Info Security Controls ISO/IEC 27002 – 2-Day Course | Austin, TX

Info Security Controls ISO/IEC 27002 – 2-Day Course | Austin, TX

Overview

Information Security Foundation based on ISO/IEC 27002 focusing on reliability, risks, security measures, and certification readiness.


Bring your team and save:

1. Groups of three or more receive a 10% discount

2. Organizations hosting an in-house session with 10+ participants enjoy a 15% discount.

About the Course:

Duration: 2 Days (9:00 AM – 5:00 PM)
Delivery Mode: Classroom / In-Person Workshop
Language: English
Credits: 16 PDUs / Training Hours
Certification: Course Completion Certificate Provided
Refreshments: Lunch, tea/coffee, and snacks included

Course Overview:

Information Security is gaining importance in Information Technology (IT). Globalization of the economy leads to a growing exchange of information between organizations (their employees, customers and suppliers). It also leads to a growing use of networks, such as the internal company network, connection with the networks of other companies and the Internet. Furthermore, activities of many companies now rely on IT, and information has become a valuable asset. Protection of information is crucial for the continuity and proper functioning of the organization: information must be reliable.

In the Information Security Foundation module, based on ISO/IEC 27002 (ISFS), the basic concepts of information security and their coherence are tested.

EXIN Information Security Foundation is part of the Certified Integrator Program and is one of the prerequisites to attain the title: EXIN Certified Integrator Secure Cloud Services. You will receive the certificate EXIN Certified Integrator Secure Cloud Services when you possess the certificates: EXIN Information Security Foundation, EXIN Cloud Computing Foundation and EXIN IT Service Management Foundation.

Learning Objectives:

Individuals certified at this level will have demonstrated their understanding of:
● The concept, importance and the reliability of information.
● The types of risks, threats and damages, and the available risk strategies and the security measures you can take.
● The security policy and organization, inclusive code of conduct, ownership, and roles and responsibilities. Moreover you learn how to manage security incidents.
● The various security measures.
● Physical measures such as identity passes and finger scans.
● Technical measures such as cryptography, and you will learn how to deal with attacks such as phishing, spam and malware.
● Organizational measures you can take such as access management and Business Continuity Management.
● The most important legislation and regulations.

Target Audience:

The target group of ISFS is everyone in the organization. The basic knowledge that is tested in this module contributes to the understanding that information is vulnerable and that measures are necessary to protect this information. The module is also suitable for small independent businesses for whom some basic knowledge of information security is necessary. This module can be a good start for new information security professionals.

Why is it the Right Fit for You?

Information has become a valuable asset and protection of information is crucial for the continuity and proper functioning of the organization. This two day workshop provides basic concepts of information security based on ISO/IEC 27002 and tests their coherence. It contributes to understanding that information is vulnerable and that measures are necessary to protect this information while supporting certification requirements under the Certified Integrator Program.

©2026 Mangates Tech Solutions Pvt Ltd. This content is protected by copyright law. Copy or Reproduction without permission is prohibited.

Information Security Foundation based on ISO/IEC 27002 focusing on reliability, risks, security measures, and certification readiness.


Bring your team and save:

1. Groups of three or more receive a 10% discount

2. Organizations hosting an in-house session with 10+ participants enjoy a 15% discount.

About the Course:

Duration: 2 Days (9:00 AM – 5:00 PM)
Delivery Mode: Classroom / In-Person Workshop
Language: English
Credits: 16 PDUs / Training Hours
Certification: Course Completion Certificate Provided
Refreshments: Lunch, tea/coffee, and snacks included

Course Overview:

Information Security is gaining importance in Information Technology (IT). Globalization of the economy leads to a growing exchange of information between organizations (their employees, customers and suppliers). It also leads to a growing use of networks, such as the internal company network, connection with the networks of other companies and the Internet. Furthermore, activities of many companies now rely on IT, and information has become a valuable asset. Protection of information is crucial for the continuity and proper functioning of the organization: information must be reliable.

In the Information Security Foundation module, based on ISO/IEC 27002 (ISFS), the basic concepts of information security and their coherence are tested.

EXIN Information Security Foundation is part of the Certified Integrator Program and is one of the prerequisites to attain the title: EXIN Certified Integrator Secure Cloud Services. You will receive the certificate EXIN Certified Integrator Secure Cloud Services when you possess the certificates: EXIN Information Security Foundation, EXIN Cloud Computing Foundation and EXIN IT Service Management Foundation.

Learning Objectives:

Individuals certified at this level will have demonstrated their understanding of:
● The concept, importance and the reliability of information.
● The types of risks, threats and damages, and the available risk strategies and the security measures you can take.
● The security policy and organization, inclusive code of conduct, ownership, and roles and responsibilities. Moreover you learn how to manage security incidents.
● The various security measures.
● Physical measures such as identity passes and finger scans.
● Technical measures such as cryptography, and you will learn how to deal with attacks such as phishing, spam and malware.
● Organizational measures you can take such as access management and Business Continuity Management.
● The most important legislation and regulations.

Target Audience:

The target group of ISFS is everyone in the organization. The basic knowledge that is tested in this module contributes to the understanding that information is vulnerable and that measures are necessary to protect this information. The module is also suitable for small independent businesses for whom some basic knowledge of information security is necessary. This module can be a good start for new information security professionals.

Why is it the Right Fit for You?

Information has become a valuable asset and protection of information is crucial for the continuity and proper functioning of the organization. This two day workshop provides basic concepts of information security based on ISO/IEC 27002 and tests their coherence. It contributes to understanding that information is vulnerable and that measures are necessary to protect this information while supporting certification requirements under the Certified Integrator Program.

©2026 Mangates Tech Solutions Pvt Ltd. This content is protected by copyright law. Copy or Reproduction without permission is prohibited.

Our Royalty Referral Program

Know a team or professional who could benefit from our workshops? Refer them and earn attractive royalties for every successful registration.

For royalty-related queries, contact orders@mangates.com

Want to train your entire team together?

This two day workshop can be delivered in classroom or virtual mode and is suitable for everyone in the organization, enabling teams to build a shared understanding of information security fundamentals.

📧 Contact us today to schedule a customized in-house session: corporate@mangates.com

Good to know

Highlights

  • ages 18+
  • In person

Refund Policy

Refunds up to 7 days before event

Location

regus TX, Austin - Dobie Center

2021 Guadalupe Street Suite 260

Ph No +1 469 666 9332 Austin, TX 78705

How do you want to get there?

Map

Agenda

Module 1: The concept, importance and the reliability of information

Module 2: The types of risks, threats and damages

Module 3: Security policy and organization

Frequently asked questions
Organized by
Mangates
Followers--
Events100543
Hosting--
Report this event