A drawing of a man wearing a hat with red eyes.

I've Been Hacked

Certified Network & Cyber Security Engineers

It looks like a plain pink background with a gradient.

I've Been Hacked | Cyber Security Specialists Gold Coast | 24/7

1300 714 359

ABOUT CERTIFIED LEAD IMPLEMENTER TRAINING AND EXAMINATION FOR INFORMATION SECURITY MANAGEMENT SYSTEM ISO / IEC 27001

Learn and get certified as a professional in implementation of ISO 27001 standard through our self-paced E-learning interactive course which comprises of 4 modules. Upon completion of these modules, you can appear for an examination and get certified as a Lead Implementer. Become an independent consultant or lead the team for the implementation of Information Security Management Systems (ISMS). Read below details of the online course, examination and process of certification.

ABOUT THE ISO 27001 IMPLEMENTER E-LEARNING COURSE

Gain insights into how you can protect business critical information from a wide range of threats with ISO 27001 ISMS, in order to ensure business continuity, minimise business risk, maximise return on investments and increase business opportunities.

COURSE METHODOLOGY AND OUTLINE

This course has been specially designed to help you improve your knowledge and skill set on ISO 27001, providing you an overview on the scope of ISMS and complimented with step-by-step processes to successfully set up the system in your organisation. To ensure a good learning experience and comprehension tools such as content-embedded assessment, simulations, and other interactive exercises are used to enhance instructional delivery. Easily accessible via your preferred choice of device, the course allows you to log in and learn whenever, wherever.

MODULE 1

  • ISO 27001:2013 Information Security Management Systems (ISMS) Awareness
  • Duration: 60 minutes

MODULE 2

  • Risk Assessment and Management
  • Duration: 120 minutes

MODULE 3

  • Guidance on implementation of ISMS framework requirements (Based on ISO/IEC 27003)
  • Duration: 90 minutes

MODULE 4

  • Guidance on implementation of Information security Annex A control requirements (Based on ISO/IEC 27002)
  • Duration: 120 minutes

COURSE METHODOLOGY 

A variety of ISO 27001 training tools such as content-embedded assessment, simulations, and other interactive exercises are used to enhance instructional delivery. Easily accessible via your preferred choice of device, the course allows you to log in and learn whenever, wherever.


The cumulative duration of all 4 modules is 6.5 hours. Completion of one ISO 27001 training module entitles you to a certificate of participation. The candidate has to take a separate qualification examination (online or written) separately to get qualified as an Implementer.

EXAMINATION AND CERTIFICATION

After successfully completing all the modules of ISMS lead implementer e-learning course, candidate is eligible to attend the examination to achieve the certification as a lead implementer.

EXAMINATION DETAILS

  • Total marks: 70
  • Duration of the exam: 90 minutes (1.5 hours)
  • Passing criteria: 70%

Only candidates who successfully passed the exams are awarded “Information Security Management System based on ISO /IEC 27001 Certified Lead Implementer” Certification.

WHO SHOULD GET CERTIFIED?

  • Professionals who are looking for independent certification as lead implementer
  • Professionals who are looking for certification through self-learning
  • Information security personnel who have a role in implementation of ISMS 27001
  • Information security management system consultants
  • Head – IT, Chief Information Security Officer (CISO)

PRE-REQUISITES

Prior Knowledge about ISO 27001:2013 standard is desirable. 

COURSE ADVISOR 

The course content and structure are designed by the domain experts from TÜV SÜD’s Digital Academy Approval Board.

With immense experience and knowledge in the relevant standards, our team of product specialists and technical experts at the TÜV SÜD Digital Academy Approval Board, developed the course content based on current business landscape and market requirements.   

YOUR BENEFITS

  • World-Class Training
    Learn from TÜV SÜD’s industry experts and training specialists
  • Flexible Learning Style
    Study in your own time, at your own pace
  • Continuous Feedback
    Get prompt feedback from content-embedded assessment
  • Competency-Based Learning
    Show your course progress based on demonstrated learning
  • Professional Certification
    Get a globally recognised certificate and enhance your career development
By Cyber Security Consultant January 30, 2024
Cyber Security is become most needed services for all business and industries in 2024. Every business is concerned about Cyber Security. Security operations (SecOps) leaders face a multifaceted challenge: detecting elusive and novel threats using outdated tools, mitigating the risks posed by unexplored dark data, and managing the resource-intensive nature of staying ahead of evolving […]
A drawing of a man wearing a hat and a mask
By Myles Larden December 11, 2023
This is a subtitle for your new post
A person is holding a credit card in their hand.
By Myles Larden November 21, 2023
Credit Card Skimming on the Rise
A thief is fishing for emails on two laptops with a fishing rod.
By ThioJo May 5, 2022
Ive been hacked explaining how to spot a fake email
A person is holding a cell phone with a camera attached to it.
By Whos the boss May 5, 2022
A man is standing in front of a sign that says new scams 2022.
By ThioJo May 5, 2022
A bunch of visa cards are laying on top of a 100 dollar bill
By Wired.com May 5, 2022
ABOUT 500 ECOMMERCE websites were recently found to be compromised by hackers who installed a credit card skimmer that surreptitiously stole sensitive data when visitors attempted to make a purchase.
A silhouette of two people looking at a tinder app on a cell phone.
By Guardian Australia May 5, 2022
Victims ‘financially and emotionally devastated’ by scammers who prey upon vulnerable, often older, people, bureau finds
A man wearing a mask is using a laptop computer
By Myles Larden May 5, 2022
Members of the hacker gang may act in Russia’s interest, but their links to the FSB and Cozy Bear hackers appear ad hoc
A close up of a cell phone with the instagram app on the screen.
By Myles Larden May 3, 2022
Instagram's automated 'video selfie' support system leaves our clients with no options to get their account back.
More Posts
Share by: