Course curriculum

    1. Agenda & Introduction

      FREE PREVIEW
    1. Overview & Fundamentals

    1. Key changes (High level)

    1. Structure & Clause 1 to 3

    2. Clause 4: Context of the Organisation

    3. Clause 5: Leadership

    4. Clause 6: Planning

    5. Clause 7: Support

    6. Clause 8: Operation

    7. Clause 9: Performance Evaluation

    8. Clause 10: Improvement

    1. Final Quiz

    1. Course survey

About this course

  • 14 lessons
  • 1.5 hours of video content
  • Certificate accredited by UKAS
  • £595 £295

Instructor

ERS Academy

Meet our instructor, an experienced professional with over 20 years in the field of ISO Standards. As a member of the ERS Academy team, they have completed advanced auditor training courses and have extensive experience performing audits on behalf of UKAS-accredited certification bodies. With their deep understanding of various ISO Standards, they are well-equipped to provide training courses that cover a wide range of topics, ensuring that students leave with the knowledge and skills they need to succeed in their respective fields.

Benefits of getting a Certificate

Certificate of competence proves that you attended the eTraining course, and that you passed the exam certified by BCS ( which is UKAS accredited Certification Body ). This ensures that you understand and can apply the knowledge you gained in each of the course's modules.

Bonus material with the course

  • Certificate from BCS

  • Join ERS Online Community

What you'll get from this course

______

  • Awareness

    Provides security awareness within an organization, employees will be better equipped to identify potential security threats and take appropriate action to protect sensitive information.

  • Knowledge on information security

    ISO 27001:2022 provides a framework for managing and protecting sensitive information, which can help organizations reduce the risk of data breaches and protect against cyber threats.

  • Risk management

    The standard provides a framework for identifying, assessing, and mitigating information security risks, which can help organizations make more informed decisions about how to protect their assets.