{"id":18592,"date":"2025-09-10T11:53:02","date_gmt":"2025-09-10T09:53:02","guid":{"rendered":"https:\/\/acgcyberacademy.fr\/?post_type=mec-events&#038;p=18592"},"modified":"2025-11-18T15:51:48","modified_gmt":"2025-11-18T14:51:48","slug":"pecb-iso-iec-27035-foundation","status":"publish","type":"mec-events","link":"http:\/\/acgcyberacademy.fr\/en\/events\/pecb-iso-iec-27035-foundation\/","title":{"rendered":"PECB ISO\/IEC 27035 Foundation"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"18592\" class=\"elementor elementor-18592\" data-elementor-post-type=\"mec-events\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c0c232 e-flex e-con-boxed e-con e-child\" data-id=\"6c0c232\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-42f62ef3 e-flex e-con-boxed e-con e-child\" data-id=\"42f62ef3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6e08bcf e-con-full e-flex e-con e-child\" data-id=\"6e08bcf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2de041b elementor-widget elementor-widget-image\" data-id=\"2de041b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"203\" height=\"248\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/04\/images-removebg-preview-1.png\" class=\"attachment-medium size-medium wp-image-14850\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18aa20b elementor-widget__width-initial elementor-widget elementor-widget-spacer\" data-id=\"18aa20b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9906195 elementor-widget elementor-widget-image\" data-id=\"9906195\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"500\" height=\"200\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/03\/pecb.png\" class=\"attachment-large size-large wp-image-6392\" alt=\"\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/03\/pecb.png 500w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/03\/pecb-300x120.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a25635 elementor-widget elementor-widget-spacer\" data-id=\"2a25635\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32887ac4 elementor-widget elementor-widget-text-editor\" data-id=\"32887ac4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Appr\u00e9hender les meilleures pratiques relatives \u00e0 la gestion des incidents de s\u00e9curit\u00e9 de l&rsquo;information selon l\u2019ISO\/CEI 27035<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b0eb856 e-flex e-con-boxed e-con e-child\" data-id=\"5b0eb856\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ad7b056 elementor-widget elementor-widget-heading\" data-id=\"4ad7b056\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The target audience for training<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25da03fa elementor-widget elementor-widget-text-editor\" data-id=\"25da03fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Anyone interested in the process approach to information security incident management<\/li><li>People wishing to acquire knowledge of the principles and concepts of information security incident management<\/li><li>People wishing to pursue a career in information security incident management<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d6e3ac1 e-flex e-con-boxed e-con e-child\" data-id=\"5d6e3ac1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d4b68c9 elementor-widget elementor-widget-heading\" data-id=\"4d4b68c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What you will learn<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57a3c7d5 elementor-widget elementor-widget-text-editor\" data-id=\"57a3c7d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Training <strong>ISO\/IEC 27035 Foundation<\/strong> will enable you to understand the fundamentals of implementing an incident management plan and managing information security incidents. This course will help you understand the processes involved in managing information security incidents.<\/div><div>\u00a0<\/div><div>Once you have completed the training course, you can sit the exam and apply for the title of \"<strong> PECB Certified ISO\/IEC 27035 Foundation<\/strong> \".  PECB Foundation certification certifies that you have understood the fundamental methods, requirements and management approach.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71419de5 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"71419de5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ca12bed elementor-widget elementor-widget-heading\" data-id=\"1ca12bed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Training programme <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10905e70 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"10905e70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-hourglass-half\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Duration: 2 days<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-364b8cb elementor-widget elementor-widget-n-accordion\" data-id=\"364b8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Module 1: Fundamentals of System and Network Security\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-5690\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-5690\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 1: Introduction to the fundamental principles and concepts of information security incident management, as defined by the ISO\/IEC 27035 standard <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5690\" class=\"elementor-element elementor-element-a48bc06 e-con-full e-flex e-con e-child\" data-id=\"a48bc06\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5690\" class=\"elementor-element elementor-element-64b96a8 e-flex e-con-boxed e-con e-child\" data-id=\"64b96a8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5690\" class=\"elementor-element elementor-element-537a005 e-con-full e-flex e-con e-child\" data-id=\"537a005\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-348ee4f elementor-widget elementor-widget-text-editor\" data-id=\"348ee4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Welcome and presentation of objectives, course content and assessment methods.