SlideShare a Scribd company logo
1 of 16
Download to read offline
ISO
27001:2022
LEAD AUDITOR
TRAINING & CERTIFICATION
Any management system's success depends on effective audit-
ing. As a result, it involves a great deal of responsibility and chal-
lenges. InfosecTrainโ€™s ISO 27001:2022 Lead Auditor training and
certi๏ฌcation course is a ๏ฌve-day intensive course to inculcate in
participants the knowledge to perform an Information Security
Management System (ISMS) audit by employing recommended
audit fundamentals, principals, procedures, and methodologies.
www.infosectrain.com | sales@infosectrain.com
ISO 27001:2022
Lead Auditor
> 40 hrs of instructor-led training
> Authorized Training Partner
> Practical approach for ISO 27001 Audit
> Mock Test and exam guidance session
> Certi๏ฌed & Experienced Trainers
ISO 27001:2022 LEAD AUDITOR
TRAINING INCLUDES
ABOUT
Who Attend?
Internal Auditors
Auditors wanting to perform and lead ISMS certification audits
Project Managers or Consultants wanting to master the ISMS audit process
CxO and Senior Managers responsible for the IT governance of an enterprise and the
management of its risks
Members of an information security team
Expert advisors in information technology
Expert advisors in information security
Technical experts wanting to prepare for an information security audit function
Pre-Requisites
Certified ISO/IEC 27001 Foundation Certification or basic knowledge of ISO/IEC 27001 is
recommended.
Exam Information
We provide Exams with PECB, & IGC; for more detail, connect with our experts.
www.infosectrain.com | sales@infosectrain.com
www.infosectrain.com | sales@infosectrain.com
MEET OUR
INSTRUCTOR
INSTRUCTOR
RAJESH SANDHEER
CISA | ISO 27001 LA | GDPR CDPO |
CDCS | CDCP
INSTRUCTOR
CHANDER S
ISO 27001 | ISO 22301 | ISO 27701 |
ISO 9001 | ISO | GDPR | ISACA |
LEAN 6-Sigma
www.infosectrain.com | sales@infosectrain.com
What our
Client Says About Us?
I experienced such an amazing and interacted training
session. Thanks to the respective trainer who shared us
the details knowledge of the standard as well as his
practical experiences. I have gain a great amount of
knowledge and it has sharpen my perspective as an
auditor. I can't wait to make use of it in my career and
provide a better audit quality to my organization.
SENG SEYHA
Thank you for organizing an amazing training
session.Trainer clearly explained the concepts. It was very
interactive session with team and lot of group activities.
CHRISY ANNIE PUNNEN
The training was very informative and a good
learning experience. Learned and enjoyed it a lot.
JUNO DAVID ANTONY
Introduction to the Information Security Management
System (ISMS) and ISO/IEC 27001
Section 1: Training course objectives and structure
> General information
> Learning objectives
> Educational approach
> Examination and certification
www.infosectrain.com | sales@infosectrain.com
Course Content
Section 2: Standards and regulatory frameworks
> What is ISO?
> The ISO/IEC 27000 family of standards
> Advantages of ISO/IEC 27001
Section 3: Certification process
> Certification process
> Certification scheme
> Accreditation bodies
> Certification bodies
Section 4: Fundamental concepts and principles of
information security
> Information and asset
> Information security
> Confidentiality, integrity, and availability
> Vulnerability, threat, and impact
> Information security risk
> Security controls and control objectives
> Classification of security controls
www.infosectrain.com | sales@infosectrain.com
Section 5: Information security management system
(ISMS)
Audit principles, preparation, and initiation of an audit
> Definition of a management system
> Definition of ISMS
> Process approach
> ISMS implementation
> Overview - Clauses 4 to 10
> Overview - Annex A
> Statement of Applicability
Section 6: Fundamental audit concepts and principles
> Audit standards
> What is an audit?
> Types of audits
> Involved parties
> Involved parties
> Audit objectives and criteria
> Combined audit
> Principles of auditing
> Competence and evaluation of auditors
Section 7: The impact of trends and technology in
auditing
> Big data
> The three Vโ€™s of big data
> The use of big data in audits
> Artificial intelligence
> Machine learning
> Cloud computing
