ISO 27001: Information Security — Excellence Institute
ISO Standard · Information Security

ISO 27001:
Information Security

Protect What Matters. Build Trust That Lasts.

In an era of escalating cyber threats and data breaches, understanding how to establish, implement, and maintain an Information Security Management System based on ISO 27001 is no longer optional — it is essential. This programme gives professionals the technical and managerial skills to defend their organisation's most critical digital assets, ensure regulatory compliance, and build a culture of proactive information security.

ISMS Design Risk Treatment Annex A Controls Data Privacy Cyber Resilience Compliance Security Culture
Duration 3 Days
Level Intermediate – Advanced
Delivery In-Person · Virtual · Self-Paced
Standard ISO/IEC 27001:2022
Choose Your Format
Enrol in ISO 27001
Select a delivery mode to get started
🏫
In-Person Group work, demos & live projects
💻
Virtual Live online, fully interactive
🕐
Self-Paced Learn on your own schedule
Enrol Now → Request In-House Delivery
ISO/IEC 27001:2022 certified content
Certificate of completion included
Full Annex A controls reference guide
In-house cohort delivery available
About This Programme

From Security Incidents to a Culture of Protection

Data breaches are no longer a question of if — they are a question of when, and how prepared your organisation is to prevent, detect, and respond to them. ISO/IEC 27001:2022 provides the globally accepted framework for designing an Information Security Management System (ISMS) that moves your organisation from reactive incident response to a proactive, disciplined security posture.

⚠️

The stakes are real. The average cost of a data breach continues to rise year on year, and regulatory frameworks — from GDPR to sector-specific mandates — increasingly demand demonstrable information security governance. ISO 27001 is the internationally recognised standard that satisfies regulators, reassures clients, and protects the organisation.

This programme goes well beyond a theoretical overview of the standard. Delivered by practising information security and governance professionals, every module translates ISO 27001:2022 requirements into actionable steps — covering ISMS design, risk assessment methodology, Annex A control selection, and the cultural and managerial disciplines that make security frameworks actually work inside real organisations.

Participants leave with a working ISMS architecture, a populated information security risk register, a practical understanding of all 93 Annex A controls, and the credentials to lead or support an ISO 27001 implementation with confidence.

Learning Outcomes

What You Will Walk Away With

🏗️

The ability to design, scope, and implement an Information Security Management System aligned to ISO/IEC 27001:2022 requirements.

🔍

Practical skills in information security risk identification, analysis, evaluation, and treatment using structured IS-specific methodologies.

🗂️

A working knowledge of all 93 Annex A controls — how to select, implement, and justify the controls relevant to your organisation.

🌐

Confidence navigating global data privacy regulations — including GDPR obligations and how ISO 27001 supports compliance with them.

🛡️

The tools to build a proactive security culture — moving beyond policy documents to the leadership behaviours and team practices that sustain security.

📋

Ready-to-use outputs: ISMS scope statement, information security risk register, Statement of Applicability (SoA) template, and incident response framework.

Annex A Controls Overview

Covering All 93 Controls Across Four Domains

ISO/IEC 27001:2022 introduced a restructured Annex A with 93 controls organised across four domains. This programme ensures participants understand every domain — and can make confident, justified decisions about which controls apply to their organisation's context.

ISO 27001:2022 — Annex A Control Domains
Each domain is covered in depth across the programme. Participants will learn how to complete a Statement of Applicability (SoA) and justify control selection to auditors and stakeholders.
🏢
Organisational Controls
37 controls
👤
People Controls
8 controls
🏛️
Physical Controls
14 controls
💻
Technological Controls
34 controls
Programme Curriculum

