Course Overview

ISO/IEC 27035 Lead Incident Manager training enables you to acquire the necessary expertise to support an organization in implementing an Information Security Incident Management plan based on ISO/IEC 27035. During this training course, you will gain a comprehensive knowledge of a process model for designing and developing an organizational incident management plan. The compatibility of this training course with ISO/IEC 27035 also supports the ISO/IEC 27001 by providing guidance for Information Security Incident Management.

After mastering all the necessary concepts of Information Security Incident Management, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27035 Lead Incident Manager” credential. By holding a PECB Lead Incident Manager Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead a team in managing Information Security Incidents.

Course Objectives

  • Master the concepts, approaches, methods, tools and techniques that enable an effective Information Security Incident Management according to ISO/IEC 27035
  • Acknowledge the correlation between ISO/IEC 27035 and other standards and regulatory frameworks
  • Acquire the expertise to support an organization to effectively implement, manage and maintain an Information Security Incident Response plan
  • Acquire the competence to effectively advise organizations on the best practices of Information Security Incident Management
  • Understand the importance of establishing well-structured procedures and policies for Incident Management processes
  • Develop the expertise to manage an effective Incident Response Team

Course Content

  • Day 1: Introduction to Information Security Incident Management concepts as recommended by ISO/IEC 27035
  • Day 2: Designing and preparing an Information Security Incident Management plan
  • Day 3: Enacting the Incident Management process and handling Information Security incidents
  • Day 4: Monitoring and continual improvement of the Information Security Incident Management plan
  • Day 5: Certification Exam 

Course Overview

ISO/IEC 27032 Lead Cybersecurity Manager training enables you to acquire the expertise and competence needed to support an organization in implementing and managing a Cybersecurity program based on ISO/IEC 27032 and NIST Cybersecurity framework. During this training course, you will gain a comprehensive knowledge of Cybersecurity, the relationship between Cybersecurity and other types of IT security, and stakeholders’ role in Cybersecurity. 

After mastering all the necessary concepts of Cybersecurity, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27032 Lead Cybersecurity Manager” credential. By holding a PECB Lead Cybersecurity Manager Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead a team in managing Cybersecurity.

Course Objectives

  • Acquire comprehensive knowledge on the elements and operations of a Cybersecurity Program in conformance with ISO/IEC 27032 and NIST Cybersecurity framework
  • Acknowledge the correlation between ISO 27032, NIST Cybersecurity framework and other standards and operating frameworks
  • Master the concepts, approaches, standards, methods and techniques used to effectively set up, implement, and  manage a Cybersecurity program within an organization 
  • Learn how to interpret the guidelines of ISO/IEC 27032 in the specific context of an organization
  • Master the necessary expertise to plan, implement, manage, control and maintain a Cybersecurity Program as specified in ISO/IEC 27032 and NIST Cybersecurity framework 
  • Acquire the necessary expertise to advise an organization on the best practices for managing Cybersecurity 

Course Content

  • Day 1: Introduction to Cybersecurity and related concepts as recommended by ISO/IEC 27032
  • Day 2: Cybersecurity policies, risk management and attack mechanisms
  • Day 3: Cybersecurity controls, information sharing and coordination
  • Day 4: Incident management, monitoring and continuous improvement
  • Day 5: Certification Exam

Course Overview

ISO/IEC 27002 Manager training course provides information on the implementation and management of information security controls based on ISO/IEC 27002.

Why should you attend?

ISO/IEC 27002 Manager enables participants to acquire the necessary knowledge and skills to support an organization in selecting, implementing, and managing information security controls based on ISO/IEC 27002. The training course provides information that will help participants in gaining a thorough understanding of how information security risks can be treated by selecting relevant controls, especially in the context of an information security management system (ISMS).

A PECB ISO/IEC 27002 Manager certification will enable you to demonstrate your comprehensive knowledge in the implementation and management of information security controls based on industry best practices.

Course Objectives

By successfully completing this training course, you will be able to:

  • Explain the fundamental concepts of information security, cybersecurity, and privacy based on ISO/IEC 27002
  • Discuss the relationship between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
  • Support an organization in effectively determining, implementing, and managing information security controls based on ISO/IEC 27002

Course Content

  • Day 1: Introduction to ISO/IEC 27002
  • Day 2: Information assets, people controls, physical controls, and operational security controls
  • Day 3: Information security incident management and monitoring of information security controls and certification exam

Course Overview

The ISO/IEC 27002 Lead Manager training course enables participants to acquire a comprehensive knowledge and understanding of the implementation and management of information security controls based on ISO/IEC 27002.

Why Should You Attend?

The ISO/IEC 27002 Lead Manager training course enables participants to develop the necessary knowledge and skills for supporting an organization in effectively determining, implementing, and managing information security controls. The training course provides information that will help participants interpret the ISO/IEC 27002 controls in the specific context of an organization.

