{"id":21874,"date":"2024-04-03T14:25:36","date_gmt":"2024-04-03T11:25:36","guid":{"rendered":"https:\/\/esi.edu.sa\/courses\/iso-27017-%d8%a5%d8%b7%d8%a7%d8%b1-%d9%85%d9%85%d8%a7%d8%b1%d8%b3%d8%a7%d8%aa-%d8%a3%d9%85%d8%a7%d9%86-%d8%a7%d9%84%d9%85%d8%b9%d9%84%d9%88%d9%85%d8%a7%d8%aa\/"},"modified":"2024-12-23T03:02:18","modified_gmt":"2024-12-23T00:02:18","slug":"iso-27017-%d8%a5%d8%b7%d8%a7%d8%b1-%d9%85%d9%85%d8%a7%d8%b1%d8%b3%d8%a7%d8%aa-%d8%a3%d9%85%d8%a7%d9%86-%d8%a7%d9%84%d9%85%d8%b9%d9%84%d9%88%d9%85%d8%a7%d8%aa","status":"publish","type":"courses","link":"https:\/\/esi.edu.sa\/en\/courses\/iso-27017-%d8%a5%d8%b7%d8%a7%d8%b1-%d9%85%d9%85%d8%a7%d8%b1%d8%b3%d8%a7%d8%aa-%d8%a3%d9%85%d8%a7%d9%86-%d8%a7%d9%84%d9%85%d8%b9%d9%84%d9%88%d9%85%d8%a7%d8%aa\/","title":{"rendered":"ISO 27017 (Information security best-practice framework"},"content":{"rendered":"<p dir=\"ltr\"><strong><u>Course Overview:<\/u><\/strong><\/p>\n<p dir=\"ltr\">The ISO 27017 Training Course offers comprehensive insights into information security best<\/p>\n<p dir=\"ltr\">practices tailored for cloud service providers and their customers. It focuses on addressing<\/p>\n<p dir=\"ltr\">the unique challenges and requirements of securing data and systems in the cloud.<\/p>\n<p dir=\"ltr\"><strong><u>Course Objectives:<\/u><\/strong><\/p>\n<p dir=\"ltr\">Understand its application &amp; Identify and mitigate cloud- specific risks.<\/p>\n<p dir=\"ltr\">Define roles and responsibilities &amp; Implement data protection measures.<\/p>\n<p dir=\"ltr\">Implement data protection measures &amp;Comprehend compliance and certification.<\/p>\n<p dir=\"ltr\">Develop incident response strategies &amp; Master cloud security controls.<\/p>\n<p dir=\"ltr\">Integrate with relevant ISO standards.<\/p>\n<p dir=\"ltr\"><strong><u>Course Contents:<\/u><\/strong><\/p>\n<p dir=\"ltr\">The course content is designed to provide a comprehensive understanding of cloud security<\/p>\n<p dir=\"ltr\">by covering the following key topics:<\/p>\n<p dir=\"ltr\">Cloud security risks.<\/p>\n<p dir=\"ltr\">Roles and responsibilities.<\/p>\n<p dir=\"ltr\">Data protection methods.<\/p>\n<p dir=\"ltr\">Compliance and certification.<\/p>\n<p dir=\"ltr\">Incident response strategies.<\/p>\n<p dir=\"ltr\">Security controls and best practices.<\/p>\n<p dir=\"ltr\">Integration with ISO standards.<\/p>\n<p dir=\"ltr\"><strong><u>Target Audience:<\/u><\/strong><\/p>\n<p dir=\"ltr\">This training is suitable for IT professionals, cloud service providers, cloud administrators,<\/p>\n<p dir=\"ltr\">compliance officers, security analysts, and anyone involved in cloud security or compliance<\/p>\n<p dir=\"ltr\">efforts.<\/p>\n","protected":false},"author":202,"featured_media":21802,"template":"","course_category":[37],"class_list":["post-21874","courses","type-courses","status-publish","has-post-thumbnail","hentry","course_category-management","infinite-scroll-item","no-featured-image-padding"],"acf":[],"_links":{"self":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/21874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses"}],"about":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/types\/courses"}],"author":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/users\/202"}],"version-history":[{"count":3,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/21874\/revisions"}],"predecessor-version":[{"id":27831,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/21874\/revisions\/27831"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media\/21802"}],"wp:attachment":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media?parent=21874"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/course_category?post=21874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}