🏛️ Become LAPT Centre

Join the LAPT global accredited centre network and offer world-class professional certifications.

✔ Globally recognised certifications ✔ Curriculum & LMS support ✔ Dedicated partner manager ✔ Revenue share model

Contact Person

Organisation Details

By submitting you agree to be contacted by LAPT's partnerships team regarding accreditation.

All Industries ISO Security Safety & Risk Information Security
🏭 ISO Security Safety & Risk

Information Security
Professional Certifications

Professional Certifications in Information Security

10
Certifications
12
Subjects
45
Chapters
9
Books Ready
✅ ISBN-Listed Published Books
📚 Printed & Digital Editions
🎓 Industry Recognised Certifications
🌐 Online LMS Included

💡
What is Information Security?

Information Security is a specialist domain within ISO Security Safety & Risk, covering the professional knowledge, frameworks and applied skills demanded by today's practitioners. LAPT certifications in this area are built to international standards and supported by a complete set of published learning materials.

🚀
Why Get LAPT Certified?

Each LAPT certification is backed by a complete professional library:

  • Published study book — print & digital editions, ISBN listed
  • Instructor guide with full table of contents and chapter content
  • Chapter presentation slides for classroom or self-study
  • Practice examination aligned to certification objectives
  • Online LMS access — read, study and track progress
  • Certification brochure with full programme details
Every Certification Includes
🖥 LMS Classes
📖 Ebook
📊 PPT Slides
🎬 Videos
📝 Practice Exam
🏁 Final Exam
📄 Certification Brochure

