Skip Ribbon Commands
Skip to main content
Version HistoryVersion History

Course ID

CISMS-LI

Title

Certified Information Security Mangement Systems Lead Implementer

Price

$2,495.00

Duration

4 Days

Audience

 

Level

 

Delivery Method

 

Software Assurance

 

Microsoft CPE

 

Course Audience

​The C)ISMS-LI was designed to prepared students to implement information security management systems ISO/IEC 27001 international standard. We recommend a background in systems with an interest in configuring system for optimal security.

IT System Implementer

IT Auditor

IT Consultant

Chief Information Officer

Security Consultant


Course Objectives

Upon CompletionStudents will:

Acquire the necessary knowledge to manage an ISMS implementation

Be ready to perform an ISO/IEC 27001 ISMS implementation

Be ready to sit for the C)ISMS-LI exam.

Related Courses:

C)ISMS-LA: Information Security Management Systems-Lead Auditor


Course Description

The Certified Information Security Management Systems—Lead Implementer certification course prepares students to help any organization through the process of implementing an information security management systems (“ISMS”) that is compliant with ISO/IEC 27001:2013 standard. ISO/IEC 27001 was developed to set a higher standard for information security as a result of increased cyber security risk. Students will not only implement the ISO/IEC 27001 standard but also help organizations set up controls, processes, and procedures for using an ISMS that will facilitate enhanced information security.

The C)ISMS-LI is perfect for anyone looking to implement the ISO/IEC 27001 standard or to certify their ISO/IEC 27001 implementation expertise.


Course Prerequisites

​A basic familiarity with information systems and an interest in implementation.


Course Outline

​Introduction

Agenda

Housekeeping

Exercise 1

Agenda

Learning objectives

Learning objectives

Implementation objectives

Implementation objectives cont.

Course structure

Examination

Certification


History and Development of the ISMS

Agenda

The ISMS

The ISMS

Integration

Suitable for

Organizations of all Sizes

Assessment

The Evolution of ISO27001, 2

Recent Updates

ISO27002

Control Hierarchy

ISO27001

The ISMS

Constant Change and Improvement

Adoption of the ISMS

Exclusions


Information Security Principles

Agenda

Key Terms

Information

Information Security Definition

Information Security

Context of the Organization

Leadership

Planning

Support

Operation

Performance evaluation

Improvement


Risk Management

Agenda

Risk

Risk cont.

Risk Management

Define a Risk

Assessment Approach

Identify Risks

What Is the Value of an Asset?

What Is a Threat Source/Agent?

What Is a Threat?

What Is a Vulnerability?

Assess and Evaluate Risk

Risk Definitions

Risk Acceptance

Risk Treatment

Definition of Controls

Examples of Types of Controls

Control Usage

Controls (from Annex A)

Comparing Cost and Benefit

Cost of a Countermeasure

Appropriate Controls

Statement of Applicability


Implementing an ISMS

Agenda

Clause 4 Context

of the Organization

Leadership

Policy

Roles,

Responsibilities and Authorities

Planning

Risk Assessment

Support

Operation

Performance Evaluation

Performance

Evaluation Continued

Management Review

Improvement


Auditing an ISMS

Agenda

Audit

Audit Standards

Nonconformity Report Format

Major nonconformity

Major Nonconformity Examples

Major Nonconformity Examples

Minor Nonconformity

Minor nonconformity examples

Agenda

Summary

The Examination


Status

Active

Technology

CyberSecurity

Category

Cybersecurity

SubCategory

Governance

Details

Certified Information Security Mangement Systems Lead Implementer

Attachments

Version: 3.0
Created at 5/12/2015 4:24 PM by Cole
Last modified at 6/29/2015 11:40 AM by GSATRAIN\Administrator