Certified ISO 27001 Lead Implementer Training Course

This Course is Currently Available "Live Online" Only (On-site Training Class Availability is Currently Suspended)

Course Summary

The Certified ISO 27001 Lead Implementer course is a five-day information packed learning experience. It is designed to develop a level of competence to support the design, development, roll-out and maintenance of an organizational Information Security Management System based on the ISO 27001 standard. During this course, student will participate in a series of practical exercises leading to a capstone practical exam in the form of a presentation to a panel of distinguished local business and technology executives.

To develop a well-rounded understanding of the standard's expectations, we will be drawing upon best practices from ISO 27001, 27002, 27003, 27004, 27005, 27017, 27034, 27035, 55000 among others. This approach enables students to understand the requirements for the design, development, implementation and ongoing maintenance of an ISO 27001-based information security management system, as well as the expectations of ISO certification auditors.

Enrollment for our next

Certified ISO 27001 Lead Implementer Course

scheduled for April 12 - 16, 2021

closes at 5:00 PM (US Eastern Time Zone) on April 2, 2021


Important Notes:

1. Training seats are limited, and we do not maintain a waiting list for courses as they book up fast. As such, registration may be closed before the above time, when fully booked.

2. Registration closes at 5:00 PM (US Eastern) on the Friday, 2 weeks before the first day of each course, to allow time for us to send electronic versions of course-ware and mandatory communications to each student. The final registration date for each course is posted on the respective course registration page.

Who Should Take This Course?

  • Information Security professionals and managers involved in any aspect of the development, roll-out or operational maintenance of an Information Security Management System (ISMS) 
  • IT Managers and professionals wanting to prepare and to support an organization in the implementation or maintenance of an Information Security Management System (ISMS)
  • Auditors who want to understand and be able to demonstrate competence in an Information Security Management System implementation
  • Project Managers and Consultants looking to understand and support clients implementing an information security management system
  • Corporate / industrial / physical security specialists looking to understand the dynamics of an information security program and their role in supporting it
  • Technical IT specialist wanting to prepare for an Information Security function or for an ISMS project management function
  • Data Privacy, compliance managers and specialists charged with the responsibility for information security conformity in an organization in a regulated or service industry

Help Me Understand How This Course Relates to Me

Select the role that best suite your situation

(links to case studies here coming soon)

Schedule, Registration, and Cost

For specific dates and locations, please visit the Event Calendar view, or our Scheduled Events page.

It is important to note, due to significant member discounts offered, all persons seeking to register for certification training must now first register as a member of the Forum (a $125 fee).

The registration fee of $2,495 (USD), is currently being waived, and students are only required to pay the $500 certification exam and application fees, upon registration.


1. On-site Training Class Availability is Subject To - No Local Pandemic or Protest / Rioting Restrictions. Where Restrictions Are In Place, The Course will Revert to Live Online.

2. If an early registration discount has been offered for a course, but is no longer visible on the course registration page, then the offer has expired and is no longer available to redeem.


Day One - Introduction and Planning for an Information Security Management System (ISMS)

  • Course introduction
  • A primer on the ISO 27000 family of standards and guides
  • An ISO 27001 ISMS
  • Acclimating to the organization
  • Business Process Mapping
  • Performing an Asset Inventory to support a risk assessment
  • Defining ISMS Program Goals & Priorities
  • Defining the scope of the ISMS

Day Two - Planning for an ISMS and Risk Management

  • Understanding and building a Business Case for an ISMS
  • Understanding the requirement for, and performing the mandatory legal & regulatory review
  • Understanding the mandatory Statement of Applicability, and how to create one
  • Fundamental of a risk assessment
  • Familiarization with and understanding how to perform a Gap and Impact Assessments, and prepare the mitigation plan
  • Understanding the need for an ISMS Program Charter Development and familiarization on how to build one
  • Understanding a practical approach to developing governance for your ISMS, including Information Security Policy, Policy
  • Standards, Technical Security Operating Standards, and Technical Security Configuration Standards

Day Three - Develop and Implement ISMS

  • ISMS Governance continued with Standard Security Operating Processes, and Technical Security Operating Directives (procedures)
  • Performance Management
  • Communications Program
  • Mitigation Plan Implementation
  • Operational Transfer and Acceptance

Day Four - Management Oversight, Auditing and Managing an ISMS based on ISO 27001

  • A walk through of the ISO 27001 Annex A Control Objectives & Controls
  • Understanding the mandatory requirement for an independent security assessment
  • How to develop an Internal Audit program to support an ISMS
  • Understanding the requirements for an ISMS Leadership Review, including direction for continuous improvement
  • Understanding the end-to-end ISMS certification process, including the certification audit and its requirements
  • Understanding the standard's requirement for the establishment and ongoing management of Information Security Incident with an ISMS

Day Five - Practical & Written Certification Exams

  • Morning: 3 hour written exam
  • Afternoon: Practical Exam - Formal Presentation of ISMS Business Case to the Organization's Board of Directors


1. Both written and practical exams are mandatory, in order to meet the certification requirements set out by the Information Security Leadership Forum, this course's certifying body.