Information Security — Certification Programme

10 certifications · Click any certification to explore its curriculum

📦 What's included when you enrol
🖥 LMS Classes 📖 Study Books 🎓 Certificate on Completion 📄 Study Brochure
ISO 27001ISC — Information Security Management Systems
SSR-ISC-27001ISC
🎯 Master CertificateLevel 6-7 📄 Brochure 🎓 Full Profile
Information Security Governance 5 chapters
1 Fundamentals of Information Security Governance 6 classes
1.1 Define and Explain the Concept of Information Security Governance
1.2 Identify Key Components of an Information Security Governance Framework
1.3 Analyze the Role of Leadership in Information Security Governance
1.4 Assess Risks and Compliance Requirements in Information Security
1.5 Develop an Effective Information Security Policy
1.6 Implement Continuous Improvement Strategies in Information Security Governance
2 Information Security Policies and Frameworks 6 classes
2.1 Define Information Security Policies and Their Importance
2.2 Identify Key Components of an Effective Security Framework
2.3 Analyze the Relationship Between Policies and Compliance Requirements
2.4 Develop a Sample Information Security Policy Document
2.5 Evaluate Existing Security Frameworks and Their Applicability
2.6 Implement Best Practices for Policy Review and Updates
3 Risk Management in Information Security Governance 6 classes
3.1 Identify Risk Factors in Information Security
3.2 Assess and Prioritize Information Security Risks
3.3 Develop Risk Mitigation Strategies
3.4 Implement Risk Management Frameworks
3.5 Monitor and Review Risk Management Processes
3.6 Communicate Risk Management Findings to Stakeholders
4 Roles and Responsibilities in Information Security Governance 6 classes
4.1 Define Key Roles in Information Security Governance
4.2 Identify Responsibilities of Senior Management in Security Leadership
4.3 Explore the Role of the Information Security Officer
4.4 Assess Team Collaboration and Responsibilities in Governance
4.5 Analyze Stakeholder Involvement in Information Security
4.6 Develop a Framework for Accountability in Security Roles
5 Measuring and Improving Information Security Governance 6 classes
5.1 Define Key Metrics for Information Security Governance
5.2 Assess Current Information Security Governance Framework
5.3 Analyze Gaps in Information Security Performance
5.4 Implement Continuous Improvement Strategies for Governance
5.5 Develop a Dashboard for Ongoing Security Metrics Monitoring
5.6 Conduct a Review and Adapt Information Security Policies
Risk Assessment and Management 5 chapters
1 Understanding Risk Assessment Principles and Frameworks 6 classes
1.1 Define Key Concepts in Risk Assessment
1.2 Identify the Importance of Risk Assessment in Information Security
1.3 Describe Common Risk Assessment Frameworks
1.4 Analyze the Risk Assessment Process Steps
1.5 Evaluate Risk Assessment Tools and Techniques
1.6 Apply Risk Assessment Principles to Real-World Scenarios
2 Identifying and Analyzing Information Security Risks 6 classes
2.1 Define Key Concepts in Information Security Risk
2.2 Identify Assets and Their Value in Information Security
2.3 Evaluate Threats and Vulnerabilities Impacting Security
2.4 Analyze the Potential Impact of Information Security Risks
2.5 Assess Current Controls and Their Effectiveness
2.6 Develop a Risk Mitigation Strategy Based on Analysis
3 Risk Evaluation and Treatment Strategies 6 classes
3.1 Identify Key Risk Evaluation Criteria
3.2 Analyze Risk Impact and Likelihood
3.3 Prioritize Risks Using Assessment Frameworks
3.4 Develop Risk Treatment Options
3.5 Implement Risk Treatment Plans Effectively
3.6 Review and Monitor Risk Treatment Outcomes
4 Implementing Risk Management Controls and Measures 6 classes
4.1 Identify and Classify Information Assets for Risk Management
4.2 Assess Potential Threats and Vulnerabilities to Information Assets
4.3 Determine Risk Tolerance Levels and Acceptable Risks
4.4 Develop and Prioritize Risk Mitigation Strategies
4.5 Implement Risk Management Controls and Measures Effectively
4.6 Monitor and Review Risk Management Practices for Continuous Improvement
5 Risk Management Communication and Reporting 6 classes
5.1 Identify Key Stakeholders in Risk Management Communication
