Information Security

Computer Forensics Foundation training enables you to learn the basic elements to implement Computer Forensics processes.  During this training course, you will be able to understand computer forensics tools that are used to implement the forensics evidence recovery and analytical processes.

Who should attend?

  • Individuals interested in Computer Forensics Processes 
  • Individuals seeking to gain knowledge about the main processes of Computer Forensics 
  • Individuals interested to pursue a career in Computer Forensics

Course Information and Pricing
 

ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001.

 

During this training course, you will be able to understand the different modules of ISMS, including ISMS policy, procedures, performance measurements, management commitment, internal audit, management review and continual improvement.

 

Who should attend?

  • Individuals involved in Information Security Management
  • Individuals seeking to gain knowledge about the main processes of Information Security Management Systems (ISMS)
  • Individuals interested to pursue a career in Information Security Management

Course Information and Pricing

ISO/IEC 27002 Foundation training enables you to learn the basic elements to implement Information Security Controls as specified in ISO/IEC 27002. During this training course, you will be able to understand how ISO/IEC 27001 and ISO/ IEC 27002 are related to ISO/IEC 27003 (Guidelines for the implementation of ISMS), ISO/IEC 27004 (Measurement of Information Security performance) and ISO/IEC 27005 (Risk Management in Information Security).

 

Who should attend?

  • Individuals interested in Information Security Management and Information Security Controls
  • Individuals seeking to gain knowledge about the main processes of an Information Security Management System and Information Security Controls
  • Individuals interested to pursue a career in Information Security Management

Course Information and Pricing

ISO/IEC 27005 Foundation training enables you to learn the basic elements to manage Information Security Risks as specified in ISO/IEC 27005. During this training course, you will be able to understand the concepts and models of Information Security Risk Management.

 

Who should attend?

 

  • Individuals interested in Information Security Risk Management
  • Individuals seeking to gain knowledge about the main processes of Information Security Risk Management
  • Individuals interested to pursue a career in Information Security Risk Management ​

 

Course Information and Pricing

ISO/IEC 27035 Foundation training enables you to learn the basic elements to implement an Incident Management Plan and manage Information Security Incidents. During this training course, you will be able to understand Information Security Incident Management processes.

 

Who should attend?

  • Individuals interested in Information Security Incident Management process approaches
  • Individuals seeking to gain knowledge about the main principles and concepts of Information Security Incident Management
  • Individuals interested to pursue a career in Information Security Incident Management 

Course Information and Pricing

Print Print | Sitemap
Phone: 1-240-638-1222 eMail: sales@rthsolutions.com ITIL® are a registered trade mark of AXELOS Limited, The Swirl logo ™ is a registered trademark of AXELOS limited. ©RTH Solutions LLC