PECB Certified ISO/IEC 27001 Lead Auditor
This 40-hour ISO/IEC 27001 Lead Auditor training course is designed to prepare you to audit an information security management system (ISMS) based on ISO/IEC 27001.
This 40-hour ISO/IEC 27001 Lead Auditor training course is designed to prepare you to audit an information security management system (ISMS) based on ISO/IEC 27001.
This 16-hour ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in
This 40-hour ISO/IEC 27001 Lead Implementer training course not only enables you to acquire the knowledge and competence in implementing an information security management system
This 8-hour ISO/IEC 27001 Introduction training course enables you to become familiar with the basic concepts of an Information Security Management System (ISMS). By attending
Captiva Solutions LLC
8201 Corporate Dr Ste 635
Greater Landover, MD 20785
TF: 888.850.9280
Tel: 202.770.2120
Fax: 202.770.2121
Captiva Solutions is your trusted partner for all your IT and cybersecurity concerns. Using cutting-edge technology, adaptive systems, dedicated resources, and the highest levels of skills and expertise, we offer comprehensive IT solutions at competitive rates.
COPYRIGHT © 2023 CAPTIVA SOLUTIONS
Level 1
An organization must demonstrate basic cyber hygiene practices, such as ensuring employees change passwords regularly to protect Federal Contract Information (FCI). FCI is “information, not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the Government.”
Level 2
An organization must have an institutionalized management plan to implement good cyber hygiene practices to safeguard CUI, including all the NIST 800-171 r2 security requirements and processes
Level 3 – Expert.
An organization must have standardized and optimized processes in place and additional enhanced practices that detect and respond to changing tactics, techniques and procedures (TTPs) of advanced persistent threats (APTs).
An APT is an adversary that possesses sophisticated levels of cyber expertise and significant resources to conduct attacks from multiple vectors. Capabilities include having resources to monitor, scan, and process data forensics.