5.2 Develop Effective Risk Communication Strategies
5.3 Utilize Visual Aids for Risk Reporting
5.4 Craft Clear and Concise Risk Management Reports
5.5 Facilitate Stakeholder Engagement through Effective Communication
5.6 Evaluate the Impact of Risk Communication on Decision Making
Compliance and Legal Issues 5 chapters
1 Understanding Information Security Compliance Frameworks 6 classes
1.1 Define Key Concepts in Information Security Compliance
1.2 Identify the Main Information Security Compliance Frameworks
1.3 Explore the Importance of ISO 27001 in Compliance
1.4 Analyze Legal Regulations Impacting Information Security
1.5 Discuss Best Practices for Implementing Compliance Frameworks
1.6 Assess the Role of Leadership in Compliance Management
2 Legal Obligations and Responsibilities in Information Security 6 classes
2.1 Identify Key Legal Frameworks Affecting Information Security
2.2 Analyze Compliance Requirements for ISO 27001
2.3 Evaluate the Role of Data Protection Legislation in Information Security
2.4 Assess Organizational Responsibilities Under Information Security Laws
2.5 Examine Consequences of Non-Compliance with Information Security Regulations
2.6 Develop an Action Plan for Ensuring Legal Compliance in Information Security
3 Risk Management and Legal Compliance 6 classes
3.1 Identify Key Risk Management Concepts in ISO 27001
3.2 Analyze Legal and Regulatory Requirements for Compliance
3.3 Assess Risk Assessment Methodologies in Information Security
3.4 Develop a Risk Treatment Plan to Mitigate Identified Risks
3.5 Create Procedures for Monitoring and Reviewing Legal Compliance
3.6 Implement Practical Scenarios for Risk Management Compliance
4 Incident Response and Legal Requirements 6 classes
4.1 Understand the Importance of Incident Response in ISO 27001
4.2 Identify Key Legal Requirements for Incident Reporting
4.3 Analyze the Role of Compliance in Incident Management
4.4 Develop a Framework for Effective Incident Response
4.5 Document and Communicate Incident Response Procedures
4.6 Evaluate Real-World Case Studies of Incident Response Failures
5 Governance, Auditing, and Continuous Compliance 6 classes
5.1 Define Governance in Information Security Management
5.2 Explore the Role of Auditing in Compliance Practices
5.3 Identify Key Components of an Effective Audit Framework
5.4 Examine Continuous Compliance Strategies for ISO 27001
5.5 Analyze Case Studies of Governance Failures in Information Security
5.6 Implement a Continuous Improvement Plan for Compliance Maintenance
ISMS Framework Development 5 chapters
1 Understanding ISO 27001 — Principles and Objectives 6 classes
1.1 Define Key Principles of ISO 27001
1.2 Explore the Objectives of an Information Security Management System
1.3 Identify the Benefits of Implementing ISO 27001
1.4 Examine the Structure of the ISO 27001 Standard
1.5 Analyze Risk Management within the ISMS Framework
1.6 Apply ISO 27001 Principles to Real-World Scenarios
2 Scope and Context of the ISMS 6 classes
2.1 Define the Scope of the ISMS
2.2 Identify Stakeholders and Their Requirements
2.3 Analyze the Internal and External Context
2.4 Determine Boundaries for the ISMS
2.5 Assess Information Security Risks and Opportunities
2.6 Document the Scope and Context of the ISMS
3 Risk Assessment and Treatment Process 6 classes
3.1 Identify and Categorize Information Assets
3.2 Analyze and Evaluate Risks to Information Assets
3.3 Prioritize Risks Based on Impact and Likelihood
3.4 Determine Risk Treatment Options and Strategies
3.5 Develop and Implement Risk Treatment Plans
3.6 Review and Monitor Risk Treatment Effectiveness
4 Developing ISMS Policies and Objectives 6 classes
4.1 Assessing Current ISMS Policies and Gaps
4.2 Identifying Key Information Security Objectives
4.3 Aligning Policies with Organisational Goals
4.4 Drafting Effective ISMS Policies
4.5 Establishing Measurable Objectives for ISMS
4.6 Communicating and Implementing ISMS Policies
5 Monitoring, Review, and Continuous Improvement of ISMS 6 classes
5.1 Analyze Current ISMS Performance Metrics
5.2 Identify Key Stakeholders for ISMS Review
5.3 Conduct Effective ISMS Internal Audits
5.4 Implement Corrective Actions for ISMS Nonconformities
5.5 Develop a Continuous Improvement Plan for ISMS
5.6 Evaluate and Report on ISMS Improvement Outcomes
