{"id":4301,"date":"2025-06-01T11:53:54","date_gmt":"2025-06-01T11:53:54","guid":{"rendered":"https:\/\/pbi.ps\/?post_type=lp_course&#038;p=4301"},"modified":"2025-07-16T06:33:48","modified_gmt":"2025-07-16T06:33:48","slug":"is-iec-lead-implementer-iso-27001","status":"publish","type":"lp_course","link":"https:\/\/pbi.ps\/?lp_course=is-iec-lead-implementer-iso-27001","title":{"rendered":"IS\/IEC Lead Implementer ISO 27001"},"content":{"rendered":"<p style=\"direction: ltr;\"><strong><u>Introduction:<\/u><\/strong><\/p>\n<p style=\"direction: ltr;\">An&nbsp;<strong data-end=\"30\" data-start=\"3\">IS\/IEC Lead Implementer<\/strong>&nbsp;refers to a professional who is responsible for implementing and managing Information Security Management Systems (ISMS) or other standards related to Information Security in organizations, following the guidelines set by the&nbsp;<strong data-end=\"313\" data-start=\"257\">International Organization for Standardization (ISO)<\/strong>&nbsp;or the&nbsp;<strong data-end=\"372\" data-start=\"321\">International Electrotechnical Commission (IEC)<\/strong>. The most common standard they work with is&nbsp;<strong data-end=\"434\" data-start=\"417\">ISO\/IEC 27001<\/strong>, which provides a framework for establishing, implementing, operating, monitoring, reviewing, maintaining, and improving an ISMS.<\/p>\n<p style=\"direction: ltr;\">In today&#8217;s digital landscape, where information security breaches and cyber threats are common, the role of the IS\/IEC Lead Implementer is critical to ensuring that organizations protect sensitive information, comply with regulatory requirements, and maintain business continuity.<\/p>\n<p style=\"direction: ltr;\">An IS\/IEC Lead Implementer is pivotal in managing an organization&#8217;s information security infrastructure by implementing the ISMS framework, ensuring compliance with ISO\/IEC standards, and safeguarding the organization&#8217;s data and operations from potential security risks.<\/p>\n<p style=\"direction: ltr;\">&nbsp;<\/p>\n<p style=\"direction: ltr;\"><strong><u>Target Audience:<\/u><\/strong><\/p>\n<p style=\"direction: ltr;\">\u00b7IT Department &amp; Digital Transformation Sections<\/p>\n<p style=\"direction: ltr;\">\u00b7Risk and Compliance Sections &amp;&nbsp;&nbsp;Internal Auditors<\/p>\n<p style=\"direction: ltr;\">&nbsp;<\/p>\n<p style=\"direction: ltr;\"><strong>By the end of the training participants should be able to:<\/strong><\/p>\n<p style=\"direction: ltr;\">1.&nbsp;Lead the implementation and management of an ISMS in compliance with ISO\/IEC 27001.<\/p>\n<p style=\"direction: ltr;\">2.&nbsp;Conduct risk assessments and develop appropriate security measures.<\/p>\n<p style=\"direction: ltr;\">3.&nbsp;Create policies, procedures, and controls that mitigate security risks.<\/p>\n<p style=\"direction: ltr;\">4.&nbsp;&nbsp;Lead internal audits and prepare the organization for external certification audits.<\/p>\n<p style=\"direction: ltr;\">5.&nbsp;Promote a culture of information security awareness and continuous improvement.<\/p>\n<p style=\"direction: ltr;\">This comprehensive training ensures that&nbsp;<strong data-end=\"5421\" data-start=\"5400\">Lead Implementers<\/strong>&nbsp;are prepared to guide their organizations in achieving information security goals while maintaining compliance with internationally recognized standards.<\/p>\n<p style=\"direction: ltr;\">&nbsp;<\/p>\n<p style=\"direction: ltr;\"><strong><u>Training Content:<\/u><\/strong><\/p>\n<table style=\"direction: ltr;\" border=\"1\">\n<colgroup>\n<col>\n<col><\/colgroup>\n<tbody>\n<tr>\n<td><strong>Day 1:&nbsp;Introduction to ISO\/IEC 27001 and initiation of an ISMS implementation<\/strong><\/p>\n<p><strong>Section 1: Training course objectives and structure<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;General information &amp;&nbsp;&nbsp;Educational approach<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Agenda of the training course &amp;&nbsp;Learning objectives<\/p>\n<p><strong>Section 2: Standards and regulatory frameworks<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;The ISO\/IEC 27000 family of standards<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;The development of the ISO\/IEC 27000 family of standards<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Advantages of an ISMS based on ISO\/IEC 27001<\/p>\n<p>&nbsp;<strong>Section 3: Information security management system (ISMS)<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;The definition of a management system &amp; ISMS<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Integrated management systems<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Overview of clauses 4 to 10 &amp; Annex A<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;The process approaches<\/p>\n<p><strong>Section 4: Fundamental concepts and principles of information security<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Information and asset<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Information security,&nbsp;Confidentiality, integrity, and availability<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Vulnerability, threat, and consequence<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Information security risk &amp;&nbsp;&nbsp;Classification of security controls<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cybersecurity &amp;&nbsp;&nbsp;Information privacy<\/p>\n<p><strong>Section 5: Initiation of the ISMS implementation<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Defining an approach to the ISMS implementation &amp; Proposing implementation approaches<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Applying the proposed implementation approaches<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Creating a business case &amp; Aligning with best practices<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Selecting a methodological framework to manage the implementation of the ISMS<\/p>\n<p><strong>Section 6: Understanding the organization and its context<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Mission, objectives, values, and strategies of the organization<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ISMS objectives,&nbsp;Preliminary scope,&nbsp;Internal and external environment<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Key processes and activities &amp;&nbsp;Climate change impact<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Interested parties &amp;&nbsp;Business requirements<\/p>\n<p><strong>Section 7: ISMS scope<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Boundaries of the ISMS &amp;&nbsp;Organizational boundaries<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Information security boundaries<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Physical boundaries &amp;&nbsp;ISMS scope statement<\/td>\n<td><strong>Day2:&nbsp;Implementation plan pf an ISMS<\/strong><\/p>\n<p><strong>Section 8: Leadership and project approval<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Leadership and commitment<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ISMS project plan, Team, and manager<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Management approval for the ISMS project implementation<\/p>\n<p><strong>Section 9: Organizational structure<\/strong>.