Lead Implementer Training

Training Course Overview

ISO/IEC 27001 Lead Implementer training course enables participants to acquire the knowledge necessary to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an information security management system (ISMS).

Why Should You Attend?

Information security threats and attacks increase and improve constantly. The best form of defense against them is the proper implementation and management of information security controls and best practices. Information security is also a key expectation and requirement of customers, legislators, and other interested parties.

This training course is designed to prepare participants in implementing an information security management system (ISMS) based on ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement.

After attending the training course, you can take the exam. If you successfully pass it, you can apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which demonstrates your ability and practical knowledge to implement an ISMS based on the requirements of ISO/IEC 27001.

Who can Attend?

  • Managers or consultants involved in and/or concerned with the implementation of an information security management system in an organization 
  • Project managers, consultants, or expert advisers seeking to master the implementation of an information security management system; or individuals responsible to maintain conformity with the ISMS requirements within an organization
  • Members of the ISMS team

Learning objectives

By the end of this training course, the participants will be able to:

  1. Explain the fundamental concepts and principles of an information security management system (ISMS) based on ISO/IEC 27001
  2. Interpret the ISO/IEC 27001 requirements for an ISMS from the perspective of an implementer
  3. Initiate and plan the implementation of an ISMS based on ISO/IEC 27001, by utilizing PECB’s IMS2 Methodology and other best practices
  4. Support an organization in operating, maintaining, and continually improving an ISMS based on ISO/IEC 27001
  5. Prepare an organization to undergo a third-party certification audit

Educational approach

  • This training course contains essay-type exercises, multiple-choice quizzes, examples, and best practices used in the implementation of an ISMS.
  • The participants are encouraged to communicate with each other and engage in discussions when completing quizzes and exercises. 
  • The exercises are based on a case study. 
  • The structure of the quizzes is similar to that of the certification exam.

Prerequisites

The main requirement for participating in this training course is having a general knowledge of the ISMS concepts and ISO/IEC 27001.

Introduction to ISO/IEC 27001 and initiation of an ISMS implementation

Implementation plan of an ISMS

Implementation of an ISMS

ISMS monitoring, continual improvement, and preparation for the certification audit

Certification exam

Lead Auditor Training

ISO/IEC 27001 Lead Auditor 
ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.

Why should you attend?

During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process.

Based on practical exercises, you will be able to master audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution.

After acquiring the necessary expertise to perform this audit, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Auditor” credential. By holding a PECB Lead Auditor Certificate, you will demonstrate that you have the capabilities and competencies to audit organizations based on best practices.

Who can attend?

  • Auditors seeking to perform and lead information security management system (ISMS) audits
  • Managers or consultants seeking to master the information security management system audit process
  • Individuals responsible to maintain conformity with the ISMS requirements in an organization
  • Technical experts seeking to prepare for the information security management system audit
  • Expert advisors in information security management

Learning objectives
By the end of this training course, the participants will be able to:

  1. Explain the fundamental concepts and principles of an information security management system (ISMS) based on ISO/IEC 27001
  2. Interpret the ISO/IEC 27001 requirements for an ISMS from the perspective of an auditor
  3. Evaluate the ISMS conformity to ISO/IEC 27001 requirements, in accordance with the fundamental audit concepts and principles
  4. Plan, conduct, and close an ISO/IEC 27001 compliance audit, in accordance with ISO/IEC 17021-1 requirements, ISO 19011 guidelines, and other best practices of auditing
  5. Manage an ISO/IEC 27001 audit program

Educational approach

  • This training is based on both theory and best practices used in ISMS audits
  • Lecture sessions are illustrated with examples based on case studies
  • Practical exercises are based on a case study which includes role playing and discussions
  • Practice tests are similar to the Certification Exam

Prerequisites

A fundamental understanding of ISO/IEC 27001 and comprehensive knowledge of audit principles.

Introduction to the information security management system (ISMS) and ISO/IEC 27001

Audit principles, preparation, and initiation of an audit

On-site audit activities

Closing the audit

Certification Exam

Power BI Course

In the modern world, one of the significant challenges in business is managing data and processing it effectively. On one hand, there is the challenge of receiving data, and on the other hand, the ability to accurately analyze the received data is crucial. In response to these challenges, the demand for the position of a data analyst is increasing, making it one of the growing and popular career directions of the 21st century.

Power BI is a modern data visualization tool that will allow you to process, visualize and analyze large amounts of data quickly and efficiently.

Who is the training intended for?

The training is intended for those who are interested in data analytics, who often have to produce various types of reports and want to learn modern data processing techniques.

