PECB ISO 27002 Information Security Controls Lead Manager Certification Course.

PECB ISO 27002 Information Security Controls Lead Manager

Master the principles and techniques for the implementation and management of Information Security Controls based on ISO/IEC 27002.

Course Overivew

ISO/IEC 27002 Lead Manager

  • ISO/IEC 27002 is an international standard used as a reference for selecting and implementing information security controls listed in Annex A of ISO/IEC 27001.
  • It also provides guidance on the best practices of information security management that help organizations select, implement, and manage controls, policies, processes, procedures, and organizational structures’ roles and responsibilities.
  • ISO/IEC 27002 was originally published in 2005 as a revised version of ISO/IEC 17799, which outlined general guidance for information security. The standard was revised and renamed so that it becomes in alignment with ISO/IEC 27001 with the intention of having two complementary documents that can be used together.
  • ISO/IEC 27002 provides a list of security objectives and controls generally practiced in the information security industry. In particular, clauses 5 to 18 provide detailed implementation guidance to support the controls specified in Annex A of ISO/IEC 27001 (controls A.5 to A.18). It applies to all types of organizations (public and private sector, commercial and non-profit, etc.) that face information security risks.
Read More
Read Less
Course Benefits:

Day 1 Introduction to Information Security controls as recommended by ISO/IEC 27002

  • Section 1: Course objective and structure
  • Section 2: Standard and regulatory framework
  • Section 3: Fundamental Principles of Information Security
  • Section 4: Information Security Management System
  • Section 5: Information security policies
  • Section 6: Organization of information security

 

Day 2 Information Security requirements and objectives based on ISO/IEC 27002

  • Section 7: Human resources security
  • Section 8: Asset Management
  • Section 9: Access Control

 

Day 3 Monitoring, measurement, analysis, and evaluation of Information Security controls

  • Section 10: Cryptography
  • Section 11: Physical and Environmental Security
  • Section 12: Operations Security
  • Section 13: Communications security

 

Day 4 Continual improvement of an organization’s Information Security Management System performance

  • Section 14: System acquisition, development and maintenance
  • Section 15: Supplier Relationships
  • Section 16: Information security Incident Management
  • Section 17: Information security aspects of business continuity management
  • Section 18: Compliance
  • Section 19: Golden Rules and Conclusion
  • Section 20: Lead Manager Certification Scheme
  • Section 21: Closing the Training

 

Day 5 Certification Exam

  • Master the implementation of Information Security controls by adhering to the framework and principles of ISO/IEC 27002
  • Gain a comprehensive understanding of the concepts, approaches, standards, methods and techniques required for the effective implementation and management of Information Security controls
  • Comprehend the relationship between the components of Information Security controls, including responsibility, strategy, acquisition, performance, conformance, and human behavior
  • Understand the importance of information security for the strategy of the organization
  • Master the implementation of information security management processes
  • Master the formulation and implementation of security requirements and objectives
  • Managers or consultants seeking to implement an Information Security Management System (ISMS) based on ISO/IEC 27001 and ISO/IEC 27002
  • Project managers or consultants seeking to master the Information Security Management System implementation process
  • Individuals responsible for the information security, compliance, risk, and governance, in an organization
  • Members of information security teams
  • Expert advisors in information technology
  • Information Security officers
  • Privacy officers
  • IT professionals
  • CTOs, CIOs and CISOs
Download
Course
Brochure

Prerequisites

This course is available at :

Classroom Training

Cairo
Giza
Onsite

Online Training

Virtual Interactive Instructor LED
Self-Paced Training

WHY CHOOSE CLS

Experience

We have been in the market since 1995, and we kept accumulating experience in the training business, and providing training for more than 100,000 trainees ever since, in Egypt, and the MENA region.

Premium Facilities

CLS facilities are well-equipped with strong hardware and software technologies that aid both students and trainers lead very effective smooth training programs.

Customer Support

We provide our clients with the best solutions, customized to their specific needs and goals. Our team is highly qualified to answer whatever questions you have.

Global Accredited

CLS is an authorized and accredited partner by technology leaders. This means that our training programs are of the highest quality source materials.

Up To Date

We keep tabs on every change in the market and the technology field, so our training programs will always be updated up to the World-class latest standards, and adapted to the global shape-shifting job market.

Certified Instructors

We select the best instructors, who are certified from trustworthy international vendors. They share their professional experience with the Trainees, so they can have a clear hands-on experience.

Over 200,000 Gradutes From CLS

Play Video
Amr Mostafa
An employee of the Security Department at the Ministry of Electricity

I`m attending now CEH Training with Eng Mohamed Hamdy ,CISSP Training with Eng Mohamed Gohar, I really learned a lot from him , everything here in CLS  is very satisfying including facilities .

Play Video
Lamiaa Medhat
CIO

We took a series of courses as the digital Transformation Unit of the ministry . we just finished CRISC Certification Training with DR Adel Abdel Meneim . Thank you CLS for all your efforts, we really appreciate it

Play Video
Ahmed Salah
Senior Cyber Security Engineer

Me and my colleagues are working in a government Organization, We took a no. of cyber security trainings with CLS starting with CEH and CISSP. we liked every thing the instructors, the stuff and whole environment

Play Video
Ferras Hassan
Head of the Programming Department at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Play Video
Mohamed Ahmed Ali
Systems management specialist

Qualifying the cadres of digital transformation units in government agencies moving to the administrative capital .Thanks CLS

Play Video
Zeinab Salah
Software Developer at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Play Video
Ibrahim Khalaf
IT Infrastructure and Security Manger

I`m attending now CRISC Training with DR Adel Abdel Meneim , I really learned a lot from him , everything here in CLS  is very satisfying including facilities , locations and the team.

Play Video
Samar Shams ElDin
Programmer at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Student Application For

PECB ISO 27002 Information Security Controls Lead Manager
Full Name *
Email *
Phone *
Full Phone
Training Location *
Additional Request

Business Application For

PECB ISO 27002 Information Security Controls Lead Manager
Full Name *
Company Name *
Job Title *
Number of Employees
Email *
Phone *
Full Phone
Training Location *
Additional Request