Course Details
With the growing number of internal and external information security threats, organizations are increasingly recognizing the importance of implementing best practice controls to safeguard their information assets. By implementing and maintaining suitable controls, organizations become less susceptible to information security breaches and the financial and reputational damage they cause.
ISO/IEC 27002 provides guidelines to help organizations select, implement and manage information security controls, taking into account their risk environment. It contains 4 security control clauses, which cover 93 controls. These controls are intended to be applicable to all organizations and represent a minimum ‘starting point’, i.e. additional controls and guidelines can be added as required. The standard supports the concepts and framework specified in ISO/IEC 27001.
This course aims to provide clear and practical guidance on implementing the controls from ISO/IEC 27001 and other relevant management practice guidance.
Course Aim
This course aims to assist organizations to implement commonly accepted information security controls, either as part of an ISO/IEC 27001 information security management system (ISMS) or as a standalone activity through the use of ISO/IEC 27002.
How will I benefit?
This course will help you:
- Apply the best practice controls contained in ISO/IEC 27002
- Identify the key benefits of using ISO/IEC 27002 to protect information assets, as part of an effective ISMS or as a standalone activity
- Explain the rationale behind the processes and usages associated with the controls
- Recognize how implementing these commonly accepted controls will help reduce levels of risk within your organization
- Implement the controls more effectively through clear and practical guidance
This course will help organizations identify appropriate controls to be implemented in different situations, along with the benefits and potential pitfalls of doing so.
What will I learn?
Upon completion of this training, you will be able to:
- Explain the background and purpose of ISO/IEC 27002
- Explain the scope and structure of ISO/IEC 27002
- Recognize the different best practice controls recommended by ISO/IEC 27002
- Define the benefits of implementing controls from ISO/IEC 27002
- Evaluate how to use the controls in conjunction with an ISO/IEC 27001 based ISMS
- Demonstrate how to choose the appropriate controls relevant to you
- Implement chosen controls from ISO/IEC 27002
Who should attend?
Anyone who wants to learn:
•To identify and understand commonly accepted information security controls
•How risks can be reduced to an acceptable level using controls
•How to determine which controls are the most appropriate to implement
•Practical implementation of ISO/IEC 27002 controls
•The benefits and pitfalls associated with the use of different controls
The course is applicable to representatives from any size or type of organization who is, or will be, involved in planning, implementing, maintaining, supervising or assessing information security, as part of an ISO/IEC 27001 ISMS or a standalone system.
Course Duration
2 days
How will I Learn?
Our unique accelerated approach fast tracks learning, improves knowledge retention and ensures you get the skills to apply your knowledge straight away. This course involves practical activities, group discussions and classroom learning to help you develop a deeper understanding of the material and have a greater impact on job performance. Practical activities will help to cement the concepts behind the use of information security controls from ISO/IEC 27002.
What will I gain?
On completion, you’ll be awarded an internationally recognized BSI Training Academy certificate.
Prerequisites
We recommend that you have a basic understanding of information security principles and terminology.
We also recommend that you have an understanding of the information risks faced by their organization.
A basic understanding of ISO/IEC 27001, information technology and information risk management may be an advantage.
Some delegates on this course will have already attended our Information Security Management System (ISMS) Requirements of ISO 27001, or Information Security Management System (ISMS) Implementing ISO/IEC 27001 course.
Related training
You may also be interested in our Information Security Management System (ISMS) Requirements of ISO 27001, or Information Security Management System (ISMS) Implementing ISO/IEC 27001 course.
You may also be interested in our Information Security courses for ISO 27005, ISO 27018, ISO 27032, or PCI DSS.
Course Materials
Soft Copy: You will receive an email prior to the course with instructions on how to access the online Student Handbook, which can be viewed, downloaded or printed.
Course Logistics
If your class is Live Online:
- Students need to connect to the class from any internet accessible location.
- Webcam and Microphone are REQUIRED.
- ALL course times shown are US EASTERN TIME.
If your class is In-person :
- You are encouraged to bring a laptop with you to class.
*Session lengths could vary depending on amount of class discussion.
All Upcoming Course Dates
Date and Time | Location | Fees | Enroll |
---|---|---|---|
Apr 28, 2025 9:00 AM - 5:30 PM ET Apr 29, 2025 9:00 AM - 5:30 PM ET | Live Online - Full Day | USD $1350.00 | Enroll |
Sep 29, 2025 9:00 AM - 5:30 PM ET Sep 30, 2025 9:00 AM - 5:30 PM ET | Live Online - Full Day | USD $1350.00 | Enroll |
The venues for scheduled courses are tentative until receipt of a course confirmation from BSI.