ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
are included in the price of the training course
over 450 pages of information and practical examples will be distributed
31 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
you can retake the exam within 12 months for free
The requirements for PECB Auditor Certifications are:
Credential |
Exam |
Professional experience |
MS audit/assessment experience |
Other requirements |
PECB Certified ISO/IEC 27001 Provisional Auditor |
PECB Certified ISO/IEC 27001 Lead Auditor exam or equivalent |
None |
None |
Signing the PECB Code of Ethics |
PECB Certified ISO/IEC 27001 Auditor |
PECB Certified ISO/IEC 27001 Lead Auditor exam or equivalent |
Two years: One year of work experience in Information Security Management |
Audit activities: a total of 200 hours |
Signing the PECB Code of Ethics |
PECB Certified ISO/IEC 27001 Lead Auditor |
PECB Certified ISO/IEC 27001 Lead Auditor exam or equivalent |
Five years: Two years of work experience in Information Security Management |
Audit activities: a total of 300 hours |
Signing the PECB Code of Ethics |
PECB Certified ISO/IEC 27001 Senior Lead Auditor |
PECB Certified ISO/IEC 27001 Lead Auditor exam or equivalent |
Ten years: Seven years of work experience in Information Security Management |
Audit activities: a total of 1,000 hours |
Signing the PECB Code of Ethics |
Note: PECB Certified Individuals who do possess the Lead Implementer and Lead Auditor Credentials are qualified for the respective PECB Master Credential, given they have taken 4 additional Foundation Exams which are related to this scheme. For more detailed information about the Foundation Exams and the overall Master Requirements, please go to the following link: https://pecb.com/en/master-credentials.
To be considered valid, these audits should follow best audit practices and include the following activities:
1. Audit planningProvide a safe and sustainable business environment for your company. We help build a resilient and reliable digital landscape, even in the face of changing threats.
Analysis of employee awareness focuses on mapping the skills and increasing the competencies of the weakest link in cyber security: the users, the employees.
Threat assessment is a tactical and technical service that allows a company to get a quick overview of external threats.
Maturity assessment helps plan IT investments and design further steps to mitigate vulnerabilities and ensure better security.