Security Awareness and Culture 5 chapters
1 Understanding Information Security and Its Importance 6 classes
1.1 Define Information Security and Its Key Components
1.2 Explore the Importance of Information Security in Today's Digital World
1.3 Identify Common Threats and Vulnerabilities in Information Systems
1.4 Understand the Role of Organizational Culture in Promoting Security Awareness
1.5 Assess Personal Responsibility in Upholding Information Security Practices
1.6 Develop Practical Strategies for Enhancing Security Awareness Within Teams
2 Identifying Security Threats and Vulnerabilities 6 classes
2.1 Define Common Security Threats in Information Systems
2.2 Analyze Real-World Security Breaches and Their Impact
2.3 Identify Vulnerabilities in Your Organization's Infrastructure
2.4 Evaluate Human Factors Contributing to Security Risks
2.5 Assess Potential Risks Using Threat Modeling Techniques
2.6 Develop a Personal Action Plan to Mitigate Identified Threats
3 Building a Security-Conscious Culture 6 classes
3.1 Identify Key Components of a Security-Conscious Culture
3.2 Assess Current Organizational Security Awareness Levels
3.3 Develop Effective Security Training Programs for Staff
3.4 Foster Open Communication About Security Risks
3.5 Implement Behavioral Incentives for Security Best Practices
3.6 Evaluate the Impact of Security Culture on Business Outcomes
4 Implementing Effective Security Awareness Programs 6 classes
4.1 Assess Current Security Awareness Levels in Your Organization
4.2 Define Key Messages and Objectives for Security Awareness Programs
4.3 Develop Engaging Training Materials and Resources
4.4 Implement Interactive Security Awareness Workshops
4.5 Evaluate the Effectiveness of Security Awareness Initiatives
4.6 Foster a Continuous Security Culture Through Ongoing Engagement
5 Measuring and Sustaining Security Awareness Initiatives 6 classes
5.1 Define Key Metrics for Security Awareness Success
5.2 Implement Surveys to Assess Security Awareness Levels
5.3 Analyze Data to Identify Gaps in Security Awareness
5.4 Develop Tailored Training Programs Based on Assessment Findings
5.5 Create a Feedback Loop to Refine Security Awareness Initiatives
5.6 Sustain Engagement Through Continuous Improvement Strategies
Performance Evaluation and Improvement 5 chapters
1 Understanding Performance Evaluation in Information Security Management Systems 6 classes
1.1 Define Key Concepts in Performance Evaluation
1.2 Identify Metrics and KPIs for Information Security
1.3 Analyze Current Performance Against Established Standards
1.4 Evaluate Tools and Techniques for Assessment
1.5 Develop an Action Plan for Performance Improvement
1.6 Implement Continuous Improvement Strategies in Security Management
2 Key Performance Indicators (KPIs) for Information Security 6 classes
2.1 Define Key Performance Indicators for Information Security
2.2 Identify Relevant KPIs for Risk Management
2.3 Analyze Current Performance Metrics in Information Security
2.4 Establish Baselines for Information Security KPIs
2.5 Develop Action Plans for KPI Improvement
2.6 Review and Adjust KPIs for Continuous Improvement
3 Conducting Internal Audits for Performance Assessment 6 classes
3.1 Define Internal Audits in the Context of ISO 27001
3.2 Identify Key Performance Indicators for Security Audits
3.3 Develop an Internal Audit Checklist for Information Security
3.4 Conduct a Mock Internal Audit for Performance Assessment
3.5 Analyze Audit Findings and Report on Performance Gaps
3.6 Recommend Improvement Actions Based on Audit Results
4 Managing Nonconformities and Corrective Actions 6 classes
4.1 Identify and Classify Nonconformities in ISMS
4.2 Analyze Root Causes of Identified Nonconformities
4.3 Develop Effective Corrective Action Plans
4.4 Implement Corrective Actions and Monitor Progress
4.5 Evaluate Effectiveness of Corrective Actions
4.6 Document Nonconformities and Corrective Actions for Compliance
5 Continuous Improvement Strategies in Information Security Management 6 classes
5.1 Analyze Current Information Security Practices
5.2 Identify Key Performance Indicators for Improvement
5.3 Develop a Continuous Improvement Plan for Security Measures
5.4 Implement Feedback Mechanisms for Security Protocols