> Auditing outsourced operations
Section 8: Evidence-based auditing
> Audit evidence
> Types of audit evidence
> Quality and reliability of audit evidence
Section 9: Risk-based auditing
> Audit approach based on risk
> Materiality and audit planning
> Reasonable assurance
www.infosectrain.com | sales@infosectrain.com
www.infosectrain.com | sales@infosectrain.com
Section 10: Initiation of the audit process
> The audit offer
> The audit team leader
> The audit team
> Audit feasibility
> Audit acceptance
> Establishing contact with the auditee
> The audit schedule
Section 11: Stage 1 audit
On-site audit activities
> Objectives of the stage 1 audit
> Pre on-site activities
> Preparing for on-site activities
> Conducting on-site activities
> Documenting the outputs of stage 1 audit
Section 12: Preparing for stage 2 audit
> Setting the audit objectives
> Planning the audit
> Assigning work to the audit team
> Preparing audit test plans
> Preparing documented information for the audit
Section 13: Stage 2 audit
> Conducting the opening meeting
> Collecting information
> Conducting audit tests
> Determining audit findings and nonconformity reports
> Performing a quality review
Section 14: Communication during the audit
> Behavior during on-site visits
> Communication during the audit
> Audit team meetings
> Guides and observers
> Conflict management
> Cultural aspects
> Communication with the top management
Section 15: Audit procedures
> Overview of the audit process
> Evidence collection and analysis procedures
> Interview
> Documented information review
> Observation
> Analysis
> Sampling
> Technical verification
www.infosectrain.com | sales@infosectrain.com
www.infosectrain.com | sales@infosectrain.com
Section 17: Drafting audit findings and nonconformity
reports
> Audit findings
> Types of possible audit findings
> Documenting the audit findings
> Drafting a nonconformity report
> The principle of the benefit of the doubt
Section 16: Creating audit test plans
Audit test plans
Examples of audit test plans
Guidance for auditing an ISMS
Corroboration
Evaluation
Auditing virtual activities and locations
Section 18: Audit documentation and quality review
> Work documents
> Quality review
Closing of the audit
Section 19: Closing of the audit
> Determining audit conclusions
> Discussing audit conclusions
> Closing meeting
> Preparing audit report
> Distributing the audit report
> Making the certification decision
> Closing the audit
Section 20: Evaluation of action plans by the auditor
> Submission of action plans by the auditee
> Content of action plans
> Evaluation of action plans
Section 21: Beyond the initial audit
> Audit follow-up activities
> Surveillance activities
> Recertification audit
> Use of trademarks
Section 22: Managing an internal audit program
> Managing an audit program
> Role of the internal audit function
> Main internal audit services and activities
> Audit program resources
www.infosectrain.com | sales@infosectrain.com
www.infosectrain.com | sales@infosectrain.com
> Audit program records
> Follow up on nonconformities
> Monitoring, evaluating, reviewing, and improving an audit program
The above-mentioned content is delivered in 32 hours.
In addition to this, we have added 8 hours session.
ISO 27001 Practical Approach
8 Hours
Dedicated Session
> ISO 27001 (new 93 controls) Controls to Evidence Mapping
> Practical approach on how to collect evidence while auditing with three
scenarios/ case studies paragraphs
ISO 27001 Exam Prep
> Revision of course and open mic session for doubts
> Exam Prep โ€“ mock exam
> Discussion on exam questions and answers
> Discussion on different exams (IGC/PECB)
Benefits of
ISO/IEC 27001
www.infosectrain.com | sales@infosectrain.com
Characterize certifying to
ISO/IEC 27001 as โ€œan investment
that is fully justified by
the benefits
To enhance the information
security posture
To get a competitive advantage
To assure legal and regulatory
52%
69%
56%
55%
www.infosectrain.com | sales@infosectrain.com
History of
ISO/IEC 27001
SO/IEC 27001:2022
ISO/IEC 27001:2013
ISO/IEC 27001:2005
ISO/IEC 17799 2000
British Standards Institute
BS7799 1995
Code of practice for a
Security Management
1992
2022
2013
2015
2000
1995
1992
www.infosectrain.com | sales@infosectrain.com

