Advanced Certificate in ISO 27001:2013 Information Security Auditor Training

-- viewing now

ISO 27001:2013 is a widely adopted international standard for information security management systems. This Information Security Auditor Training is designed for professionals who want to assess and improve the security posture of organizations.

4.5
Based on 5,874 reviews

3,025+

Students enrolled

GBP £ 149

GBP £ 215

Save 44% with our special offer

Start Now

About this course

Learn how to identify and mitigate security risks, conduct audits, and implement controls to ensure compliance with ISO 27001:2013 standards. This training is ideal for IT auditors, security professionals, and compliance officers who want to enhance their skills in information security auditing. Gain hands-on experience in conducting audits, analyzing results, and providing recommendations to improve an organization's information security. Take the first step towards becoming a certified information security auditor and explore the world of ISO 27001:2013 today!

100% online

Learn from anywhere

Shareable certificate

Add to your LinkedIn profile

2 months to complete

at 2-3 hours a week

Start anytime

No waiting period

Course details


Information Security Management System (ISMS) Overview - This unit introduces the fundamental concepts of ISMS, including the ISO 27001:2013 standard, its benefits, and the role of an ISMS auditor. •
Risk Management and Risk Treatment - This unit focuses on the risk management process, including risk identification, risk assessment, risk treatment, and risk monitoring, which is a critical aspect of ISO 27001:2013. •
Information Security Controls and Governance - This unit explores the various types of information security controls, including technical, administrative, and physical controls, as well as the importance of governance in an ISMS. •
ISO 27001:2013 Certification Process and Requirements - This unit covers the certification process, including the audit process, the certification process, and the requirements for an ISMS, including the 11 control objectives. •
Information Security Auditing and Assessment - This unit provides an overview of the auditing process, including the planning, conducting, and reporting phases, as well as the importance of assessment in an ISMS. •
Information Security Governance and Compliance - This unit focuses on the governance aspects of an ISMS, including the role of the board of directors, the information security policy, and compliance with regulatory requirements. •
Information Security Management System (ISMS) Implementation and Maintenance - This unit covers the implementation and maintenance of an ISMS, including the establishment of an information security policy, the identification of information security risks, and the implementation of controls. •
Information Security Awareness and Training - This unit emphasizes the importance of information security awareness and training in an ISMS, including the role of employees, management, and the board of directors. •
Information Security Metrics and Monitoring - This unit explores the importance of metrics and monitoring in an ISMS, including the use of key performance indicators (KPIs), the monitoring of information security incidents, and the reporting of information security metrics. •
Information Security and Business Continuity Management (BCM) - This unit covers the relationship between information security and business continuity management, including the importance of BCM in an ISMS and the role of BCM in ensuring business continuity.

Career path

Information Security Auditor Career Roles: 1. Information Security Auditor Conduct regular security audits to identify vulnerabilities and ensure compliance with industry standards. Analyze data to identify trends and provide recommendations for improvement. 2. Cyber Security Consultant Work with organizations to assess and improve their cyber security posture. Develop and implement security strategies to protect against threats and data breaches. 3. Compliance Officer Ensure that an organization's information security practices comply with relevant laws and regulations. Develop and maintain policies and procedures to ensure data protection. 4. Risk Manager Identify and assess potential risks to an organization's information assets. Develop and implement strategies to mitigate these risks and ensure business continuity. 5. Information Security Manager Oversee the development and implementation of an organization's information security strategy. Ensure that security practices are aligned with business objectives and that data is protected. 6. Penetration Tester Simulate cyber attacks on an organization's systems to identify vulnerabilities and weaknesses. Provide recommendations for improvement and help to develop security strategies. 7. Security Analyst Monitor and analyze security event logs to identify potential threats. Develop and implement incident response plans to minimize the impact of security breaches. 8. Data Protection Officer Ensure that an organization's data protection practices comply with relevant laws and regulations. Develop and maintain policies and procedures to ensure data protection. 9. IT Security Specialist Implement and maintain an organization's IT security systems and infrastructure. Ensure that security practices are aligned with business objectives and that data is protected. 10. Security Architect Design and implement an organization's security architecture. Ensure that security practices are aligned with business objectives and that data is protected.

Entry requirements

  • Basic understanding of the subject matter
  • Proficiency in English language
  • Computer and internet access
  • Basic computer skills
  • Dedication to complete the course

No prior formal qualifications required. Course designed for accessibility.

Course status

This course provides practical knowledge and skills for professional development. It is:

  • Not accredited by a recognized body
  • Not regulated by an authorized institution
  • Complementary to formal qualifications

You'll receive a certificate of completion upon successfully finishing the course.

Why people choose us for their career

Loading reviews...

Frequently Asked Questions

What makes this course unique compared to others?

How long does it take to complete the course?

What support will I receive during the course?

Is the certificate recognized internationally?

What career opportunities will this course open up?

When can I start the course?

What is the course format and learning approach?

Course fee

MOST POPULAR
Fast Track GBP £149
Complete in 1 month
Accelerated Learning Path
  • 3-4 hours per week
  • Early certificate delivery
  • Open enrollment - start anytime
Start Now
Standard Mode GBP £99
Complete in 2 months
Flexible Learning Pace
  • 2-3 hours per week
  • Regular certificate delivery
  • Open enrollment - start anytime
Start Now
What's included in both plans:
  • Full course access
  • Digital certificate
  • Course materials
All-Inclusive Pricing • No hidden fees or additional costs

Get course information

We'll send you detailed course information

Pay as a company

Request an invoice for your company to pay for this course.

Pay by Invoice

Earn a career certificate

Sample Certificate Background
ADVANCED CERTIFICATE IN ISO 27001:2013 INFORMATION SECURITY AUDITOR TRAINING
is awarded to
Learner Name
who has completed a programme at
London School of Planning and Management (LSPM)
Awarded on
05 May 2025
Blockchain Id: s-1-a-2-m-3-p-4-l-5-e
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
SSB Logo

4.8
New Enrollment