Our classroom training provides you the opportunity to interact with instructors and benefit from face-to-face instruction.
EXIN Information Security Foundation Based on ISO/IEC 27002
VIRTUAL TRAINING
Catering to the demands of busy professionals, our virtual training programs are as effective as face-to-face learning.
CORPORATE TRAINING
Our Corporate training provides you the opportunity to interact with instructors and benefit from face-to-face instruction.
TRAINING HIGHLIGHTS
High quality training from Certified & Industry Experts
Earn 16 PDUs and 16 SEU’s
Course Completion Certificates
Reimbursement guaranteed if the training is not satisfied
Extensive documentation provided
Our approach is both practical and inspirational. Our training is carefully designed and tested to develop the key skills and confidence needed while being highly participatory and fun
Information Security is gaining importance in the Information Technology (IT). Globalization of the economy leads to a growing exchange of information between organizations (their employees, customers and suppliers). It also leads to a growing use of networks, such as the internal company network, connection with the networks of other companies and the Internet. Furthermore, activities of many companies now rely on IT, and information has become a valuable asset. Protection of information is crucial for the continuity and proper functioning of the organization: information must be reliable. In the Information Security Foundation module, based on ISO/IEC 27002 (ISFS), the basic concepts of information security and their coherence are tested.
EXIN Information Security Foundation is part of the Certified Integrator Program and is one of the prerequisites to attain the title: EXIN Certified Integrator Secure Cloud Services.You will receive the certificate EXIN Certified Integrator Secure Cloud Services when you possess the certificates: EXIN Information Security Foundation, EXIN Cloud Computing Foundation and EXIN IT Service Management Foundation.
- Learning Objectives:
Individuals certified at this level will have demonstrated their understanding of:
- The concept, importance and the reliability of information.
- The types of risks, threats and damages, and the available risk strategies and the security measures you can take.
- The security policy and organization, inclusive code of conduct, ownership, and roles and responsibilities. Moreover you learn how to manage security incidents.
- The various security measures.
- Physical measures such as identity passes and finger scans.
- Technical measures such as cryptography, and you will learn how to deal with attacks such as phishing, spam and malware.
- Organizational measures you can take such as access management and Business Continuity Management.
- The most important legislation and regulations.
Agenda:
- Planning the Audit Program
- Managing Audits
- Communicate & Address Audit Results
- Improving the Audits Program
The target group of ISFS is everyone in the organization. The basic knowledge that is tested in this module contributes to the understanding that information is vulnerable and that measures are necessary to protect this information. The module is also suitable for small independent businesses for whom some basic knowledge of information security is necessary. This module can be a good start for new information security professionals.
What does Mangates provide me on the day of the course?
What experience does Instructor has?
All our Instructors are Certified & Industry Experts and they have years of experience in teaching Agile Courses
Do you provide a group discount for classroom training programs?
We do Provide Group Discounts such as 10% for group of 3, 15% for group of 5 and 20% for the group of 10 people.
If I cancel my Enrollment, how can I claim my Refund?
You can request a refund by sending an email to info@mangates.com and within 7 working days you get your money back.