More Related Content

Similar to ISO_27001_2022_Lead_Auditor_course_content

I01letor20so201leutor2020
I01letor20so201leutor2020I01letor20so201leutor2020
I01letor20so201leutor2020
Anne Starr
ย 

Similar to ISO_27001_2022_Lead_Auditor_course_content (20)

I01letor20so201leutor2020
I01letor20so201leutor2020I01letor20so201leutor2020
I01letor20so201leutor2020
ย 
ISO 27034 Lead Implementer - Four Page Brochure
ISO 27034 Lead Implementer - Four Page Brochure	ISO 27034 Lead Implementer - Four Page Brochure
ISO 27034 Lead Implementer - Four Page Brochure
ย 
Iso 9000 quality management systems qms presentation peter greenham iigi fwr...
Iso 9000 quality management systems qms  presentation peter greenham iigi fwr...Iso 9000 quality management systems qms  presentation peter greenham iigi fwr...
Iso 9000 quality management systems qms presentation peter greenham iigi fwr...
ย 
ISO 27001 Lead Auditor Training Course | ISO 27001 Lead Auditor Certification...
ISO 27001 Lead Auditor Training Course | ISO 27001 Lead Auditor Certification...ISO 27001 Lead Auditor Training Course | ISO 27001 Lead Auditor Certification...
ISO 27001 Lead Auditor Training Course | ISO 27001 Lead Auditor Certification...
ย 
Internal Audit Training with different .pptx
Internal Audit Training with different .pptxInternal Audit Training with different .pptx
Internal Audit Training with different .pptx
ย 
ISO 27034 Lead Auditor - Four Page Brochure
ISO 27034 Lead Auditor - Four Page Brochure	ISO 27034 Lead Auditor - Four Page Brochure
ISO 27034 Lead Auditor - Four Page Brochure
ย 
Law 9000 quality management systems qms presentation peter greenham iigi fw...
Law  9000 quality management systems qms  presentation peter greenham iigi fw...Law  9000 quality management systems qms  presentation peter greenham iigi fw...
Law 9000 quality management systems qms presentation peter greenham iigi fw...
ย 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
ย 
ISO 9001:2008 Internal Auditing of Quality Management Systems - Introduction
ISO 9001:2008 Internal Auditing of Quality Management Systems - IntroductionISO 9001:2008 Internal Auditing of Quality Management Systems - Introduction
ISO 9001:2008 Internal Auditing of Quality Management Systems - Introduction
ย 
Iso 50000 energy management systems presentation peter greenham iigi fwr grou...
Iso 50000 energy management systems presentation peter greenham iigi fwr grou...Iso 50000 energy management systems presentation peter greenham iigi fwr grou...
Iso 50000 energy management systems presentation peter greenham iigi fwr grou...
ย 
Iso Internal Auditor
Iso Internal AuditorIso Internal Auditor
Iso Internal Auditor
ย 
ISO 13053 Lead Auditor - Two Page Brochure
ISO 13053 Lead Auditor - Two Page Brochure	ISO 13053 Lead Auditor - Two Page Brochure
ISO 13053 Lead Auditor - Two Page Brochure
ย 
ISO 22301 Lead Auditor - Four Page Brochure
ISO 22301 Lead Auditor - Four Page BrochureISO 22301 Lead Auditor - Four Page Brochure
ISO 22301 Lead Auditor - Four Page Brochure
ย 
Iso 14000 environmental management systems ems presentation peter greenham ...
Iso 14000  environmental management systems ems  presentation peter greenham ...Iso 14000  environmental management systems ems  presentation peter greenham ...
Iso 14000 environmental management systems ems presentation peter greenham ...
ย 
Online ISO 9001 Lead Auditor Training
Online ISO 9001 Lead Auditor TrainingOnline ISO 9001 Lead Auditor Training
Online ISO 9001 Lead Auditor Training
ย 
Iso 18000 safety management systems ohms presentation peter greenham iigi f...
Iso 18000  safety management systems ohms  presentation peter greenham iigi f...Iso 18000  safety management systems ohms  presentation peter greenham iigi f...
Iso 18000 safety management systems ohms presentation peter greenham iigi f...
ย 
Training brochure la isms
Training brochure la ismsTraining brochure la isms
Training brochure la isms
ย 
Topic 4 internal control system (ics)
Topic 4 internal control system (ics)Topic 4 internal control system (ics)
Topic 4 internal control system (ics)
ย 
PECB Webinar: ISO Internal Audits - A signpost to ISO compliance
PECB Webinar: ISO Internal Audits - A signpost to ISO compliancePECB Webinar: ISO Internal Audits - A signpost to ISO compliance
PECB Webinar: ISO Internal Audits - A signpost to ISO compliance
ย 
ISO 20121 Lead Auditor - Two Page Brochure
ISO 20121 Lead Auditor - Two Page Brochure	ISO 20121 Lead Auditor - Two Page Brochure
ISO 20121 Lead Auditor - Two Page Brochure
ย 

