top of page
Soft Gradient Background
Mena Executive Training
a.jpg

ISO/IEC 27001 | Information Security Management System

Taught : Online & In-Person

Official Training

Language : English, Arabic

Rock Logo

About

Learn how to build your expertise in ISO/IEC 27001, the international standard for Information Security Management Systems (ISMS). Whether you're starting your journey or advancing your career, our ISO/IEC 27001 training courses and certifications equip you with practical, in-demand skills to protect data, manage information risks, and enhance digital trust.


Scroll Down to see ISO/IEC 27001 Training Courses

What is ISO/IEC 27001?

ISO/IEC 27001 provides requirements for organizations seeking to establish, implement, maintain and continually improve an information security management system. This framework serves as a guideline towards continually reviewing the safety of your information, which will exemplify reliability and add value to services of your organization.


Why is ISO/IEC 27001 important?

ISO/IEC 27001 assists you to understand the practical approaches that are involved in the implementation of an Information Security Management System that preserves the confidentiality, integrity, and availability of information by applying a risk management process. Therefore, implementation of an information security management system that complies with all requirements of ISO/IEC 27001 enables your organizations to assess and treat information security risks that they face.


Certified ISO/IEC 27001 individuals will prove that they possess the necessary expertise to support organizations implement information security policies and procedures tailored to the organization’s needs and promote continual improvement of the management system and organizations operations.


Moreover, you will be able to demonstrate that you have the necessary skills to support the process of integrating the information security management system into the organization’s processes and ensure that the intended outcomes are achieved.


ISO/IEC 27001 Requirements and Controls


Key Requirements of ISO/IEC 27001


ISO/IEC 27001 outlines several mandatory requirements that ensure a systematic approach to managing sensistive information. 


The most important requirements include:


  • Context of the Organization. 

Identify internal and external issues affecting information security. Determine the needs and expectations of stakeholders.

  • Leadership and Commitment.

 Top management must demonstrate active involvement in ISMS implementation. Establish clear roles, responsibilities, and policies.

  • Risk Assessment and Risk Treatment.

Identify, analyze, and evaluate risks to information security. Implement appropriate risk treatments to mitigate identified risks.

  • Support.

Provide adequate resources, training, and communication to ensure ISMS effectiveness.

  • Operation.

Plan, implement, and control ISMS processes.
Manage risks and security incidents effectively.

  • Performance Evaluation. 

Conduct internal audits and management reviews to evaluate ISMS performance.

  • Continual Improvement


ISO/IEC 27001 Annex A Controls

ISO/IEC 27001 was updated in 2022 to ensure that information security management systems based on it effectively address the ever-evolving security challenges. The revision mainly focused on Annex A, where its controls were restructured into four themes, and the number was reduced from 114 to 93 controls.


The four themes of the security controls of ISO/IEC 27001:2022 are:


  1. Organizational Controls. Information Security Policies: Develop and implement comprehensive security policies. Incident Management: Have processes in place for reporting and responding to security incidents.

  2. People Controls. Awareness and Training: Ensure employees understand security risks and practices. Screening: Conduct background checks during recruitment.

  3. Physical Controls. Secure Areas: Protect physical access to information processing facilities.
    Equipment Security: Prevent loss or damage to assets.

  4. Technological Controls. Access Control: Restrict system access based on roles and responsibilities. Cryptography: Use encryption to protect sensitive data.


What is the difference between ISO/IEC 27001:2013 and ISO/IEC 27001:2022?


The transition from ISO/IEC 27001:2013 to ISO/IEC 27001:2022 introduces significant updates to align with evolving cybersecurity and privacy needs. The standard title has expanded from focusing solely on "information security management systems" to incorporating "information security, cybersecurity, and privacy protection" in the 2022 version. Technical revisions include replacing terms such as "international standard" with "document" and "may" with "can," reflecting a more flexible and modern approach.


Additionally, Annex A has been streamlined, reducing the controls from 114 across 14 categories in the 2013 version to 93 controls organized into four key themes: organizational, people, physical, and technological. 


These changes make the 2022 standard more concise and practical for today's information security challenges.


Benefits of ISO/IEC 27001 Certification


Obtaining the PECB ISO/IEC 27001 Certificate will prove that you have:


  • Obtained the necessary expertise to support an organization to implement an Information Security Management System that complies with ISO/IEC 27001

  • Understood the Information Security Management System implementation process

  • Provide continual prevention and assessments of threats within your organization

  • Higher chances of being distinguished or hired in an Information Security career

  • Understood the risk management process, controls, and compliance obligations

  • Acquired the necessary expertise to manage a team to implement an ISMS

  • The ability to support organizations in the continual improvement process of their Information Security Management System

  • Gained the necessary skills to audit organization’s Information Security Management System

Untitled design (15).png

Modules

AIGP.png

Module 1 : Identifying Security Compliance Measures

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

image 38.png

Module 2 : Recognizing and Addressing Social Engineering Attack

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

image 38.png

Module 3 : Securing Devices

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

image 38.png

Module 4 : Using the Internet Securely

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

Rock Logo
Basic elements of AI and machine learning
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
Basic elements of AI and machine learning
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Soft Gradient Background

Gain an Official ISACA Certificate

LinkedIn_logo_initials.png

Receive a LinkedIn

Certificate

Gain a Certificate After Completion

Add this credential to your LinkedIn profile, CV, or resume to highlight your achievement.

Your certificate will be issued in your legal name and sent to you digitally upon successful completion of the program.

Exam Details

The “PECB Certified Lead Cybersecurity Manager” exam fully meets all the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains:

Domain 1: Fundamental concepts of cybersecurity

Domain 2: Initiating the cybersecurity program and cybersecurity governance

Domain 3: Defining cybersecurity roles and responsibilities and managing risks

Domain 4: Implementing cybersecurity policies and standards

Domain 5: Monitoring and responding to security incidents

Domain 6: Conducting security assessments and audits

Domain 7: Managing security technologies and systems

Domain 8: Educating and training personnel on cybersecurity practices

Course Study Options

Self Study

Online Study at Your Own Pace

In-Person Training

12 Locations in Middle East. View

Live Online Training

Course Duration : Flexible

sandra 1.png

Discuss This Course With Us.

Hello, I’m Sandra, Customer Relations Manager at MENA Executive Training.

I'm here to talk you through the details of this course, answer any questions you may have and help get you booked in!

You May Also Be Interested In

Rock Logo
IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
Basic elements of AI and machine learning
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
bottom of page