, Certified Information Security Management Systems—Lead Implementer students will

  • Acquire the necessary knowledge to manage an ISMS implementation
  • Be ready to perform an ISO/IEC 27001 ISMS implementation
  • Be ready to sit for the C)ISMS-LI exam.

The Certified Information Security Management Systems-Lead Implementer exam is taken on-line through Mile2’s Assessment and Certification System Mile2’s Assessment and Certification System (MACS), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $500 USD and must be purchased from the store on Mile2.com.