More from priyanshamadhwal2

๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ
๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ
๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ
priyanshamadhwal2
ย 
Most Important security technologies 2024
Most Important security technologies 2024Most Important security technologies 2024
Most Important security technologies 2024
priyanshamadhwal2
ย 

More from priyanshamadhwal2 (20)

Security Operations Center scenario Interview based Questions
Security Operations Center scenario Interview based QuestionsSecurity Operations Center scenario Interview based Questions
Security Operations Center scenario Interview based Questions
ย 
Data protection Officier Online Training
Data protection Officier Online TrainingData protection Officier Online Training
Data protection Officier Online Training
ย 
๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ
๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ
๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ
ย 
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
ย 
Comptia security plus domain SYO 701.pdf
Comptia security plus domain SYO 701.pdfComptia security plus domain SYO 701.pdf
Comptia security plus domain SYO 701.pdf
ย 
Presenting Top 10 Cyber Attacks of 2024 stay informed
Presenting Top 10 Cyber Attacks of 2024 stay informedPresenting Top 10 Cyber Attacks of 2024 stay informed
Presenting Top 10 Cyber Attacks of 2024 stay informed
ย 
Most Important security technologies 2024
Most Important security technologies 2024Most Important security technologies 2024
Most Important security technologies 2024
ย 
๐‘๐ข๐ฌ๐ค ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ
๐‘๐ข๐ฌ๐ค ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ๐‘๐ข๐ฌ๐ค ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ
๐‘๐ข๐ฌ๐ค ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ
ย 
Threat_Hunting_professional_Training_Tips
Threat_Hunting_professional_Training_TipsThreat_Hunting_professional_Training_Tips
Threat_Hunting_professional_Training_Tips
ย 
Difference between cloud storage and local storage
Difference between cloud storage and local storageDifference between cloud storage and local storage
Difference between cloud storage and local storage
ย 
Axis Bank Customers Face credit card frauds
Axis Bank Customers Face credit card fraudsAxis Bank Customers Face credit card frauds
Axis Bank Customers Face credit card frauds
ย 
๐”๐ง๐๐ž๐ซ๐ฌ๐ญ๐š๐ง๐๐ข๐ง๐  ๐ญ๐ก๐ž ๐Œ๐š๐ฅ๐ข๐œ๐ข๐จ๐ฎ๐ฌ ๐Œ๐ข๐ง๐ ๐‘๐ž๐š๐ฌ๐จ๐ง๐ฌ ๐Ÿ๐จ๐ซ ๐‚๐ฒ๐›๐ž๐ซ๐š๐ญ๐ญ๐š๐œ๐ค๐ฌ
๐”๐ง๐๐ž๐ซ๐ฌ๐ญ๐š๐ง๐๐ข๐ง๐  ๐ญ๐ก๐ž ๐Œ๐š๐ฅ๐ข๐œ๐ข๐จ๐ฎ๐ฌ ๐Œ๐ข๐ง๐ ๐‘๐ž๐š๐ฌ๐จ๐ง๐ฌ ๐Ÿ๐จ๐ซ ๐‚๐ฒ๐›๐ž๐ซ๐š๐ญ๐ญ๐š๐œ๐ค๐ฌ๐”๐ง๐๐ž๐ซ๐ฌ๐ญ๐š๐ง๐๐ข๐ง๐  ๐ญ๐ก๐ž ๐Œ๐š๐ฅ๐ข๐œ๐ข๐จ๐ฎ๐ฌ ๐Œ๐ข๐ง๐ ๐‘๐ž๐š๐ฌ๐จ๐ง๐ฌ ๐Ÿ๐จ๐ซ ๐‚๐ฒ๐›๐ž๐ซ๐š๐ญ๐ญ๐š๐œ๐ค๐ฌ
๐”๐ง๐๐ž๐ซ๐ฌ๐ญ๐š๐ง๐๐ข๐ง๐  ๐ญ๐ก๐ž ๐Œ๐š๐ฅ๐ข๐œ๐ข๐จ๐ฎ๐ฌ ๐Œ๐ข๐ง๐ ๐‘๐ž๐š๐ฌ๐จ๐ง๐ฌ ๐Ÿ๐จ๐ซ ๐‚๐ฒ๐›๐ž๐ซ๐š๐ญ๐ญ๐š๐œ๐ค๐ฌ
ย 
Data_ Privacy_ Challenges _and_ solutions
Data_ Privacy_ Challenges _and_ solutionsData_ Privacy_ Challenges _and_ solutions
