Reference:
Trainevo-102022-IT-10
Duration:
1 to 5 Days (depending on the chosen option)
Category:
IT & Mutation Sociétale
Language(s):
🇬🇧, 🇫🇷, 🇩🇪

In partnership with PECB, we offer certified training courses based on the latest practices and covering all requirements of ISO standards and guidelines related to information security and cybersecurity management.

These training programs help professionals succeed in their respective fields and distinguish themselves through worldwide recognition.

Below you will find the various training courses we offer regarding information security management and cybersecurity:

ISO/IEC 27001 – Information Security Training
ISO/IEC 27701 – Privacy Information Management System

ISO/IEC 27701 was published in August 2019 and is the first international standard addressing privacy information management. The standard will help organizations establish, maintain, and continually improve a Privacy Information Management System (PIMS) by enhancing the existing ISMS, in accordance with the requirements of ISO/IEC 27001 and the guidance of ISO/IEC 27002. It can be used by all types of organizations, regardless of their size, complexity, or country of operation.

General Data Protection Regulation (GDPR) Training

The GDPR is the General Data Protection Regulation, a European regulation aimed at strengthening the data protection regime for organizations operating in the European Union (EU) and processing the personal data of European residents.

The GDPR therefore consists of protecting the personal data of employees, customers, and others. Furthermore, it introduces a notification obligation for organizations involved in processing personal data. In the event of non-compliance with this regulation, these organizations will be liable for heavy fines and a compromised reputation. Considering that personal data represents critical and sensitive information that all organizations must protect, such regulation will assist in implementing appropriate procedures and controls to prevent information security breaches. By May 2018, all organizations operating in the EU must comply with this regulation.

ISO/IEC 27002 – Information Security Controls Training
ISO/IEC 27005 – Information Security Risk Management Training
Risk Assessment Methods Training
ISO/IEC 27035 – Incident Management Training
ISO/IEC 27032 – Cybersecurity Training
Professional Training – Penetration Testing

Below are the different certification training options we offer on these topics according to the desired level of proficiency:

Introduction (1 day):

Program:

  • Day 1: Introduction to management concepts and implementation of a management system.

This level does not lead to certification

Foundation (2 days):

Program:

  • Day 1: Introduction to Information Security Management System (ISMS) concepts, as defined by ISO/IEC 27001
  • Day 2: Information Security Management System requirements and certification exam.
Lead Implementer (5 days):

Program:

  • Day 1: Introduction to ISO/IEC 27001 and initiation of an ISMS
  • Day 2: Planning the implementation of an ISMS
  • Day 3: Implementation of an ISMS
  • Day 4: Monitoring, measurement, continuous improvement, and preparation for ISMS certification audit
  • Day 5: Certification examination
Lead Auditor (5 days):

During this training, you will acquire the knowledge and skills necessary to plan and conduct internal and external audits in accordance with ISO 19011 certification processes and

ISO/IEC 17021-1 certification processes.

Based on practical exercises, you will master audit techniques and the management of an audit program, an audit team, communication with clients, and conflict resolution.

After acquiring the necessary expertise to perform this audit, you can take the exam and apply for the title of “PECB Certified Lead Auditor.” By holding a PECB certified auditor certificate, you will be able to demonstrate that you have the necessary capabilities and skills to audit organizations in accordance with best practices.

Program:

  • Day 1: Introduction to Information Security Management System (ISMS) and ISO/IEC 27001
  • Day 2: Audit principles, preparation, and initiation of an audit
  • Day 3: On-site audit activities
  • Day 4: Audit closure
  • Day 5: Certification examination
Refer to the linked brochure in the program section.

Refer to the linked brochure in the program section.

ISO/IEC 27001 – Information Security Training

=> Click here to access the training brochure – Introduction

=> Click here to access the brochure for this training – Foundation

=> Click here to access the training brochure – Implementation Manager

General Data Protection Regulation (GDPR) Training

Click here to access the training brochure – Introduction

Click here to access the training – Foundation

ISO/IEC 27701 – Privacy Information Management System

=> Click here to access the training brochure – Lead Implementer

=> Click here to access the training brochure – Lead Auditor

ISO/IEC 27002 – Information Security Controls Training

Click here to access the training brochure – Introduction

Click here to access the training – Foundation

Click here to access the training – Manager

Click here to access the training – Lead Manager

ISO/IEC 27005 – Information Security Risk Management Training

Click here to access the training – Introduction

Click here to access the training – Foundation

Click here to access the training – Risk Manager

Risk Assessment Methods Training

Click here to access the Risk Assessment Method – Cebios

Click here to access the Risk Assessment Method – Mehari

ISO/IEC 27035 – Incident Management Training

Click here to access the training brochure – Introduction

Click here to access the training brochure – Foundation

Click here to access the training – Lead Incident Manager

ISO/IEC 27032 – Cybersecurity Training

Click here to access the training – Lead Cybersecurity Manager

Professional Training – Penetration Testing

A penetration test consists of evaluating the security of an IT infrastructure by safely attempting to exploit vulnerabilities that may exist in operating systems, inappropriate configurations, application errors, or end-user behavior.

Click here to access the penetration testing training brochure

Refer to the linked brochure in the program section.
Refer to the linked brochure in the program section.
Address: Color Business Center, 19 rue de l’industrie L-6089 Bertrange
For in-company training, please contact us.

Register

Registration request