What the Course Covers

MODULE 01
The Information Security Landscape
Half day · Context, threats & the case for ISO 27001
  • The modern threat landscape — attack vectors, actors, and the evolving risk environment
  • Why technical controls alone are insufficient: the governance and cultural dimension of security
  • Introduction to ISO/IEC 27001:2022 — structure, clauses, and what the standard requires
  • How ISO 27001 relates to ISO 27002, ISO 31000, and other governance frameworks
  • The business case for an ISMS — regulatory drivers, client expectations, and operational resilience
MODULE 02
Scoping & Establishing the ISMS
Half day · Framework design & leadership requirements
  • Understanding the organisation and its context — internal and external factors relevant to information security
  • Identifying interested parties and their requirements — regulators, clients, and supply chain
  • Defining the ISMS scope: boundaries, applicability, and common scoping mistakes to avoid
  • Leadership commitment and top management obligations under ISO 27001
  • Drafting an Information Security Policy that is meaningful, not just compliant
  • Roles, responsibilities, and accountability structures within the ISMS
MODULE 03
Information Security Risk Assessment
Full day · IS-specific risk methodology
  • Information asset identification and classification — what needs protecting and why
  • Threat and vulnerability identification techniques specific to information security
  • IS risk analysis: likelihood, impact, and the CIA triad (Confidentiality, Integrity, Availability)
  • Risk evaluation and prioritisation — building and using an information security risk register
  • Defining risk acceptance criteria and information security risk appetite
  • Hands-on: conducting a full IS risk assessment on a real-world case scenario
MODULE 04
Annex A Controls — Selection & Implementation
Full day · All 93 controls across four domains
  • Overview of all 93 controls in ISO 27001:2022 Annex A — what changed from the 2013 version
  • Organisational controls: policies, threat intelligence, supplier relationships, incident management
  • People controls: screening, terms of employment, awareness, and disciplinary process
  • Physical controls: secure areas, clear desk, equipment maintenance, and disposal
  • Technological controls: access management, cryptography, malware protection, and logging
  • Completing the Statement of Applicability (SoA) — justifying inclusion and exclusion of controls
  • Hands-on: building your organisation's SoA draft using real criteria
MODULE 05
Building a Security Culture & Awareness Programme
Half day · People, behaviour & communication
  • Why most ISMS failures are people failures — the behavioural dimension of information security
  • Designing a security awareness programme that actually changes behaviour
  • Communication planning: what to communicate, to whom, and how often
  • Training requirements under ISO 27001 and how to satisfy them practically
  • Security in the supply chain — extending your ISMS obligations to third-party relationships
MODULE 06
Incident Response, Monitoring & Continual Improvement
Half day · Operations, audit & ISMS performance
  • Information security incident management — detection, classification, response, and lessons learned
  • Designing an incident response plan aligned to ISO 27001 requirements
  • Internal audit of the ISMS — scope, methodology, and how to report findings effectively
  • Management review requirements — what must be reviewed, how often, and by whom
  • Nonconformity and corrective action — addressing gaps without creating bureaucracy
  • Continual improvement of the ISMS: embedding review cycles and performance indicators
Who Should Attend

Built For These Professionals

🔐 Information Security Managers

Professionals responsible for designing, implementing, or managing information security programmes and ISMS frameworks.

⚖️ Compliance & Data Protection Officers

Those navigating GDPR, sector-specific data regulations, and needing a robust governance framework to support compliance obligations.

🛡️ IT & Cybersecurity Professionals

Technical professionals who need to connect their hands-on security work to a recognised governance framework for audit and assurance purposes.

🔍 Internal & External Auditors

Audit professionals conducting or preparing for ISO 27001 audits who need a deep understanding of ISMS requirements and Annex A controls.

🏢 Senior Leaders & CISOs

Executives and board members responsible for information security governance who need a structured, credible framework to lead with.

🌐 Consultants & Advisors

GRC and IT advisory professionals supporting organisations through ISO 27001 implementation, certification, or ongoing ISMS management.

Participant Feedback

What Past Delegates Say

I had been managing our security function for three years without a structured framework. This course gave me the architecture I needed — I left with a scoped ISMS, a completed SoA, and a risk register my leadership team finally understood. The Annex A walkthrough alone was worth the entire programme.

F
Funmi A.
Head of Information Security, Financial Services Group

Our organisation was preparing for ISO 27001 certification and I needed to understand the standard deeply, not just theoretically. The programme bridged that gap completely. The facilitator brought real implementation experience — the case studies were drawn from actual projects, not textbooks. Outstanding.

C
Chidi O.
IT Governance Manager, Telecoms Group

Ready to Build an Information Security Programme That Lasts?

Join professionals across industries who have implemented ISO 27001 frameworks, earned internationally recognised credentials, and earned the trust of their clients and regulators.

Scroll to Top