Data_ Privacy_ Challenges _and_ solutions
ย 
๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ 
๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ 
๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ 
ย 
PMP _Certification_ preparation_ training
PMP _Certification_ preparation_ trainingPMP _Certification_ preparation_ training
PMP _Certification_ preparation_ training
ย 
Microsoft_Azure_Security_Technologies_Exam_AZ-500_Course_Content.pdf
Microsoft_Azure_Security_Technologies_Exam_AZ-500_Course_Content.pdfMicrosoft_Azure_Security_Technologies_Exam_AZ-500_Course_Content.pdf
Microsoft_Azure_Security_Technologies_Exam_AZ-500_Course_Content.pdf
ย 
Penetration Testing vs Vulnerability Assessment
Penetration Testing vs Vulnerability AssessmentPenetration Testing vs Vulnerability Assessment
Penetration Testing vs Vulnerability Assessment
ย 
Types _of_ Penetration_ Testing_ Training
Types _of_ Penetration_ Testing_ TrainingTypes _of_ Penetration_ Testing_ Training
Types _of_ Penetration_ Testing_ Training
ย 
CCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdfCCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdf
ย 
Sailpoint_IdentityIQ_Implementation__Developer_Training_Program
Sailpoint_IdentityIQ_Implementation__Developer_Training_ProgramSailpoint_IdentityIQ_Implementation__Developer_Training_Program
Sailpoint_IdentityIQ_Implementation__Developer_Training_Program
ย 

Recently uploaded

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
pragatimahajan3
ย 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
ย 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
ย 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
ย 

Recently uploaded (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
ย 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
ย 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
ย 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
ย 
Cรณdigo Creativo y Arte de Software | Unidad 1
Cรณdigo Creativo y Arte de Software | Unidad 1Cรณdigo Creativo y Arte de Software | Unidad 1
Cรณdigo Creativo y Arte de Software | Unidad 1
ย 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
ย 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
ย 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
ย 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
ย 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
ย 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
ย 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
ย 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
ย 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
ย 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
ย 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
ย 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
ย 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
ย 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
ย 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
ย 