Trainers

The training will be led by Giorgi Jokhadze, the co-founder of Kaizen Institute Georgia and AOTS Georgia, the official representative of TEMOS International in Georgia, who has many years of experience in the field of business analytics.

The course will be held in Georgian, and a Syntax Academy certificate will be issued.

Global trend – digital transformation

BI and the World market

Task #1 (Excel format)

Task Review (#1)

Preparing a test Power BI database

Principles of database operation

Task #2 (Excel format)

Task Review (#2)

DAX – Power BI programming language

Creating the first formulas in DAX

Integrating formulas into Power BI visuals

Task #3 (DAX & Power BI Format)

Task Review (#3)

Programming in DAX and Data Processing (continued)

Task #4 (DAX & Power BI Format)

Task Review (#4)

Programming in DAX and Data Processing (continued)

Task #5 (DAX & Power BI Format)

Task Review (#5)

Talking with Data (The Importance of Visualization)

Reviewing the results of the task (#2)

Summary of the course

Questions and Answers

Satisfaction survey

Certifications

Microsoft 365 Training

The aim of the training course is for the trainees to get:

  1. General information about Microsoft 365
  2. Learn more about specific features in Teams, Planner, and OneDrive that will make their day-to-day work easier

Training Format

  • Combined training format (theory with practice)
  • Workshop

Main topics

  1. What is Microsoft 365
  2. What is Teams and What do we use it for?
    • How to download, install and manage our Teams
    • What we can do in chat and how we share documents with each other
    • Creating a group and related channel
    • What functionality is available within our group and related channels
    • Manage users and rights in the group
    • How we schedule and manage meetings both within and outside the group
    • Sharing files and working on them at the same time
    • Using other third party applications both within the group and individually
  3. What is Planner and What do we use it for?
    • Create Project
    • Creating subtasks and attaching them to a specific person
    • An overview of the created project: how many tasks have been created, which have been completed on time, which tasks are overdue, etc.
    • Using Planner both within a group and individually
  4. What is OneDrive and What do we use it for?
    • How to create different types of documents (Word, Excel, PowerPoint) and files.
    • How to share files and folders with each other according to appropriate security policies
    • How to work together on the same document with several employees at the same time
  5. Workshop

Training results and competencies

After completing the course, the training participant will know:

  • What are the three specific services of Microsoft 365 Teams, Planner, OneDrive and what are they used for.
  • Full user functionality and usage.

What is Microsoft 365

What is Teams and What do we use it for?

  • How to download, install and manage our Teams
  • What we can do in chat and how we share documents with each other
  • Creating a group and related channel
  • What functionality is available within our group and related channels
  • Manage users and rights in the group
  • How we schedule and manage meetings both within and outside the group
  • Sharing files and working on them at the same time
  • Using other Third party applications both within the group and individually

What is Planner and What do we use it for?

  • Create Project
  • Creating subtasks and attaching them to a specific person
  • An overview of the created project: how many tasks have been created, which have been completed on time, which tasks are overdue, etc.
  • Using Planner both within a group and individually

What is OneDrive and What do we use it for?

  • How to create different types of documents (Word, Excel, PowerPoint) and files.
  • How to share files and folders with each other according to appropriate security policies
  • How to work together on the same document with several employees at the same time

Workshop

ITIL V4 Foundation Course

ITIL® is the world’s leading best practice framework for implementing IT Service Management. ITIL 4 introduces IT Service Management through the lens of a Service Value System (SVS), which provides a holistic end-to-end view of how to successfully contribute to business value. This foundational course immerses you in the guiding principles, dimensions, and practices of ITIL® 4.

By completion of this course, you will have a deep understanding of the 7 Guiding Principles, 4 Dimensions of Service Management, 34 ITIL® Practices, and the new Value Service Chain that incorporate the core of ITIL® 4.

ITIL 4 OVERVIEW

  • Introduction to ITIL
  • Key Concepts of ITIL

THE ITIL FRAMEWORK

  • The Four Dimensions of Service Management
  • The ITIL Service Value System

THE ITIL GUIDING PRINCIPLES

  • Focus on Value
  • Start Where You Are
  • Progress Iteratively with Feedback
  • Collaborate and Promote Visibility
  • Think and Work Holistically
  • Keep It Simple and Practical
  • Optimize and Automate

THE ITIL SERVICE VALUE SYSTEM

  • Governance
  • The Service Value Chain
  • Continual Improvement

KEY ITIL PRACTICES

  • Continual Improvement
  • Service Level Management
  • Change Control
  • Incident Management
  • Service Request Management
  • Service Desk
  • Problem Management

OTHER ITIL PRACTICES

  • General Management Practices
  • Service Management Practices
  • Technical Management Practices

© 2023 Syntax. All right reserved.