Module 4: Resource Gathering

Training Needs Analysis

Worksheet
20 min
+75 XP

Training Needs Analysis Worksheet

A Training Needs Analysis (TNA) identifies the gap between current competence and required competence, helping you plan effective training programs.

Purpose

Use this worksheet to:

  • Systematically assess training needs across your organization
  • Prioritize training initiatives based on risk and compliance requirements
  • Create a targeted training plan aligned with ISO 27001 requirements
  • Document competence requirements for audit evidence
  • Support Clause 7.2 compliance

Step 1: Identify Roles and Responsibilities

List all roles that have information security responsibilities in your organization.

Example Roles:

  • Executive Management
  • ISMS Manager / Information Security Officer
  • IT Security Team
  • System Administrators / IT Support
  • Software Developers
  • HR Staff
  • Facilities / Physical Security
  • Department Heads / Process Owners
  • All Employees
  • Contractors and Third Parties

Step 2: Define Required Competencies

For each role, identify the required security competencies:

RoleRequired CompetenciesCurrent LevelTarget LevelGap
ISMS ManagerISO 27001 requirementsAdvancedExpertTraining needed
ISMS ManagerRisk assessmentIntermediateAdvancedTraining needed
IT TeamNetwork securityAdvancedAdvancedNone
IT TeamIncident responseBasicAdvancedSignificant gap
All StaffPhishing awarenessBasicIntermediateRefresher needed

Competence Levels:

  • None: No knowledge or skills in this area
  • Basic: Awareness level understanding
  • Intermediate: Can perform with some guidance
  • Advanced: Can perform independently
  • Expert: Can train and guide others

Step 3: Assessment Methods

How to assess current competence:

1. Skills Assessment

  • Self-assessment questionnaires
  • Manager evaluations and 360-degree feedback
  • Practical tests or demonstrations
  • Review of qualifications and certifications

2. Performance Review

  • Analysis of security incident involvement
  • Review of audit findings related to performance
  • Security policy adherence metrics
  • Quality and accuracy of security-related work

3. Gap Analysis

  • Compare required vs. current competence
  • Identify specific knowledge or skill gaps
  • Determine training priority (High/Medium/Low)
  • Consider business impact of gaps

Step 4: Training Needs Matrix

Role/PersonCompetency GapTraining RequiredPriorityTimelineDelivery MethodBudget
ISMS ManagerInternal auditingISO 27001 LA courseHighQ1 2024External course$2,500
IT TeamCloud securityAWS/Azure SecurityMediumQ2 2024Online training$1,000
All StaffPhishing awarenessSecurity awareness refreshHighQ1 2024E-learning$500
DevelopersSecure codingOWASP Top 10 workshopHighQ2 2024Workshop$3,000

Priority Levels:

  • High: Critical for ISMS operation, addresses significant risk, or compliance requirement
  • Medium: Important for effectiveness improvement, moderate risk
  • Low: Beneficial for enhancement but not immediately critical

Step 5: Training Plan Development

Induction Training (All New Joiners):

  • Topics: ISMS overview, information security policy, key procedures, responsibilities
  • Duration: 1 hour
  • Delivery: In-person presentation + digital handbook
  • Assessment: Online quiz (80% pass rate required)
  • Frequency: Upon joining (within first week)

Annual Awareness Training (All Staff):

  • Topics: Policy updates, current threat landscape, incident case studies, best practices
  • Duration: 30-45 minutes
  • Delivery: E-learning module
  • Assessment: Short quiz at completion
  • Frequency: Annually (January-March)

Role-Specific Training: Identify and schedule specific training for each role:

  • ISMS Manager: Lead auditor course, advanced risk management
  • IT Security Team: Technical controls, incident response, forensics
  • Developers: Secure coding, application security testing
  • HR: People controls, screening procedures, confidentiality
  • Facilities: Physical security, access control systems

Specialized Training:

  • ISO 27001 Lead Auditor / Lead Implementer courses
  • Professional certifications (CISSP, CISM, CISA, CEH)
  • Risk management methodologies (ISO 31000, FAIR)
  • Incident response and forensics training
  • Privacy and data protection (GDPR, CCPA)

