ISO/IEC 27002 Foundation training course provides information on the fundamental concepts of information security, cybersecurity and privacy based on ISO/IEC 27002.
ISO/IEC 27002 Foundation training course enables participants to learn the basic concepts related to the implementation and management of information security controls based on the guidelines of ISO/IEC 27002. Through this training course, participants will be able to identify the information security controls of ISO/IEC 27002 that are categorized into four themes: organizational, people, physical, and technological. The training course also provides information on how ISO/IEC 27002 is related with other standards, such as ISO/IEC 27001 and ISO/IEC 27003.
The training course is followed by an exam. If you pass, you can apply for the “PECB Certificate Holder in ISO/IEC 27002 Foundation” certificate. This certificate demonstrates that you have a general knowledge of ISO/IEC 27002 information security controls.
Day 1: Introduction to ISO/IEC 27002 and organizational controls
Day 2: People, physical, and technological controls and certificate exam
By successfully completing this training course, you will be able to:
This training course is intended for:
- Managers and consultants seeking to know more about information security controls of ISO/IEC 27002
- Professionals engaged in or responsible for information security management
- Individuals seeking to gain knowledge about the main processes of an information security management system and information security controls
- Individuals interested to pursue a career in information security
COURSE CONTENT: Chapter 1: Setting Up the BIG-IP System • Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Archiving the BIG-IP System Configuration • Leveraging…
The Check Point Certified Troubleshooting Administrator (CCTA) provides an understanding of the concepts and skills necessary to troubleshoot issues that may occur when managing the Check Point Security Management…
COURSE CONTENT: Module 1: Describe Cisco Umbrella • What is Umbrella • Enforcement • DNS Overview • Why DNS? • Co-occurrence Model • Spike Rank Model • Predictive IP…