Course Outline
Day 1:
- Introduction to Information Security controls as recommended by ISO/IEC 27002
Day 2:
- Security requirements and objectives based on ISO/IEC 27002
Day 3:
- Monitoring, measurement, analysis, and evaluation of Information Security controls
Day 4:
- Continual improvement of an organization's information security performance
Day 5:
Certification Exam
The “PECB Certified ISO/IEC 27002 Lead Manager” exam fully meets the requirements of the PECB Examination and Certification Programme (ECP). The exam covers the following competence domains:
- Domain 1: Fundamental principles and concepts for Information Security Controls
- Domain 2: Information Security Control based on ISO/IEC 27002
- Domain 3: Planning and evaluating the need and applicability of information security controls
- Domain 4: Implementation and management of information security controls
- Domain 5: Monitoring and measurement of information security controls
- Domain 6: Continual improvement
Requirements
A fundamental understanding of ISO/IEC 27002 and comprehensive knowledge of Information Security.
Testimonials (7)
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
Emin was really engaging and enthusiastic, his knowledge succeeded expectations and allowed for questions at each portion.
Becky
Course - OSINT Practitioner Course (Advanced OSINT)
Very good knowledge and character.
Constantinos Michael
Course - Java and Web Application Security
Pushing changes on an ongoing basis, when on the 3rd day I started to get more lost than before and it was harder to spot the error quickly, I was quickly able to check out the latest changes and stay up to date with the material
Paulina
Course - Advanced Java Security
Machine Translated
Very good to understand how a hacker would potentially analyse sites for weakness and tools they might employ .