The PECB ISO/IEC 27002 Lead Manager Certification demonstrates that you have acquired the necessary expertise for determining adequate information security controls needed to treat the risks identified by a risk assessment process.

The training course is followed by an exam. If you pass, you can apply for the “PECB Certified ISO/IEC 27002 Lead Manager” credential.

Course Objectives

Upon successfully completing the training course, participants will be able to:

  • Explain the fundamental concepts of information security, cybersecurity, and privacy based on ISO/IEC 27002
  • Acknowledge the relationship between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
  • Interpret the ISO/IEC 27002 information security controls in the specific context of an organization
  • Support an organization in effectively determining, implementing, and managing information security controls based on ISO/IEC 27002 
  • Explain the approaches and techniques used for the implementation and effective management of information security controls

Course Content

  • Day 1: Introduction to ISO/IEC 27002
  • Day 2: Information security roles and responsibilities, people controls, and physical controls
  • Day 3: Information security assets, access controls, and protection of information systems and networks
  • Day 4: Information security incident management and testing and monitoring of information security controls based on ISO/IEC 27002
  • Day 5: Certification exam

Show me more 

Course Overview

This ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.

During this training course, you will also gain a thorough understanding of the best practices of Information Security Management Systems to secure the organization`s sensitive information and improve the overall performance and effectiveness. After mastering all the necessary concepts of Information Security Management Systems, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential. By holding a PECB Lead Implementer Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to implement ISO/IEC 27001 in an organization.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Objectives

  • Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks
  • Master the concepts, approaches, methods and techniques used for the implementation and effective management of an ISMS
  • Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization
  • Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS

Course Content

  • Introduction to ISO/IEC 27001 and initiation of an ISMS
  • Plan the implementation of an ISMS
  • Implementation of an ISMS
  • ISMS monitoring, measurement, continuous improvement and preparation for a certification audit
  • Certification Exam

Course Overview

The PECB ISO/IEC 27001 Lead Auditor training course is designed to prepare you to audit an information security management system (ISMS) based on ISO/IEC 27001. During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process.

The training content is comprised of practical exercises and case studies which bring you real-world expertise that you can apply to your day-to-day operations and activities. Based on practical exercises, you will be able to master audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution.

Our training courses are all-inclusive, meaning that they cover everything you need, in order to get the certificate. After acquiring the necessary expertise to perform an audit, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Auditor” credential. By holding a PECB Lead Auditor Certificate, you will demonstrate that you have the capabilities and competencies to audit organizations based on best practices.

Apart from showcasing what the ISO/IEC 27001 standard tells you to do, this training course tells you how to do it, through various activities, exercises, case studies, multiple-choice standalone  quizzes, and scenario-based quizzes. These will allow you to test your knowledge about the implementation process steps.

Course Objectives

After completing this course you shoud be able to:

  • Explain the fundamental concepts and principles of an information security management system (ISMS) based on ISO/ IEC 27001
  • Interpret the ISO/IEC 27001 requirements for an ISMS from the perspective of an auditor
  • Evaluate the ISMS conformity to ISO/IEC 27001 requirements, in accordance with the fundamental audit concepts and principles
  • Plan, conduct, and close an ISO/IEC 27001 compliance audit, in accordance with ISO/IEC 17021-1 requirements, ISO 19011 guidelines, and other best practices of auditing
  • Manage an ISO/IEC 27001 audit program

Course Content

Day 1: Introduction to Information Security Management Systems (ISMS) and ISO/IEC 27001 

  • Training Course Objectives and Structure
  • Standards and Regulatory Frameworks
  • Certification Process
  • Fundamental concepts and principles of information security
  • Information security management system (ISMS)

Day 2: Audit principles, preparation and launching of an audit

  • Fundamental audit concepts and principles
  • The impact of trends and technology in auditing
  • Evidence-based auditing
  • Risk-based auditing
  • Initiation of the audit process
  • Stage 1 audit

Day 3: On-site audit activities

  • Preparing for stage 2 audit
  • Stage 2 audit
  • Communication during the audit
  • Audit procedures
  • Creating audit test plans

Day 4: Closing the audit

  • Drafting audit findings and nonconformity reports
  • Audit documentation and quality review
  • Closing of the audit
  • Evaluation of action plans by the auditor
  • Beyond the initial audit
  • Managing an internal audit program
  • Closing of the training course

Course Overview

ISO/IEC 27001 Introduction training course enables participants to get introduced to the basic concepts and elements of an information security management system (ISMS) based on ISO/IEC 27001. 