2. Formal business attire is mandatory for you practical exam. Please be sure to pack / dress appropriately. Men are required to wear a jacket and tie, and women the equivalent.

Learning Objectives

When designing our Certified ISO 27001 Lead Implementer Course, great care is taken to identify key areas the course must focus on in order to ensure student achieve the goals the course was setup to accomplish. These learning objectives are highlighted as follows:

Understand the application of an Information Security Program as prescribed by ISO 27001.

Master the concepts, approaches, standards, methods and techniques required for the effective management of an organizational Information Security Program

Familiarity with the various sub-programs under an Information Security Program, and their interrelationships to establish a holistic enterprise information security program.

Develop the expertise to lead an organization in the design, development, implementation, management and maintenance of an Information Security Program

Familiarity with the subject matter experts and stakeholders that need to be engaged, and how to apply their expertise to support an organization in the establishment of an Information Security Management System

Develop fundamental knowledge and skills required to manage a team that is implementing the ISO27001 standard

What You Get!

What each student will receive
  • a copy of all slides presented during the class
  • a certificate of completion awarding 35 Continuing Professional Development (CDP) units
  • A free Professional membership with the Information Security Leadership Forum (a $95 value)
  • A Student Information Package (SIP) with study tips and other helpful and insightful information for the course and exam
  • An exam and certification application voucher.

Certification Exam Information

What you need to know
  • There are two exams for this course, a practical and a written exam. Students are required to achieve a minimum passing grade in both in order to qualify for certification.
  • The written exam is completed within 3 hours on Friday morning, and is in a multiple choice format. The exam begins punctually at 9:00 AM and ends at 12:00 PM. As such, students must arrive no later than 8:30 AM, at which time the exam instructions will be read to the class, and students may ask any final questions. This exam is an open book exam.
  • The practical exam is completed Friday afternoon with a live presentation to a panel of guest executives (CISO, CIO, CFO, COO, CEO, etc.).
  • All students are required to sign a non-disclosure agreement prior to commencement of the exam, attesting they will not disclose or discuss anything related to either the practical or written exams with any other person(s).
  • Students must bring (1) a copy of their student registration, and (2) at least one state / provincial or federal government issued identification card, both of which must be presented upon entering the examination room. Entrance will not be permitted without both.

Special Notes

  • In the ticket selection for our courses, "member" versus "non-member" tickets refers to if the individual registering for the course is an active member of the Information Security Leadership Forum in good standing, at the time of course registration, or not. Information Security Leadership Forum members receive significant discounts that exceeds the value of membership. 
  • Students will receive a discount code for a free membership with the Information Security Leadership Forum. This code is only valid for use by the registered student. Students must register and setup an account at least one week prior to the beginning of your course as there may be pre course work that must be completed, as well as messages from your instructor.
  • Student are prohibited from recording (audio or video) any session(s), or portions of any session, no matter whether the student is attending a classroom-based or online version.
  • All student material for this course will be provided on or before the first day of training, by the course instructor via the Information Security Leadership Forum's Online Training Portal. All course material is copyright protected, and student are prohibited from making any unauthroized electronic or printed copies, or redistrubuting to any person or entity.
  • Student are required to sign a non-compete clause, stating they will not take this course and use the material to create a competing training offering, nor support or participate with any other entity to create and offer a similar commercial fee-based or free offering
  • Students must bring with them or otherwise have readily accessible, a copy of their course registration with barcode (printed or electronic format), which will be used to take daily attendance on the course. Anyone failing to have this information will be refused access.
  • Students understand that they are individually required to comply with any and all government regulations and restrictions or those imposed by an event venue that are in place, or may be imposed within the jurisdiction where this training is scheduled to take place as it relates to non-resident visa, pandemic outbreaks, protests or other emergency situations.
  • The Information Security Leadership Forum, CIMA, affiliate training delivery partners, and venue organizations and their staff, shall not be responsible to provision or assist in the provisioning of any item to assist a student to register or participate in training with us, for compliance with any government imposed requirements i.e. COVID-19 PPE, etc. All students are required to plan for and bring with them, or make arrangements for the provisioning of any and all items that may be required for such situations e.g. facial mask, evidence of virus testing, non-resident visa, etc.