Educational Program

ISO/IEC 27001:2022

Standard Requirements - Internal Auditors - Auditors/Lead Auditors of Information Security Management Systems

  • Directors and executives of companies in the certification process
  • Technical directors and IT directors
  • Information Security Systems managers
  • Management Systems’ auditors and department managers
  • Business consultants
Information

Course Duration: 3 Days

The modern threats that businesses face on a daily basis from the rapid development of technology and the ever-increasing volume of information, force them to implement a system that manages the security of their information. One such Information Security Management system is the ISO/IEC 27001:2022 standard.

The training course aims to inform about the necessity of implementing Information Security Management Systems, the benefits that organizations will derive from their implementation, and how they can proceed with the implementation and certification of the system they have implemented. After the completion of the training course, the participants will have a comprehensive knowledge of how to apply Information Security Management Systems based on the ISO/IEC 27001:2022 standard.

The standard contains 10 thematic modules, which examine the key areas of information management and are analyzed in the training program:

  • Information security policy: detailed understanding of any company’s business objectives and creation of the appropriate information security policy
  • Information security infrastructure: formation of the appropriate administrative framework to begin implementing and controlling information security within any company
  • Asset classification and control: detailed recording of any company’s corporate resources and determination of the level of security required for these resources
  • Personnel security: reducing risks from human errors, thefts, frauds or misuse of corporate resources, as well as ensuring that the personnel of any company are aware of the information security policy and are applying it in their daily work
  • Physical and environmental security: preventing any unauthorized access, damage and interference to the business facilities and to the information
  • Computer network management: ensuring the proper and secure operation of the information processing capabilities, minimizing the risk of computer systems being put out of service, protecting the integrity of software and information, ensuring the protection of information in networks and related infrastructure
  • Access control: controlling any access to information, ensuring the protection of networks, preventing any unauthorized access to computers, detecting any unauthorized activities
  • System development and maintenance: aiming to ensure that the necessary security is included in the operating system, to prevent the loss, modification or misuse of application user data, to ensure that programs and support activities are managed in a secure manner
  • Business continuity planning: designing a response to any disruptions in business activities and critical business processes resulting to significant failures and disasters
  • Compliance: avoiding any violations of criminal or civil law, legal, regulatory or contractual obligations and security requirements

To find out about the cost of the courses, contact us. BQC adjusts its pricing policy for the unemployed and students. Every second participation from the same company will have a 10% discount.

The training methodology includes lectures, practice and teamwork.

In this context, the participants are asked to carry out group and individual exercises, role playing exercises, and evaluation tests that aim to develop their skills (time management, teamwork, cooperation).

In the end, a satisfaction questionnaire is distributed to the participants in order to evaluate the results of their training and the achievement of its objectives.

  • What is the information security and historical review
  • Identification of information resources and the determinination of the value of information
  • Requirements of the ISO/IEC 27001:2022 standard and other standards and the relationship between them
  • Identification of controls and Statement of Applicability (SoA)
  • Determination of the value of information and of the involved risks and impacts
  • Information Security Management Systems implementation plan
Interest Form
Please fill out the interest form

Available Courses

02-03/06/2025
ISO/IEC 27001:2022 - Information Security Management System - Standard Requirements
02-04/06/2025
ISO/IEC 27001:2022 - Information Security Management System - Internal Auditors
02-06/06/2025
ISO/IEC 27001:2022 -Auditors/Lead Auditors of Information Security Management Systems

Why choose BQC

For the implementation of the training courses, renowned lecturers are selected, with extensive knowledge and experience in the field of Management Systems and, by extension, on the standards.

BQC, by recognizing modern trends in the field of Training, has created a wide network of experts and trainers around the world, which it uses to offer high-level knowledge and experience in the field of Education.

The training courses offered by BQC are certified by the Accredited Personnel Certification Body STAREGISTER, a member of the IPC, thus providing the possibility of issuing accredited certificates of international recognition according to the ISO/IEC 17024:2012 standard to those successfully participating in them.

Recommended Certification Combinations