Course Objectives

By the end of this training course, the participants will be able to:

  • Understand the main concepts and principles related to information security
  • Understand the structure and elements of an ISMS based on ISO/IEC 27001

Course Content

Day 1: Introduction to information security management system (ISMS) concepts based on ISO/IEC 27001

Course Overview

ISO/IEC 27002 Foundation training enables you to learn the basic elements to implement Information Security Controls as specified in ISO/IEC 27002. During this training course, you will be able to understand how ISO/IEC 27001 and ISO/IEC 27002 are related to ISO/IEC 27003 (Guidelines for the implementation of ISMS), ISO/IEC 27004 (Measurement of Information Security) and ISO/IEC 27005 (Risk Management in Information Security).

After completing this course, you can sit for the exam and apply for the “PECB Certificate Holder in ISO/IEC 27002 Foundation” certificate. A PECB Foundation Certificate shows that you have understood the fundamental methodologies and management approach.

Course Objectives

  • Understand the implementation of Information Security Controls in accordance with ISO/IEC 27002
  • Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks
  • Understand the approaches, methods and techniques used for the implementation of Information Security Controls

Course Content

  • Day 1: Introduction to ISO/IEC 27002 and Information Security Management System
  • Day 2: ISO/IEC 27002 Controls and Certificate Exam

Course Overview

ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001. During this training course, you will be able to understand the different modules of ISMS, including ISMS policy, procedures, performance measurements, management commitment, internal audit, management review and continual improvement.

After completing this course, you can sit for the exam and apply for the “PECB Certified ISO/IEC 27001 Foundation” credential. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, requirements, framework and management approach

Course Objectives

After completing this course you should be able to:

  • Describe the main information security management concepts, principles, and definitions
  • Explain the main ISO/IEC 27001 requirements for an information security management system (ISMS)
  • Identify approaches, methods, and techniques used for the implementation and management of an ISMS

Course Content

Day 1: Introduction to Information Security Management System (ISMS) concepts as required by ISO/IEC 27001

Day 2: Information Security Management System requirements and Certification Exam

Course Overview

This three-day course provides students with the foundational knowledge required to work with the Junos operating system and to configure Junos devices. 

The course provides a brief overview of the Juniper products and discusses the key architectural components of the Junos software. 

Key topics include user interface options with a heavy focus on the command-line interface (CLI), configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos devices. 

The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. 

Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. 

This course is based on Junos OS Release 21.1R1.11.

Course Level

Introduction to the Junos Operating System (IJOS) is an introductory level course.

Relevant Juniper Products

• ACX Series 

• Appsecure 

• Contrail 

• EX Series 

• JSA Series 

• Junos OS 

• Junos Space 

• M Series 

• MX Series 

• NFX Series 

• PTX Series 

• QFabric 

• QFX Series 

• SRX Series 

• T Series

Course Objectives

• Describe the Junos operating system and provide a brief overview of Juniper products. 

• Describe the Junos operating system and its basic design architecture. 

• Identify and provide a brief overview of Juniper products. 

• Use the Junos CLI and its operational mode to monitor and control Juniper devices. 

• Enter operational mode. 

• Locate various help options within the Junos CLI. 

• Execute monitoring and troubleshooting commands. 

• Configure a device using the CLI. 

• Enter configuration mode. 

• Navigate through the Junos configuration hierarchy. 

• Modify the configuration on a Juniper device. 

• Use common configuration mode commands. 

• Use the J-Web interface to make configuration changes, monitor and maintain Junos devices. 

• Configure basic system settings and interfaces. 

• Perform device administration. 

• Perform initial system configuration using Junos OS. 

• Load factory-default configuration. 

• List and perform initial system configuration tasks. 

• Describe interface types and perform basic interface configuration tasks. 

• Configure user authentication and device backups. 

• Describe and configure user authentication. 

• Archive configurations. 

• Configure System Logging, Tracing, NTP, and SNMP in Junos OS. 

• Configure and analyze system logging and tracing. 

• Configure and monitor NTP. 

• Configure and monitor SNMP. 

• Monitor and maintain Junos OS. 

• Monitor platform and interface operations. 

• Describe and use the available network utilities. 

• Perform password recovery. 

• Upgrade the Junos OS. 

• Perform storage and system cleanup tasks. 

• Perform the Junos upgrade. 

• Describe the interfaces configuration hierarchy. 

• Configure various interface types. 

• Use configuration groups to configure interfaces. 

• Describe the functionality of routing and routing instances. 

• Explain the basic routing concepts. 

• Describe the routing table and the forwarding table. 

• Describe the functionality of routing instances. 

• Configure and monitor a routing instance. 

• Implement static routes and dynamic routes using OSPF. 

• Configure and monitor static routes. 

• Describe the functionality of dynamic routing. 

• Configure and monitor OSPF. 

• Describe how routing works using IPv6. 

• Implement routing policy within Junos. 

• Describe the routing policy and explain the default Junos import and export routing policies. 

