Course Overview
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.
Target audiences
- Information Security Incident managers
- IT Managers
- IT Auditors
- Managers seeking to establish an Incident Response Team (IRT)
- Managers seeking to learn more about operating effective IRTs
- Information Security risk managers
- IT system administration professionals
- IT network administration professionals
- Members of Incident Response Teams
- Individuals responsible for Information Security within an organization
Schedule Dates
Curriculum
-
Course agenda
- Day 1: Introduction to Information Security Incident Management concepts as recommended by ISO/IEC 27035
- Day 2: Designing and preparing an Information Security Incident Management plan
- Day 3: Enacting the Incident Management process and handling Information Security incidents
- Day 4: Monitoring and continual improvement of the Information Security Incident Management plan
- Day 5: Certification Exam