<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Organizational structure and&nbsp;&nbsp;Information security coordinator<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Roles and responsibilities of interested parties and key committees<\/p>\n<p><strong>Section 10: Analysis of the existing system<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Determining the current state &amp;&nbsp;Conducting a gap analysis<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Establishing maturity targets &amp;&nbsp;Presenting a gap analysis report<\/p>\n<p><strong>Section 11: Information security policy<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Types of policies and models<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Information security policy<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Specific security policies<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Management approval of policies<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Publication and dissemination of policies<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Control, evaluation, and review of policies<\/p>\n<p><strong>Section 12: Risk management<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ISO 31000 and&nbsp; &nbsp;ISO\/IEC 27005<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Context establishment<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Risk assessment and treatment<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Communication and consultation<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Recording and reporting<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Monitoring and review<\/p>\n<p><strong>Section 13: Statement of Applicability<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Review and selection of applicable information security controls<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Justification of selected controls and&nbsp;&nbsp;excluded controls<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Finalization of the Statement of Applicability<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Management approval<\/td>\n<\/tr>\n<tr>\n<td><strong>Day 3:&nbsp;Implementation of an ISMS<\/strong><\/p>\n<p><strong>Section 14: Selection and design of controls<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Analysis of the organization\u2019s security architecture<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Preparation for the implementation of controls<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Design and description of controls<\/p>\n<p><strong>Section 15: Implementation of controls<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Implementation of security processes and controls<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Introduction of Annex A controls<\/p>\n<p><strong>Section 16: Management of documented information<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Types of documented information<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Documentation approach &amp;&nbsp;Creation of templates<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Documented information management process<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Documented information management system<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Management of records<\/p>\n<p><strong>Section 17: Trends and technologies<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Big data &amp;&nbsp;The three V\u2019s of big data<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Artificial intelligence &amp;&nbsp;Machine learning<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cloud computing &amp;&nbsp;Outsourced operations<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;The impact of new technologies in information security<\/p>\n<p><strong>Section 18: Communication<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Principles of effective communication<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Information security communication process<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Communication objectives<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Identification of interested parties &amp;&nbsp;Communication activities<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Evaluation of communication process<\/p>\n<p><strong>Section 19: Competence and awareness<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Competence and people development<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Training and awareness<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Competence needs &amp;&nbsp;Competence development activities<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Competence development programs<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Training and awareness programs<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Evaluation of the training outcomes<\/p>\n<p><strong>Section 20: Management of security operations<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Change management planning<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Management of operations &amp; resources<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Process and procedure for incident management<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Information security incident management policy<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Incident response team<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Incident management security controls<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Forensics process<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Records of information security incidents<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Measurement and review of the incident management process<\/td>\n<td><strong>Day 4:&nbsp;ISMS monitoring, continual improvement, and preparation for the certification audit<\/strong><\/p>\n<p><strong>Section 21: Monitoring, measurement, analysis, and evaluation<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Determine measurement objectives<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Define what needs to be monitored and measured<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Establish ISMS performance indicators<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Determine the frequency and method of monitoring and measurement<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Report the results<\/p>\n<p><strong>Section 22: Internal audit<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;What is an audit?