• Home
  • About Us
    • Our Team
    • Defense Expo 2022
    • Blog
  • Our Offerings
    • Information Security >
      • Services >
        • Risk Advisory Services >
          • Audits & Compliances >
            • ISO 9001:2015 | Quality Management System
            • ISO 27001:2013 | Information Security Management System
            • ISO 22301:2019 BCMS
            • ISO 27017:2015 | Cloud Security
            • TL 9000 | Telecom Quality
            • PAS 99 | Integrated Management System
            • SOC 2 Audits
            • GDPR | Privacy Controls
            • Trusted Partner Network (TPN) Assessment
          • Vulnerability Assessment & Penetration Testing (VA & PT)
          • Security Operations Center (SOC)
          • Red Team Assessment
        • Cyber Threat Management
        • Privacy & Data Protection
        • Third Party Risk Management
      • Products >
        • Digital Forensics Equipment - Procurement
        • Mobile Threat Defense Suite
        • Insider Threat Prevention Suite
        • Data Diode
        • Secure Communication Suite
    • Cyber Crime Investigations
    • Digital Forensics >
      • Forensics Lab Setup
      • Data Recovery Services
    • Online Reputation Management
    • Other Services >
      • Homeland Security
  • Careers
  • Training Labs
    • ISO 27001:2013 Lead Implementer Course
  • Contact Us
    • FAQ
Best Information Security Services | Cyber Intelligence | Data Diode
  • Home
  • About Us
    • Our Team
    • Defense Expo 2022
    • Blog
  • Our Offerings
    • Information Security >
      • Services >
        • Risk Advisory Services >
          • Audits & Compliances >
            • ISO 9001:2015 | Quality Management System
            • ISO 27001:2013 | Information Security Management System
            • ISO 22301:2019 BCMS
            • ISO 27017:2015 | Cloud Security
            • TL 9000 | Telecom Quality
            • PAS 99 | Integrated Management System
            • SOC 2 Audits
            • GDPR | Privacy Controls
            • Trusted Partner Network (TPN) Assessment
          • Vulnerability Assessment & Penetration Testing (VA & PT)
          • Security Operations Center (SOC)
          • Red Team Assessment
        • Cyber Threat Management
        • Privacy & Data Protection
        • Third Party Risk Management
      • Products >
        • Digital Forensics Equipment - Procurement
        • Mobile Threat Defense Suite
        • Insider Threat Prevention Suite
        • Data Diode
        • Secure Communication Suite
    • Cyber Crime Investigations
    • Digital Forensics >
      • Forensics Lab Setup
      • Data Recovery Services
    • Online Reputation Management
    • Other Services >
      • Homeland Security
  • Careers
  • Training Labs
    • ISO 27001:2013 Lead Implementer Course
  • Contact Us
    • FAQ

Certified Lead Implementer Professional Course for ISO/IEC 27001:2013 Information Security Management System

Course Duration: 2 Days
Course Code: THI-L002

In this course you will gain experience and know how to be able to setup an ISMS that conforms to ISO/IEC 27001:2013 in an organization.
We will help you develop your skills and understanding of the practicalities involved when setting up a typical management system framework that conforms with the standard. This includes learning how to set up policies, processes and procedures for your ISMS.

An examination is held on the final day and successful delegates will be awarded the certificate.
After attending the course and passing the examination, you will be able to play a pivotal role in ensuring your organization can set up an ISMS that is compliant to ISO/IEC 27001:2013.