ISO_27001_2022_Lead_Auditor_course_content

  • 2. Any management system's success depends on effective audit- ing. As a result, it involves a great deal of responsibility and chal- lenges. InfosecTrainโ€™s ISO 27001:2022 Lead Auditor training and certi๏ฌcation course is a ๏ฌve-day intensive course to inculcate in participants the knowledge to perform an Information Security Management System (ISMS) audit by employing recommended audit fundamentals, principals, procedures, and methodologies. www.infosectrain.com | sales@infosectrain.com ISO 27001:2022 Lead Auditor > 40 hrs of instructor-led training > Authorized Training Partner > Practical approach for ISO 27001 Audit > Mock Test and exam guidance session > Certi๏ฌed & Experienced Trainers ISO 27001:2022 LEAD AUDITOR TRAINING INCLUDES ABOUT
  • 3. Who Attend? Internal Auditors Auditors wanting to perform and lead ISMS certification audits Project Managers or Consultants wanting to master the ISMS audit process CxO and Senior Managers responsible for the IT governance of an enterprise and the management of its risks Members of an information security team Expert advisors in information technology Expert advisors in information security Technical experts wanting to prepare for an information security audit function Pre-Requisites Certified ISO/IEC 27001 Foundation Certification or basic knowledge of ISO/IEC 27001 is recommended. Exam Information We provide Exams with PECB, & IGC; for more detail, connect with our experts. www.infosectrain.com | sales@infosectrain.com
  • 4. www.infosectrain.com | sales@infosectrain.com MEET OUR INSTRUCTOR INSTRUCTOR RAJESH SANDHEER CISA | ISO 27001 LA | GDPR CDPO | CDCS | CDCP INSTRUCTOR CHANDER S ISO 27001 | ISO 22301 | ISO 27701 | ISO 9001 | ISO | GDPR | ISACA | LEAN 6-Sigma
  • 5. www.infosectrain.com | sales@infosectrain.com What our Client Says About Us? I experienced such an amazing and interacted training session. Thanks to the respective trainer who shared us the details knowledge of the standard as well as his practical experiences. I have gain a great amount of knowledge and it has sharpen my perspective as an auditor. I can't wait to make use of it in my career and provide a better audit quality to my organization. SENG SEYHA Thank you for organizing an amazing training session.Trainer clearly explained the concepts. It was very interactive session with team and lot of group activities. CHRISY ANNIE PUNNEN The training was very informative and a good learning experience. Learned and enjoyed it a lot. JUNO DAVID ANTONY
  • 6. Introduction to the Information Security Management System (ISMS) and ISO/IEC 27001 Section 1: Training course objectives and structure > General information > Learning objectives > Educational approach > Examination and certification www.infosectrain.com | sales@infosectrain.com Course Content Section 2: Standards and regulatory frameworks > What is ISO? > The ISO/IEC 27000 family of standards > Advantages of ISO/IEC 27001 Section 3: Certification process > Certification process > Certification scheme > Accreditation bodies > Certification bodies
  • 7. Section 4: Fundamental concepts and principles of information security > Information and asset > Information security > Confidentiality, integrity, and availability > Vulnerability, threat, and impact > Information security risk > Security controls and control objectives > Classification of security controls www.infosectrain.com | sales@infosectrain.com Section 5: Information security management system (ISMS) Audit principles, preparation, and initiation of an audit > Definition of a management system > Definition of ISMS > Process approach > ISMS implementation > Overview - Clauses 4 to 10 > Overview - Annex A > Statement of Applicability Section 6: Fundamental audit concepts and principles > Audit standards > What is an audit? > Types of audits > Involved parties
  • 8. > Involved parties > Audit objectives and criteria > Combined audit > Principles of auditing > Competence and evaluation of auditors Section 7: The impact of trends and technology in auditing > Big data > The three Vโ€™s of big data > The use of big data in audits > Artificial intelligence > Machine learning > Cloud computing > Auditing outsourced operations Section 8: Evidence-based auditing > Audit evidence > Types of audit evidence > Quality and reliability of audit evidence Section 9: Risk-based auditing > Audit approach based on risk > Materiality and audit planning > Reasonable assurance www.infosectrain.com | sales@infosectrain.com