<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Types of audits<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Internal audit program<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Independence, objectivity, and impartiality<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Allocation and management of resources for the audit program<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Nonconformities<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Following up on nonconformities<\/p>\n<p><strong>Section 23: Management review<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Preparing for the management review<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Conducting the management review<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Determining the management review outputs<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Following up on the management review<\/p>\n<p><strong>Section 24: Treatment of nonconformities<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Resolution of problems and nonconformities<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Root-cause analysis<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Corrective actions<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Preventive actions<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Action plans<\/p>\n<p><strong>Section 25: Continual improvement<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Continual monitoring of change factors<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Maintenance and improvement of the ISMS<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Continual update of the documented information<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Documentation of the improvements<\/p>\n<p><strong>Section 26: Preparation for the certification audit<\/strong><\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Accreditation and certification bodies<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Selection of the certification body<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Stage 1 audit<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Stage 2 audit<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Audit follow-up<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Certification recommendation and decision<\/p>\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Recertification audit<\/td>\n<\/tr>\n<tr>\n<td><strong>Day 5:&nbsp;Exam<\/strong><\/p>\n<p>Course Review and Practice Exam<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>\u0639\u062f\u062f \u0627\u0644\u0633\u0627\u0639\u0627\u062a \u0627\u0644\u062a\u062f\u0631\u064a\u0628\u064a\u0629 : 40 \u0633\u0627\u0639\u0629<\/strong><\/p>\n<p><strong>\u062a\u0627\u0631\u064a\u062e \u0627\u0644\u0625\u0646\u0639\u0642\u0627\u062f : \u0623\u064a\u0627\u0645 \u0627\u0644\u0633\u0628\u062a 28\/06-26\/07\/2025<\/strong><\/p>\n<p><strong>\u0648\u0642\u062a \u0627\u0644\u0625\u0646\u0639\u0642\u0627\u062f : \u0645\u0646 \u0627\u0644\u0633\u0627\u0639\u0629 9 \u0635\u0628\u0627\u062d\u0627\u064b \u062d\u062a\u0649&nbsp; 5 \u0645\u0633\u0627\u0621\u064b<\/strong><\/p>\n<p><strong>\u0645\u0643\u0627\u0646 \u0627\u0644\u0625\u0646\u0639\u0642\u0627\u062f : \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u0645\u0635\u0631\u0641\u064a \u0627\u0644\u0641\u0644\u0633\u0637\u064a\u0646\u064a &#8211; \u0631\u0627\u0645 \u0627\u0644\u0644\u0647<\/strong><\/p>\n<p><strong>\u0627\u0644\u0631\u0633\u0648\u0645 \u0644\u0644\u0625\u0639\u0636\u0627\u0621 : 1100 $&nbsp;<\/strong><\/p>\n<p><strong>\u0627\u0644\u0631\u0633\u0648\u0645 \u0644\u063a\u064a\u0631 \u0627\u0644\u0625\u0639\u0636\u0627\u0621 : 1200 $<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction: An&nbsp;IS\/IEC Lead Implementer&nbsp;refers to a professional who is responsible for implementing and managing Information Security Management Systems (ISMS) or [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4303,"comment_status":"open","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0,"footnotes":""},"course_category":[87,93,140],"course_tag":[296,205],"class_list":{"0":"post-4301","1":"lp_course","2":"type-lp_course","3":"status-publish","4":"has-post-thumbnail","5":"hentry","6":"course_category---ar","8":"course_category-all-courses-porgrams-ar","9":"course_tag-296","10":"course_tag-205","11":"course"},"_links":{"self":[{"href":"https:\/\/pbi.ps\/index.php?rest_route=\/wp\/v2\/lp_course\/4301","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pbi.ps\/index.php?rest_route=\/wp\/v2\/lp_course"}],"about":[{"href":"https:\/\/pbi.ps\/index.php?rest_route=\/wp\/v2\/types\/lp_course"}],"author":[{"embeddable":true,"href":"https:\/\/pbi.ps\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/pbi.ps\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4301"}],"version-history":[{"count":2,"href":"https:\/\/pbi.ps\/index.php?rest_route=\/wp\/v2\/lp_course\/4301\/revisions"}],"predecessor-version":[{"id":4305,"href":"https:\/\/pbi.ps\/index.php?rest_route=\/wp\/v2\/lp_course\/4301\/revisions\/4305"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pbi.ps\/index.php?rest_route=\/wp\/v2\/media\/4303"}],"wp:attachment":[{"href":"https:\/\/pbi.ps\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4301"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/pbi.ps\/index.php?rest_route=%2Fwp%2Fv2%2Fcourse_category&post=4301"},{"taxonomy":"course_tag","embeddable":true,"href":"https:\/\/pbi.ps\/index.php?rest_route=%2Fwp%2Fv2%2Fcourse_tag&post=4301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}