<\/li><li>Context and regulatory frameworks: positioning of ISO\/IEC 27035 in relation to ISO\/IEC 27001 and other standards<\/li><li>Key definitions and terminology: incident, security event, incident management.<\/li><li>Fundamental concepts and methodologies associated with incident management.<\/li><li>ISO\/IEC 27035 incident management process: preparation, detection, notification, response, recovery, feedback.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-5691\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-5691\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 2: Information security incident management process approaches and certification exam <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5691\" class=\"elementor-element elementor-element-ba40fd6 e-con-full e-flex e-con e-child\" data-id=\"ba40fd6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5691\" class=\"elementor-element elementor-element-eb76f6d e-con-full e-flex e-con e-child\" data-id=\"eb76f6d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9fadaca elementor-widget elementor-widget-text-editor\" data-id=\"9fadaca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Exploring approaches and best practice for implementing an incident management plan: policies, roles, responsibilities, documentation, internal communication.<\/li><li>Presentation of different business processes for effective incident management.<\/li><li>Preparation for the certification exam :<ul><li>Review of the main concepts and stages in the incident management cycle.<\/li><li>Simulation of a concrete case based on a typical incident.<\/li><li>Reminder of the objectives of the exam: structure, duration, format of questions.<\/li><li>Presentation of the PECB certification process.<\/li><li>Advice on how to pass the exam.<\/li><li>Passing the PECB ISO\/IEC 27035 Foundation certification exam.<\/li><\/ul><\/li><li>Attendance certificates are handed out and participants evaluate the course.<\/li><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-5692\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-5692\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Training review <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5692\" class=\"elementor-element elementor-element-46e0a15 e-con-full e-flex e-con e-child\" data-id=\"46e0a15\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5692\" class=\"elementor-element elementor-element-a5a58b8 e-flex e-con-boxed e-con e-child\" data-id=\"a5a58b8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5692\" class=\"elementor-element elementor-element-86f1769 e-con-full e-flex e-con e-child\" data-id=\"86f1769\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-85a0e4a elementor-widget elementor-widget-text-editor\" data-id=\"85a0e4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Examination <strong>\"Certified ISO\/IEC 27035 Foundation<\/strong> meets the requirements of the PECB examination and certification programme. The examination covers the following areas of competence:<\/p><ul><li><strong>Area 1\u00a0<\/strong>: Fundamental concepts and principles of information security incident management<\/li><li><strong>Area 2<\/strong>\u00a0Information security incident management<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3add2827 e-flex e-con-boxed e-con e-child\" data-id=\"3add2827\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-796b392b e-flex e-con-boxed e-con e-child\" data-id=\"796b392b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d8ecc26 elementor-widget elementor-widget-heading\" data-id=\"d8ecc26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Trainer profile :\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a33cab7 elementor-widget elementor-widget-text-editor\" data-id=\"2a33cab7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An expert consultant-trainer in cybersecurity, combining technical expertise, field experience and teaching know-how, whose technical, professional and teaching skills have been rigorously assessed and validated as part of our internal selection procedures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d8963a elementor-widget elementor-widget-heading\" data-id=\"8d8963a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Teaching methods and resources:\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86dd035 elementor-widget elementor-widget-text-editor\" data-id=\"86dd035\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The course is based on a balanced combination of theoretical and practical approaches, guaranteeing both the acquisition of knowledge and its operational application:<\/p><p>\u00a0<\/p><ul><li>Structured theoretical input, illustrated by practical examples tailored to the participants' professional context.