Who should attend?
  • Those who will be involved in advising management on the introduction, implementation & maintenance of ISO/IEC 27001:2013 management system into an organization.
  • Information Security Managers
  • IT and Corporate Security Managers
  • Corporate Governance Managers
  • Risk and Compliance Managers
  • Information Security Consultants

What will you learn?
  • What is information security management (ISMS)
  • Why ISMS is important to an organization
  • What are the benefits of ISMS
  • What is the background of ISMS
  • What are the key concepts and principles in ISO/IEC 27001:2013
  • What terms and definitions are used in the standard
  • What are the main requirements of ISO/IEC 27001:2013
  • How to identify a typical framework to implement and ISMS compliant with ISO/IEC 27001:2013 following the Plan, Do, Check, Act (PDCA) cycle
  • How to conduct a base line review of the organization’s current position with regard to ISO/IEC 27001:2013
  • How to interpret the requirements of ISO/IEC 27001:2013 from an implementation perspective in the context of their organization
  • How to implement key elements of ISO/IEC 27001:2013
  • What are the concepts of leadership and managing organizational change
  • Understanding project management, skill sharing, support and motivation during the implementation of an ISMS

What's included?
  • This training content will be delivered as a virtual classroom with the THI tutor. This will provide the delegate with the flexibility of attending it from the convenience of home or office, without travelling to THI facility. A stable internet connection, headset with USB connection, a quiet and suitable work area. In advance of the training a ‘testing room’ will be provided for delegates to confirm their hardware works and that they can fully participate in the training.
  • Examination will be conducted online via an e-assessment platform 'Questionmark'. Invigilation will be done through delegate’s webcam and microphone.
  • On completion, you’ll be awarded an internationally recognized THI Training Labs certificate.

Please Note: This training fee is applicable only for residents of India and the Indian subcontinent.


    Interested in this Course?
    Connect with us Today.

Submit
Picture
TROJAN HUNT INDIA LLP
Review Us on Google  
https://bit.ly/thi_review

Services

Products

  Connect with us

Red Team Exercise & Assessment
Vulnerability Assessment & Penetration Testing
Privacy & Data Protection
Risk Advisory Services
Third Party Risk Management
Cyber Threat Management

Data Recovery Services

Mobile Threat Defense
Encrypted Communication Suite
Insider Threat Prevention Suite
Digital Forensic Products
Data Diode
​Data Recovery Products

​OSINT
Global Helpline:
+91-8178440079
+91-11-41671961
Chat With Us:
+91-8178440079
Working Hours:
​Monday - Saturday
1000 Hrs - 1900 Hrs
Corporate Office:
Level 3, Gate Number 1, Plot No 9-11, Vardhman Trade Center, Lala Lajpat Rai Road, Nehru Place - 110019, New Delhi, India

    Subscribe to our newsletter

Subscribe
Member of:
Picture
Certifications:
Picture
Picture
© Trojan Hunt India LLP 2019 - 2022. ​All Rights Reserved.
Disclaimer: All images are licensed and text copyrighted material of Trojan Hunt India LLP. Logo is Trademark Registered. No unauthorized copy or distribution allowed.
  • Home
  • About Us
    • Our Team
    • Defense Expo 2022
    • Blog
  • Our Offerings
    • Information Security >
      • Services >
        • Risk Advisory Services >
          • Audits & Compliances >
            • ISO 9001:2015 | Quality Management System
            • ISO 27001:2013 | Information Security Management System
            • ISO 22301:2019 BCMS
            • ISO 27017:2015 | Cloud Security
            • TL 9000 | Telecom Quality
            • PAS 99 | Integrated Management System
            • SOC 2 Audits
            • GDPR | Privacy Controls
            • Trusted Partner Network (TPN) Assessment
          • Vulnerability Assessment & Penetration Testing (VA & PT)
          • Security Operations Center (SOC)
          • Red Team Assessment
        • Cyber Threat Management
        • Privacy & Data Protection
        • Third Party Risk Management
      • Products >
        • Digital Forensics Equipment - Procurement
        • Mobile Threat Defense Suite
        • Insider Threat Prevention Suite
        • Data Diode
        • Secure Communication Suite
    • Cyber Crime Investigations
    • Digital Forensics >
      • Forensics Lab Setup
      • Data Recovery Services
    • Online Reputation Management
    • Other Services >
      • Homeland Security
  • Careers
  • Training Labs
    • ISO 27001:2013 Lead Implementer Course
  • Contact Us
    • FAQ