  • 9. www.infosectrain.com | sales@infosectrain.com Section 10: Initiation of the audit process > The audit offer > The audit team leader > The audit team > Audit feasibility > Audit acceptance > Establishing contact with the auditee > The audit schedule Section 11: Stage 1 audit On-site audit activities > Objectives of the stage 1 audit > Pre on-site activities > Preparing for on-site activities > Conducting on-site activities > Documenting the outputs of stage 1 audit Section 12: Preparing for stage 2 audit > Setting the audit objectives > Planning the audit > Assigning work to the audit team > Preparing audit test plans > Preparing documented information for the audit
  • 10. Section 13: Stage 2 audit > Conducting the opening meeting > Collecting information > Conducting audit tests > Determining audit findings and nonconformity reports > Performing a quality review Section 14: Communication during the audit > Behavior during on-site visits > Communication during the audit > Audit team meetings > Guides and observers > Conflict management > Cultural aspects > Communication with the top management Section 15: Audit procedures > Overview of the audit process > Evidence collection and analysis procedures > Interview > Documented information review > Observation > Analysis > Sampling > Technical verification www.infosectrain.com | sales@infosectrain.com
  • 11. www.infosectrain.com | sales@infosectrain.com Section 17: Drafting audit findings and nonconformity reports > Audit findings > Types of possible audit findings > Documenting the audit findings > Drafting a nonconformity report > The principle of the benefit of the doubt Section 16: Creating audit test plans Audit test plans Examples of audit test plans Guidance for auditing an ISMS Corroboration Evaluation Auditing virtual activities and locations Section 18: Audit documentation and quality review > Work documents > Quality review Closing of the audit
  • 12. Section 19: Closing of the audit > Determining audit conclusions > Discussing audit conclusions > Closing meeting > Preparing audit report > Distributing the audit report > Making the certification decision > Closing the audit Section 20: Evaluation of action plans by the auditor > Submission of action plans by the auditee > Content of action plans > Evaluation of action plans Section 21: Beyond the initial audit > Audit follow-up activities > Surveillance activities > Recertification audit > Use of trademarks Section 22: Managing an internal audit program > Managing an audit program > Role of the internal audit function > Main internal audit services and activities > Audit program resources www.infosectrain.com | sales@infosectrain.com
  • 13. www.infosectrain.com | sales@infosectrain.com > Audit program records > Follow up on nonconformities > Monitoring, evaluating, reviewing, and improving an audit program The above-mentioned content is delivered in 32 hours. In addition to this, we have added 8 hours session. ISO 27001 Practical Approach 8 Hours Dedicated Session > ISO 27001 (new 93 controls) Controls to Evidence Mapping > Practical approach on how to collect evidence while auditing with three scenarios/ case studies paragraphs ISO 27001 Exam Prep > Revision of course and open mic session for doubts > Exam Prep โ€“ mock exam > Discussion on exam questions and answers > Discussion on different exams (IGC/PECB)
  • 14. Benefits of ISO/IEC 27001 www.infosectrain.com | sales@infosectrain.com Characterize certifying to ISO/IEC 27001 as โ€œan investment that is fully justified by the benefits To enhance the information security posture To get a competitive advantage To assure legal and regulatory 52% 69% 56% 55%
  • 15. www.infosectrain.com | sales@infosectrain.com History of ISO/IEC 27001 SO/IEC 27001:2022 ISO/IEC 27001:2013 ISO/IEC 27001:2005 ISO/IEC 17799 2000 British Standards Institute BS7799 1995 Code of practice for a Security Management 1992 2022 2013 2015 2000 1995 1992