5.5 Assess the Impact of Improvement Strategies on Security
5.6 Foster a Culture of Continuous Improvement in Security Teams
ISO 27002ISC — Code of Practice for Information Security Controls
SSR-ISC-27002ISC
🎯 Master CertificateLevel 6-7 📄 Brochure 🎓 Full Profile
Information Security Principles 5 chapters
1 Understanding Information Security Fundamentals 6 classes
1.1 Define Key Information Security Concepts
1.2 Identify Common Information Security Threats
1.3 Explore the Importance of Confidentiality, Integrity, and Availability
1.4 Recognize the Role of Policies and Procedures in Information Security
1.5 Examine Risk Management Principles in Information Security
1.6 Apply Information Security Best Practices to Case Studies
2 Risk Management and Assessment in Information Security 6 classes
2.1 Identify Key Concepts in Risk Management
2.2 Analyze Common Threats to Information Security
2.3 Evaluate Risk Assessment Methodologies
2.4 Determine Risk Levels and Impacts
2.5 Develop Risk Mitigation Strategies
2.6 Implement Continuous Risk Monitoring Practices
3 Implementing Information Security Policies and Procedures 6 classes
3.1 Analyze Current Information Security Policies
3.2 Identify Key Information Security Procedures
3.3 Develop Tailored Information Security Policies
3.4 Communicate Information Security Policies Effectively
3.5 Implement Information Security Procedures in Practice
3.6 Evaluate and Revise Information Security Policies Regularly
4 Information Security Controls and Best Practices 6 classes
4.1 Identify Key Information Security Controls
4.2 Evaluate Best Practices for Risk Management
4.3 Implement Access Control Mechanisms
4.4 Assess Data Protection Strategies
4.5 Monitor and Review Security Performance
4.6 Develop a Response Plan for Security Incidents
5 Compliance and Monitoring in Information Security Management 6 classes
5.1 Recognize the Importance of Compliance in Information Security
5.2 Identify Key Information Security Standards and Regulations
5.3 Assess Current Compliance Levels Against ISO 27002ISC
5.4 Implement Effective Monitoring Strategies for Information Security
5.5 Evaluate Compliance Risks and Develop Mitigation Plans
5.6 Report on Compliance Findings and Continuous Improvement in Security Practices
ISO 27002 Framework Application 5 chapters
1 Foundations of ISO 27002: Understanding Information Security Controls 6 classes
1.1 Define Key Concepts in Information Security Controls
1.2 Explain the Importance of ISO 27002 in Information Security Management
1.3 Identify the Major Sections and Structure of ISO 27002
1.4 Assess the Role of Leadership in Implementing Information Security Controls
1.5 Analyze Real-World Applications of ISO 27002 Controls
1.6 Develop a Plan for Integrating ISO 27002 in Organizational Practices
2 Key Controls and Their Implementation: A Deep Dive into ISO 27002 6 classes
2.1 Understand the Structure of ISO 27002 Controls
2.2 Identify Key Information Security Controls in ISO 27002
2.3 Evaluate Control Objectives and Their Importance
2.4 Analyze Implementation Strategies for ISO 27002 Controls
2.5 Measure the Effectiveness of Information Security Controls
2.6 Develop a Continuous Improvement Plan for ISO 27002 Compliance
3 Risk Assessment and Management Within the ISO 27002 Framework 6 classes
3.1 Define Key Concepts in Risk Assessment and Management
3.2 Identify Risks Relevant to the ISO 27002 Framework
3.3 Evaluate the Impact and Likelihood of Identified Risks
3.4 Develop Risk Treatment Plans Aligned with ISO 27002
3.5 Implement Risk Management Strategies in Practice
3.6 Review and Monitor Risk Management Outcomes
4 Monitoring and Reviewing Controls: Ensuring Compliance and Effectiveness 6 classes
4.1 Identify Key Monitoring Metrics for Information Security Controls
4.2 Implement Effective Monitoring Techniques for ISO 27002 Compliance
4.3 Analyze Data from Monitoring to Evaluate Control Effectiveness
4.4 Develop a Review Schedule for Information Security Controls
4.5 Communicate Findings from Monitoring and Reviews to Stakeholders
4.6 Adjust and Optimize Controls Based on Monitoring Insights
5 Continuous Improvement and Future Trends in ISO 27002 Compliance 6 classes
5.1 Identify Key Elements of Continuous Improvement in ISO 27002
5.2 Analyze Current Compliance Gaps Against ISO 27002 Standards