• Identify various options in the match criteria and action blocks of a routing policy. 

• Implement a routing policy for a given use case. 

• Implement firewall filters within Junos. 

• Describe the functionality and the framework of firewall filters. 

• Implement firewall filters for a given use case. 

• Implement a policer within Junos. 

• Describe the operation and configuration of unicast RPF. 

• Implement CoS within Junos. 

• Describe the purpose and benefits of CoS. 

• Implement traffic classification within Junos. 

• Describe the traffic queuing within Junos. 

• Configure traffic scheduling within Junos. 

• Implement CoS for a given use case. 

• Access and use Juniper support resources to manage Juniper Products. 

• Follow recommended procedures to open a JTAC support case. 

• Access Juniper online tools to manage Juniper products. 

• Use FTP to transfer large files to JTAC. 

• Describe the Juniper Connected Security components. 

• Identify high-level security challenges in today’s networks. 

• Describe the Juniper Connected Security components. 

• Implement IPv6 within Junos. 

• Describe the differences between IPv4 and IPv6. 

• Explain the IPv6 address format and the different address types. 

• Explain how IPv6 stateless and stateful autoconfigurations work. 

• Configure and monitor IPv6 routing. 

• Implement IPv6-over-IPv4 tunnels.

Course Content

Course Content

Top 

Day 1

Course Introduction

Junos Operating System Fundamentals 

• Describe the Junos operating system and its basic design architecture 

• Identify and provide a brief overview of Juniper products

Junos CLI Operational Mode

• Enter operational mode 

• Locate various help options within the Junos CLI 

• Execute monitoring and troubleshooting commands 

Junos CLI Configuration Mode

• Enter configuration mode 

• Navigate through the Junos configuration hierarchy 

• Modify the configuration on a Juniper device 

• Use common configuration mode commands

J-Web Interface

• Configure basic system settings and interfaces 

• Perform device administration 

Lab 1: User Interface Options

Initial System Configuration

• Load factory-default configuration 

• List and perform initial system configuration tasks 

• Describe interface types and perform basic interface configuration tasks 

Lab 2: Initial System Configuration

Day 2

User Authentication Archiving 

• Describe and configure user authentication 

• Archive configurations 

Lab 3: User Authentication and Archiving

System Logging, Tracing, NTP, and SNMP 

• Configure and analyze system logging and tracing 

• Configure and monitor NTP 

• Configure and monitor SNMP 

Lab 4: System Logging, Tracing, NTP, and SNMP

Operational Monitoring and Maintenance 

• Monitor platform and interface operations 

• Describe and use the available network utilities 

• Perform password recovery 

Lab 5: Operational Monitoring and Maintenance

Upgrading the Junos OS 

• Perform storage and system cleanup tasks 

• Perform the Junos upgrade 

Lab 6: Upgrading the Junos OS

Interface Configuration Examples 

• Configure various interface types 

• Use configuration groups to configure interfaces

Routing Fundamentals 

• Explain the basic routing concepts 

• Describe the routing table and the forwarding table 

• Describe the functionality of routing instances 

• Configure and monitor a routing instance 

Lab 7: Routing Fundamentals

Static and Dynamic Routing 

• Configure and monitor static routes 

• Describe the functionality of dynamic routing 

• Configure and monitor OSPF 

• Describe how routing works using IPv6 

Lab 8: Static and Dynamic Routing

Day 3

Routing Policy 

• Describe the routing policy and explain the default Junos import and export routing policies 

• Identify various options in the match criteria and action blocks of a routing policy 

• Implement a routing policy for a given use case 

Lab 9: Routing Policy

Firewall Filters 

• Describe the functionality and the framework of firewall filters 

• Implement firewall filters for a given use case 

• Implement a policer within Junos 

• Describe the operation and configuration of unicast RPF 

Lab 10: Firewall Filters

Class of Service 

• Describe the purpose and benefits of CoS 

• Implement traffic classification within Junos 

• Describe the traffic queuing within Junos 

• Configure traffic scheduling within Junos 

• Implement CoS for a given use case 

Lab 11: Class of Service

JTC Procedures 

• Follow recommended procedures to open a JTAC support case 

• Access Juniper online tools to manage Juniper products 

• Use FTP to transfer large files to JTAC

Juniper Security Concepts 

• Identify high-level security challenges in today’s networks 

• Describe the Juniper Connected Security components

Please note that the following Appendix is not covered as standard during the training course unless requested by the customer, and agreed with Global Knowledge, upon booking:

Appendix: IPv6 Fundamentals 

• Describe the differences between IPv4 and IPv6 

• Explain the IPv6 address format and the different address types 

• Explain how IPv6 stateless and stateful autoconfigurations work 

• Configure and monitor IPv6 routing 

• Implement IPv6-over-IPv4 tunnels