<\/li><li>Practical exercises at each stage to help you assimilate the knowledge you have acquired.<\/li><li>A case study linking the different skill blocks.<\/li><li>Strong interaction between trainers and trainees, making exchanges more concrete and in correlation with trainees' expectations.<\/li><li>Full educational documentation, supplied in digital format.<\/li><li>Course evaluation questionnaire at the end of the course, analysed by our teaching team.<\/li><li>Certificate of acquired skills sent to the trainee at the end of the course.<\/li><li>End-of-training certificate sent at the same time as the invoice to the company or funding organisation, confirming that the trainee has fully attended the session.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39dfad0 elementor-widget elementor-widget-heading\" data-id=\"39dfad0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Training objectives<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f706066 elementor-widget elementor-widget-text-editor\" data-id=\"f706066\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Understanding the fundamental concepts of information security incident management<\/li><li>Understanding the correlation between ISO\/IEC 27035 and other standards and regulatory frameworks<\/li><li>Understanding the process approach for effectively managing information security incidents<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fbaa5c elementor-widget elementor-widget-heading\" data-id=\"4fbaa5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Assessment method <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-396e08d elementor-widget elementor-widget-text-editor\" data-id=\"396e08d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Practical exercises at every stage of the course.<\/li><li>A case study linking the different skill blocks.<\/li><li>Quiz at the end of each day's training.<\/li><li>Self-assessment of knowledge acquired by the trainee via a questionnaire.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f051be3 e-flex e-con-boxed e-con e-child\" data-id=\"4f051be3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52b552e6 elementor-widget elementor-widget-heading\" data-id=\"52b552e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Training prerequisites<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae18b01 elementor-widget elementor-widget-text-editor\" data-id=\"ae18b01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This ISO 27035 Foundation course has no specific pre-requisites.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0508fd elementor-widget elementor-widget-spacer\" data-id=\"e0508fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-22ef7de0 e-flex e-con-boxed e-con e-parent\" data-id=\"22ef7de0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b690eba elementor-align-center elementor-widget elementor-widget-button\" data-id=\"3b690eba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/iso-iec-27035-foundation_1p-fr.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">See the brochure for this course<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Appr\u00e9hender les meilleures pratiques relatives \u00e0 la gestion des incidents de s\u00e9curit\u00e9 de l&rsquo;information selon l\u2019ISO\/CEI 27035 L&rsquo; audience cibl\u00e9e par la formation Toute personne int\u00e9ress\u00e9e par \u00a0l\u2019approche processus \u00a0de gestion des incidents de la s\u00e9curit\u00e9\u00a0 de l\u2019information Personnes souhaitant acqu\u00e9rir des connaissances sur les \u00a0principes et concepts de gestion des incidents de s\u00e9curit\u00e9 d\u2019information [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":18593,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"accesibilite":[145],"certification":[87],"duree":[154],"examen":[146],"langue":[144],"niveau":[90],"formateur":[89],"mec_category":[96],"class_list":["post-18592","mec-events","type-mec-events","status-publish","has-post-thumbnail","hentry","accesibilite-oui","certification-oui","duree-2-jours","examen-oui","langue-francais","niveau-fondamental","formateur-pecb","mec_category-management-de-la-securite-de-linformation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PECB ISO\/IEC 27035 Foundation - ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"Appr\u00e9hender les meilleures pratiques relatives \u00e0 la gestion des incidents de s\u00e9curit\u00e9 de l&#039;information selon l\u2019ISO\/CEI 27035.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/events\/pecb-iso-iec-27035-foundation\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PECB ISO\/IEC 27035 Foundation - ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"Appr\u00e9hender les meilleures pratiques relatives \u00e0 la gestion des incidents de s\u00e9curit\u00e9 de l&#039;information selon l\u2019ISO\/CEI 27035.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/events\/pecb-iso-iec-27035-foundation\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T14:51:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/images-5.