Iso/Ies 27001 Information Security Management Course [2025]
Published 9/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.53 GB | Duration: 5h 10m
Published 9/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.53 GB | Duration: 5h 10m
Practical ISO/IES 27001 Mastery — Risk Management, Compliance, and Cyber Resilience
What you'll learn
Interpret and apply ISO/IES 27001 — Translate requirements into an actionable ISMS architecture tailored to your organisation.
Build a risk-based security program — Conduct risk assessments, choose appropriate controls, and document risk treatment plans.
Achieve regulatory alignment — Map ISO/IES 27001 controls to GDPR and NIS obligations and implement compliance controls.
Prepare for certification and audits — Produce audit-ready policies, evidence, and a roadmap for external certification.
Operationalise security — Embed people, process and technology changes that sustain confidentiality, integrity and availability.
Requirements
No formal ISO 27001 background required. The course starts from fundamentals and advances to implementation.
Helpful but optional: basic familiarity with IT concepts (networks, cloud services) and business process structures.
Access to a computer and internet connection to view materials and download templates.
Curiosity and willingness to apply structured, cross-functional change within your organisation.
Description
This course contains the use of artificial intelligence. Please note that some lectures in this course use text-to-speech (TTS) technology for narration. This was implemented to enhance clarity and provide a consistent learning experience.In a world where data drives decisions and disruption travels at cyber speed, organisations must treat information security as a strategic capability—not an afterthought. This course delivers a rigorous, outcome-driven program that teaches you how to design, implement and maintain an Information Security Management System (ISMS) aligned to ISO/IES 27001. Crafted in the style of elite management-consulting training, the curriculum translates the standard into clear leadership, governance and technical actions so you can lead security change with confidence.This program focuses on three priorities:Risk-led decision making — understand how to identify, evaluate, and treat information risk so business leaders can make informed trade-offs.Regulatory alignment — see how ISO/IES 27001 maps to major obligations such as GDPR and NIS and how to embed controls that support compliance.Operational resilience — build an ISMS that reduces exposure, improves detection, and enables rapid response and recovery.What you will be able to do after this courseInterpret ISO/IES 27001 requirements and translate them into an ISMS structure that fits your organisation.Run risk assessments and develop proportionate risk treatment approaches that protect confidentiality, integrity and availability.Align information security activities with legal and regulatory obligations, including data protection and critical-infrastructure rules.Prepare your organisation for external auditing and certification by understanding evidence, controls and audit expectations.Embed governance and operational practices across people, processes and technology to sustain continuous improvement.Communicate information-security priorities and risk posture effectively to senior stakeholders and cross-functional teams.Who should enrolInformation security and risk practitioners preparing for certification responsibilities.IT managers, cloud architects and operations leads responsible for secure service delivery.Compliance officers and privacy professionals who need to align security controls with regulatory requirements.Business leaders and programme sponsors who oversee security, resilience or digital transformation.Consultants and auditors advising clients on ISMS strategy and certification readiness.Ambitious professionals seeking a robust, career-building foundation in ISO/IES 27001.PrerequisitesNo formal ISO/IES 27001 experience is required. Familiarity with basic IT and cybersecurity concepts will help you move more quickly through technical sections, but anyone with an interest in information security and organisational risk can follow the course.Why this courseThis course is structured to bridge the gap between standard text and real organisational practice. You’ll gain a strategic understanding of how ISO/IES 27001 supports risk management, compliance and business continuity—equipping you to lead implementation, assess maturity, and interact confidently with auditors and executives.Course structure (high-level)The curriculum progresses logically from foundations to implementation and assurance:Foundations and scope — purpose of an ISMS and key concepts.Risk assessment and treatment — methodologies and decision criteria.Controls and implementation — selecting and integrating controls across the organisation.Governance and documentation — policies, roles and responsibilities.Audit readiness and continual improvement — preparing for certification and sustaining the ISMS.Outcomes & career impactCompleting this course prepares you to take on ISMS leadership tasks, contribute meaningfully to certification efforts, and support your organisation in meeting regulatory and cyber-resilience expectations. You’ll be better positioned for roles in security, risk, compliance and governance.Ready to lead information security with clarity and impact?Enroll now and master the principles and practices that make ISO/IES 27001 an effective foundation for organisational security and resilience.
Overview
Section 1: INTRODUCTION - THE NEED FOR INFORMATION SECURITY
Lecture 1 WHAT IS INFORMATION SECURITY?
Lecture 2 HOW ISO 27001 APPLIES TO YOU
Lecture 3 WHY IS IT IMPORTANT TO SAFEGUARD INFORMATION?
Lecture 4 SAFEGUARDING SUMMARY
Section 2: ASSESSING NEEDS AND SCOPE
Lecture 5 ASSESSING BUSINESS NEEDS
Lecture 6 SCOPE AND HIGH-LEVEL TIMEFRAME FOR IMPLEMENTATION
Lecture 7 HIGH-LEVEL TIMEFRAME
Section 3: PROJECT KICK-OFF
Lecture 8 PROJECT KICK-OFF
Lecture 9 SYSTEM ADMIN OR IT MANAGER
Lecture 10 GETTING COMMITMENT
Section 4: INITIAL RISK ASSESSMENT
Lecture 11 MEETING THE TEAM
Lecture 12 PREPARING THE ANALYSIS REPORT
Section 5: RISK MANAGEMENT APPROACH
Lecture 13 DEFINING AND FINALIZING THE RISK ASSESSMENT FRAMEWORK
Lecture 14 WHAT IS A RISK RANKING?
Lecture 15 ASSET DISPOSAL
Lecture 16 MANAGING RISKS
Section 6: EXECUTION
Lecture 17 INFORMATION SECURITY AWARENESS
Lecture 18 WHICH POLICIES AND PROCEDURES ARE COVERED?
Lecture 19 CHANGE MANAGEMENT POLICY
Lecture 20 LEGAL COMPLIANCE POLICY
Lecture 21 UNDERSTANDING AND IMPLEMENTING CONTROLS
Lecture 22 A.6.2.1: MOBILE DEVICE POLICY (ISO 27001 CONTROL)
Lecture 23 A.8 ASSET MANAGEMENT
Lecture 24 A.10 CRYPTOGRAPHY
Lecture 25 A.11 PHYSICAL AND ENVIRONMENTAL SECURITY
Lecture 26 A.12 OPERATIONS SECURITY
Lecture 27 COMMUNICATION SECURITY
Lecture 28 A.14 SYSTEM ACQUISITION, DEVELOPMENT, AND MAINTENANCE
Lecture 29 A.15 SUPPLIER RELATIONSHIPS
Lecture 30 A.17 INFORMATION SECURITY ASPECTS OF BUSINESS CONTINUITY Management
Section 7: INTERNAL AUDIT
Lecture 31 INTERNAL AUDIT
Lecture 32 CLOSING THE FINDINGS AND GAPS
Section 8: MANAGEMENT REVIEW
Lecture 33 MANAGEMENT REVIEW
Lecture 34 CONDUCTING THE REVIEW MEETING
Lecture 35 PLAN IMPROVEMENT
Section 9: EXTERNAL AUDIT
Lecture 36 EXTERNAL AUDIT
Lecture 37 BEST PRACTICES
Lecture 38 SWOT ANALYSIS
Security, IT and risk management practitioners seeking certification-readiness.,Compliance officers and data protection leads aligning controls with regulation.,IT managers and architects responsible for operational security and cloud migration.,Business leaders and programme sponsors who need a strategic view of information risk.,Consultants and auditors who advise clients on ISMS implementation and certification.,Career changers and entry-level professionals aiming to specialise in ISO/IES 27001.