ISO/IEC 27002 Lead Manager
Why Should You Attend? The ISO/IEC 27002 Lead Manager training course enables participants to develop the necessary knowledge and skills for supporting an organization in effectively determining, implementing, and managing information security controls. The training course provides information that will …
Why Should You Attend?
The ISO/IEC 27002 Lead Manager training course enables participants to develop the necessary knowledge and skills for supporting an organization in effectively determining, implementing, and managing information security controls. The training course provides information that will help participants interpret the ISO/IEC 27002 controls in the specific context of an organization.
The PECB ISO/IEC 27002 Lead Manager Certification demonstrates that you have acquired the necessary expertise for determining adequate information security controls needed to treat the risks identified by a risk assessment process.
The training course is followed by an exam. If you pass, you can apply for the “PECB Certified ISO/IEC 27002 Lead Manager” credential.
Requirements
- The training course integrates both theory and practice by guidance and practical examples for the implementation and management of information security controls.
- The training course contains essay-type exercises and multiple-choice quizzes, some of which are scenario-based.
- Participants are encouraged to communicate and discuss with each other while partaking in exercises and quizzes.
- The structure of quizzes is similar to that of the certification exam.
Features
- Explain the fundamental concepts of information security, cybersecurity, and privacy based on ISO/IEC 27002
- Acknowledge the relationship between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
- Interpret the ISO/IEC 27002 information security controls in the specific context of an organization
- Support an organization in effectively determining, implementing, and managing information security controls based on ISO/IEC 27002
- Explain the approaches and techniques used for the implementation and effective management of information security controls
Target Audiences
- Managers or consultants seeking to enhance their knowledge regarding the implementation of information security controls in an ISMS based on ISO/IEC 27001
- Individuals responsible for maintaining information security, compliance, risk, or governance in an organization
- IT professionals or consultants seeking to enhance their knowledge in information security
- Members of an ISMS implementation or information security team
You might be intersted in
- 4 Days
- 4 Days
- 4 Days