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"168\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-iso-iec-27035-foundation\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-iso-iec-27035-foundation\\\/\",\"name\":\"PECB ISO\\\/IEC 27035 Foundation - ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-iso-iec-27035-foundation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-iso-iec-27035-foundation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/images-5.jpg\",\"datePublished\":\"2025-09-10T09:53:02+00:00\",\"dateModified\":\"2025-11-18T14:51:48+00:00\",\"description\":\"Appr\u00e9hender les meilleures pratiques relatives \u00e0 la gestion des incidents de s\u00e9curit\u00e9 de l'information selon l\u2019ISO\\\/CEI 27035.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-iso-iec-27035-foundation\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-iso-iec-27035-foundation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-iso-iec-27035-foundation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/images-5.jpg\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/images-5.jpg\",\"width\":300,\"height\":168,\"caption\":\"A l\u2019issue de la formation, le stagiaire sera capable de mettre en \u0153uvre un plan de gestion des incidents de s\u00e9curit\u00e9 de l\u2019information\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-iso-iec-27035-foundation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formations\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"PECB ISO\\\/IEC 27035 Foundation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PECB ISO\/IEC 27035 Foundation - ACG CyberAcademy","description":"Appr\u00e9hender les meilleures pratiques relatives \u00e0 la gestion des incidents de s\u00e9curit\u00e9 de l'information selon l\u2019ISO\/CEI 27035.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/events\/pecb-iso-iec-27035-foundation\/","og_locale":"en_GB","og_type":"article","og_title":"PECB ISO\/IEC 27035 Foundation - ACG CyberAcademy","og_description":"Appr\u00e9hender les meilleures pratiques relatives \u00e0 la gestion des incidents de s\u00e9curit\u00e9 de l'information selon l\u2019ISO\/CEI 27035.","og_url":"https:\/\/acgcyberacademy.fr\/en\/events\/pecb-iso-iec-27035-foundation\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2025-11-18T14:51:48+00:00","og_image":[{"width":300,"height":168,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/images-5.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-iso-iec-27035-foundation\/","url":"https:\/\/acgcyberacademy.fr\/events\/pecb-iso-iec-27035-foundation\/","name":"PECB ISO\/IEC 27035 Foundation - ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-iso-iec-27035-foundation\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-iso-iec-27035-foundation\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/images-5.jpg","datePublished":"2025-09-10T09:53:02+00:00","dateModified":"2025-11-18T14:51:48+00:00","description":"Appr\u00e9hender les meilleures pratiques relatives \u00e0 la gestion des incidents de s\u00e9curit\u00e9 de l'information selon l\u2019ISO\/CEI 27035.","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-iso-iec-27035-foundation\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/events\/pecb-iso-iec-27035-foundation\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-iso-iec-27035-foundation\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/images-5.jpg","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/images-5.jpg","width":300,"height":168,"caption":"A l\u2019issue de la formation, le stagiaire sera capable de mettre en \u0153uvre un plan de gestion des incidents de s\u00e9curit\u00e9 de l\u2019information"},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-iso-iec-27035-foundation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Formations","item":"https:\/\/acgcyberacademy.fr\/events\/"},{"@type":"ListItem","position":3,"name":"PECB ISO\/IEC 27035 Foundation"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/18592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=18592"}],"version-history":[{"count":16,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/18592\/revisions"}],"predecessor-version":[{"id":21769,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/18592\/revisions\/21769"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/18593"}],"wp:attachment":[{"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=18592"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/tags?post=18592"},{"taxonomy":"accesibilite","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/accesibilite?post=18592"},{"taxonomy":"certification","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/certification?post=18592"},{"taxonomy":"duree","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/duree?post=18592"},{"taxonomy":"examen","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/examen?post=18592"},{"taxonomy":"langue","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/langue?post=18592"},{"taxonomy":"niveau","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/niveau?post=18592"},{"taxonomy":"formateur","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/formateur?post=18592"},{"taxonomy":"mec_category","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec_category?post=18592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}