32 Comments
5/5

E-Learning & Certification on ISO 15408 information security management topics

CERTIFICATE HELPLINE OVERVIEW

E-Learning & Certification on ISO 15408 information security management topics, makes you familiar with the concepts and topics of this standard. Today, information technology management in organizations has become a complex and ambiguous thing due to the diversity of technologies and the expansion of the influence of information technology applications in all business fields. On the other hand, the position and importance of information technology in organizations has been improved due to the expansion of its influence in various fields of business. This importance is so important that some services of organizations cannot be provided to customers without the help of information technology. The complexity and importance of information technology in organizations has caused its effective management to be one of the concerns of the senior management of any organization. Compliance with the frameworks and standards of information technology management is one of the solutions to reduce these concerns. The ISO 15408 standard is a framework in which users express their security functional requirements. Manufacturers implement the security features of their products, and finally, laboratories evaluate products to ensure that security requirements are met. In fact, this standard provides a platform in which the process of specifying, implementing and evaluating the security features of computer products is controlled.

ISO / IEC 15408 standard components:

+ Introduction and general model + Security Functional Requirements + Security Assurance Requirements ISO / IEC 15408 is a framework by which computer system users can define their security and assurance performance requirements (SFRs and SAR respectively) for the security target document (ST) which is the result of the protection profile document (PPs) for product security evaluation. In fact, the sellers of information technology products first provide the product security target document to the certification laboratories, then the laboratories perform the security evaluation of the products based on the protection profile document, and if it is successful and passes the security indicators, the product The target receives a security certificate.

What’s in the virtual learning course You will learn ISO 15408 information security management topics:

+ explains the general concepts and rules of IT security assessment. + Security functional requirements. + Security Assurance Requirements.

Prerequisites of the information security management training course:

[list_negative] This course does not require special prerequisites and the course is taught from the basics. [/list_negative]

FAQ

In this helpline program, RCO Academy helps you to receive a degree equivalent to your skill level by participating in the virtual course or by evaluating your supporting documents.

In this program, you can be evaluated by sending your educational records, skill training courses, a C.V of valid work experience, or participating in RCO online exam.

All  Certificate issued through RCO academy website (RCO.AC) can be queried and tracked.

How to Achieve RCO Certificate
32,77