ISO Certification in Information Technology Management 


ISO/IEC 270001 - Information Technology  Management System:

Information Security is definitely one of the most important issues that concern all professionals around the world.

Introduction to the implementation of an Information Security Management System (ISMS) based on PECB Certified ISO/IEC 27001


Become acquainted with the best practices for implementing and managing an Information Security Management System (ISMS) based on PECB Certified ISO/IEC 27001


  • ISO/IEC 27001 Lead Implementer

    Mastering the implementation and management of an Information Security Management System (ISMS) based on PECB Certified ISO/IEC 27001


  • ISO/IEC 27001 Lead Auditor

    Mastering the audit of an Information Security Management System (ISMS) based on PECB Certified ISO/IEC 27001


 ISO/IEC 27002 - Information Security Control:

ISO/IEC 27002 provides you with guidelines on how to implement information security standards and information security management practices.

Above all, this standard is intended to help reduce information security risks, by initiating, implementing, maintaining, and improving information security management within an organization by using potential controls and control mechanisms which can be found within PECB Certified ISO/IEC 27001 training courses.

Check below to find the training that suits you best!

 

Introduction to the implementation of Information Security controls based on ISO/IEC 27002


Become acquainted with the best practices for implementing and managing Information Security controls based on ISO/IEC 27002


Mastering the fundamental principles and concepts of an information security control best practices based on ISO 27002



ISO/IEC 27005 - Information Security Risk Management System:

Organizations are required to assess the security risks associated in their information systems as a prelude to treating them in various ways.

Our range of information security risk management training courses will help you learn how to deal with the highest risks in your information security management system.

 


  • ISO/IEC 27005 Foundation

    Become acquainted with the best practices in Information Security Risk Management based on ISO/IEC 27005


  • ISO/IEC 27005 Risk Manager

    Mastering the fundamental principles and concepts of Information Security Risk Management based on ISO/IEC 27005


  • ISO/IEC 27005 with OCTAVE

    Mastering Risk Evaluation and Optimal Risk Management in Information Security based on ISO/IEC 27005 with the OCTAVE Method


  • ISO/IEC 27005 with EBIOS

    Mastering Risk Evaluation and Optimal Risk Management in Information Security based on ISO/IEC 2700 with the EBIOS Method


  • ISO/IEC 27005 with MEHARI

    Mastering the Evaluation and Optimal Management of Risk in Information Security based on ISO/IEC 27005 with MEHARI method


Privacy Implementer:

Knowing how to protect your information in the most secure way may be a challenge.
Our Certified Lead Privacy Implementer course will provide you with the necessary steps on how to implement and manage a privacy framework in your organization.

         Mastering the implementation and management of a Privacy Framework based on ISO 29100, the

         Generally Accepted Privacy principles and guidance from international information commissioners


Risk Assesment Method:

Understanding how to effectively assess risk may be a challenge for many industries.

Our risk assessment methods training courses including the OCTAVE, EBIOS, and MEHARI methods, will provide you with the sufficient knowledge on how to successfully identify and assess risk in your organization.

 

  • OCTAVE

    Developing the necessary skills to perform a risk assessment based on the OCTAVE method


  • EBIOS

    Developing the necessary skills to perform a risk assessment based on the EBIOS method


  • MEHARI

    Developing the necessary skills to perform a risk assessment based on the MEHARI method