5.3 Develop Action Plans for Addressing Compliance Gaps
5.4 Implement Measurement and Monitoring Techniques for ISO 27002
5.5 Explore Emerging Trends Impacting ISO 27002 Compliance
5.6 Create a Roadmap for Sustaining Continuous Improvement in Information Security
Risk Management Strategies 5 chapters
1 Fundamentals of Risk Management in Information Security 6 classes
1.1 Define Key Concepts in Risk Management
1.2 Identify Common Security Risks in Information Systems
1.3 Evaluate the Impact of Risks on Information Security
1.4 Analyze Risk Assessment Methodologies
1.5 Develop a Risk Mitigation Plan
1.6 Implement Continuous Risk Monitoring Strategies
2 Identifying and Assessing Information Security Risks 6 classes
2.1 Define Information Security Risks in Your Organisation
2.2 Identify Common Vulnerabilities and Threats
2.3 Evaluate the Impact of Identified Risks
2.4 Assess the Likelihood of Information Security Incidents
2.5 Prioritise Risks Based on Impact and Likelihood
2.6 Develop a Risk Assessment Report for Stakeholders
3 Developing Risk Mitigation Strategies 6 classes
3.1 Identify Key Risks in Information Security
3.2 Analyze the Impact of Risks on Business Operations
3.3 Develop Risk Acceptance Criteria for Stakeholders
3.4 Explore Preventive Measures for Identified Risks
3.5 Formulate a Risk Mitigation Plan Based on Best Practices
3.6 Evaluate and Adjust Mitigation Strategies Regularly
4 Monitoring and Reviewing Risk Management Practices 6 classes
4.1 Identify Key Metrics for Risk Management Monitoring
4.2 Establish Reporting Frameworks for Risk Assessment
4.3 Analyze Historical Data to Improve Risk Strategies
4.4 Conduct Regular Audits of Risk Management Practices
4.5 Utilize Feedback Loops for Continuous Improvement
4.6 Develop an Action Plan for Addressing Identified Risks
· 5 Integrating Risk Management with Business Processes
Policy Development and Implementation
· No chapters added yet
Security Control Evaluation
· No chapters added yet
Leadership in Information Security
· No chapters added yet
ISO 27005ISC — Information Security Risk Management
SSR-ISC-27005ISC
🎯 Master CertificateLevel 6-7 📄 Brochure 🎓 Full Profile
No subjects linked yet — add subjects via the Admin panel.
ISO 27017ISC — Cloud Services Security Controls
SSR-ISC-27017ISC
🎯 Master CertificateLevel 6-7 📄 Brochure 🎓 Full Profile
No subjects linked yet — add subjects via the Admin panel.
ISO 27018ISC — Protection of PII in Public Cloud
SSR-ISC-27018ISC
🎯 Master CertificateLevel 6-7 📄 Brochure 🎓 Full Profile
No subjects linked yet — add subjects via the Admin panel.
ISO 27031ISC — ICT Readiness for Business Continuity
SSR-ISC-27031ISC
🎯 Master CertificateLevel 6-7 📄 Brochure 🎓 Full Profile
No subjects linked yet — add subjects via the Admin panel.
ISO 27035ISC — Information Security Incident Management
SSR-ISC-27035ISC
🎯 Master CertificateLevel 6-7 📄 Brochure 🎓 Full Profile
No subjects linked yet — add subjects via the Admin panel.
ISO 27036ISC — Information Security for Supplier Relationships
SSR-ISC-27036ISC
🎯 Master CertificateLevel 6-7 📄 Brochure 🎓 Full Profile
No subjects linked yet — add subjects via the Admin panel.
ISO 27701ISC — Privacy Information Management System
SSR-ISC-27701ISC
🎯 Master CertificateLevel 6-7 📄 Brochure 🎓 Full Profile
No subjects linked yet — add subjects via the Admin panel.
ISO 27799ISC — Health Informatics Information Security
SSR-ISC-27799ISC
🎯 Master CertificateLevel 6-7 📄 Brochure 🎓 Full Profile
No subjects linked yet — add subjects via the Admin panel.

Interested in a Information Security certification?

Our admissions team is ready to help you choose the right programme and get started.

📩 Send Enquiry

Information Security

📚 LAPT Bookstore

Information Security Study Books

Every subject within each certification has its own published study book — available in print and digital formats. Browse the Information Security collection in the LAPT Bookstore, or access your books online through the LMS once enrolled.

Browse Information Security Books →
📚
Study Books
12
per certification
🖨️
Print Format
ISBN
listed & sold
🌐
Digital Access
LMS
online reader

These are the domain experts who designed and validate the Information Security certification standards.

Chat with us Chat with us