Step 6: Training Delivery Methods

Choose appropriate delivery methods based on content, audience, and resources:

MethodBest ForAdvantagesDisadvantages
E-learningLarge audiences, basic topicsScalable, cost-effective, flexible timingLess engaging, no real-time interaction
ClassroomComplex topics, discussionsInteractive, immediate Q&A, hands-onExpensive, scheduling challenges
WorkshopsPractical skillsReal-world scenarios, team buildingTime-intensive, limited capacity
On-the-jobProcedural skillsContextual learning, immediate applicationRequires qualified mentors
WebinarsDistributed teamsAccessible remotely, recordedLimited interaction
Self-studyIndividual developmentSelf-paced, flexibleRequires motivation, no validation

Step 7: Budget Estimation

Training Budget Components:

ItemEstimated Cost
External training courses (Lead Auditor, certifications)$______
E-learning platform subscription (annual)$______
Training materials development (content creation)$______
Internal trainer time (hours × rate)$______
Certification exams and renewals$______
Travel and accommodation (for external training)$______
Tools and resources (books, subscriptions)$______
Total Annual Training Budget$______

Typical ranges:

  • Small organization (50 employees): $10,000-$25,000
  • Medium organization (500 employees): $50,000-$100,000
  • Large organization (5000+ employees): $200,000+

Step 8: Effectiveness Evaluation Plan

Define how you'll measure training effectiveness:

Evaluation Criteria:

  • Post-training assessment scores (target: minimum 80% pass rate)
  • Reduction in security incidents attributed to human error
  • Improved internal audit findings year-over-year
  • Manager feedback on employee performance improvements
  • Self-assessment improvements (before/after training)
  • Practical skill demonstrations and application
  • Time to proficiency in new roles

Evaluation Timeline:

  • Immediate: Post-training knowledge assessment
  • 1 month: Behavioral observation and manager feedback
  • 3 months: Performance review and skill application check
  • 6-12 months: Impact on ISMS metrics and incident rates

Step 9: Documentation Requirements

Create and maintain the following records for Clause 7.2 compliance:

Required Documents:

  • Training Needs Analysis Report - This completed worksheet
  • Annual Training Plan - Detailed schedule of all planned training activities
  • Training Materials - Presentations, e-learning modules, handouts, guides
  • Attendance Records - Who attended which training sessions (dates, duration)
  • Assessment Results - Quiz scores, test results, practical evaluations
  • Effectiveness Evaluations - Evidence that training achieved objectives
  • Individual Training Records - Personal training history per employee (maintained by HR)
  • Competence Evidence - Certificates, qualifications, performance reviews

Store records according to your document control procedure and retention schedule (typically employment duration + 5 years for training records).

Step 10: Review and Update Triggers

Review and update your Training Needs Analysis when:

Scheduled Reviews:

  • Annually as part of the training plan cycle
  • Quarterly progress reviews against training plan

Triggered Reviews:

  • New roles or significant role changes created
  • After major ISMS changes or scope expansion
  • Following internal or external audit findings
  • After security incidents revealing competence gaps
  • When new threats or technologies emerge
  • After organizational restructuring or mergers
  • When regulatory requirements change

Action Items Checklist

  • Complete the Training Needs Matrix for all roles in your organization
  • Prioritize training initiatives based on risk, compliance, and business impact
  • Develop detailed annual training plan with specific dates and owners
  • Obtain budget approval from management
  • Schedule and book first quarter training sessions
  • Prepare or procure training materials and platforms
  • Establish evaluation and tracking mechanisms
  • Communicate training requirements and schedule to all affected staff
  • Document everything for audit evidence and Clause 7.2 compliance
  • Set reminders for quarterly training plan reviews

Integration with Other ISMS Components

Your Training Needs Analysis supports:

  • Clause 7.2 (Competence): Evidence of systematic approach to competence
  • Clause 7.3 (Awareness): Input to awareness program design
  • A.6.3 (Information security awareness, education and training): Control implementation evidence
  • A.5.2 (Information security roles and responsibilities): Competence requirements per role

Next Lesson: Design a comprehensive Awareness Program to build a strong security culture across your organization.

Complete this lesson

Earn +75 XP and progress to the next lesson