ISO/IEC 27035 Lead Incident Manager training enables you to acquire the necessary expertise to support an organization in implementing an Information Security Incident Management plan based on ISO/IEC 27035. During this training course, you will gain a comprehensive knowledge of a process model for designing and developing an organizational incident management plan.
are included in the price of the training course
over 450 pages of information and practical examples will be distributed
31 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course
you can retake the exam within 12 months for free
Credential |
Exam |
Professional experience |
ISIMMS project experience |
Other requirements |
PECB Certified ISO/IEC 27035 Provisional Incident Manager |
PECB Certified ISO/IEC 27035 Lead Incident Manager Exam or equivalent |
None |
None |
Signing the PECB Eode of Ethics |
PECB Certified ISO/IEC 27035 Incident Manager |
PECB Certified ISO/IEC 27035 Lead Incident Manager Exam or equivalent |
Two years: One year of work experience in Information Security Incident Management |
ISIM activities: a total of 200 hours |
Signing the PECB Code of Ethics |
PECB Certified ISO/IEC 27035 Lead Incident Manager |
PECB Certified ISO/IEC 27035 Lead Incident Manager Exam or equivalent |
Five years: Two years of work experience in Information Security Incident Management |
ISIM activities: a total of 300 hours |
Signing the PECB Code of Ethics |
PECB Certified ISO/IEC 27035 Senior Lead Incident Manager |
PECB Certified ISO/IEC 27035 Lead Incident Manager Exam or equivalent |
Ten years: Seven years of work experience in Information Security Incident Management |
ISIM activities: a total of 1,000 hours |
Signing the PECB Code of Ethics |
Provide a safe and sustainable business environment for your company. We help build a resilient and reliable digital landscape, even in the face of changing threats.
Analysis of employee awareness focuses on mapping the skills and increasing the competencies of the weakest link in cyber security: the users, the employees.
Threat assessment is a tactical and technical service that allows a company to get a quick overview of external threats.
Maturity assessment helps plan IT investments and design further steps to mitigate vulnerabilities and ensure better security.