{"id":1592,"date":"2018-07-29T20:12:26","date_gmt":"2018-07-29T17:12:26","guid":{"rendered":"https:\/\/profplansolutions.com\/?page_id=1592"},"modified":"2020-08-22T05:29:37","modified_gmt":"2020-08-22T02:29:37","slug":"information-security","status":"publish","type":"page","link":"https:\/\/profplansolutions.com\/?page_id=1592&lang=en","title":{"rendered":"Information Security"},"content":{"rendered":"<p>[vc_row background_position=&#8221;right top&#8221; css=&#8221;.vc_custom_1573771507531{margin-bottom: 0px !important;padding-top: 80px !important;background-image: url(https:\/\/profplansolutions.com\/wp-content\/uploads\/2019\/11\/lines-1.png?id=2300) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221; bg_overlay=&#8221;&#8221;][vc_column][vc_column_text]<\/p>\n<h2 class=\"hero\" style=\"text-align: center;\"><span style=\"font-weight: 400;\">What is the Information Security and Privacy?<\/span><\/h2>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1573771479795{margin-bottom: 0px !important;}&#8221; bg_overlay=&#8221;&#8221;][vc_column][vc_text_separator margin_bottom=&#8221;30&#8243;][\/vc_column][\/vc_row][vc_row background_position=&#8221;left bottom&#8221; css=&#8221;.vc_custom_1573771526859{margin-bottom: 0px !important;padding-bottom: 80px !important;background-image: url(https:\/\/profplansolutions.com\/wp-content\/uploads\/2019\/11\/lines-copy-1.png?id=2299) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221; bg_overlay=&#8221;&#8221;][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h4 style=\"text-align: center;\"><strong><br \/>\nInformation Security <\/strong>is the system that cares and maintains the following: Availability of information, confidentiality of information and its full credibility<strong>.<\/strong><\/h4>\n<h4 style=\"text-align: center;\"><strong><br \/>\nInformation Privacy<\/strong> is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, legal and political issues surrounding them<strong>.<br \/>\n<\/strong><\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10&#8243;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1423854370283{margin-bottom: 0px !important;border-top-width: 1px !important;padding-top: 80px !important;padding-bottom: 80px !important;background-color: #f8f8f8 !important;border-top-color: #eeeeee !important;border-top-style: solid !important;}&#8221; bg_overlay=&#8221;&#8221;][vc_column][vc_column_text]<\/p>\n<h3 style=\"text-align: center;\"><span style=\"color: #8f3d61; font-weight: 400;\">Some of the Best International Trainings in Information Security and Privacy<\/span><\/h3>\n<p>[\/vc_column_text][elise_carousel carousel_arrows_pos=&#8221;sides&#8221; navigation=&#8221;none&#8221; autoplay=&#8221;0&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][elise_iconbox icon=&#8221;upload_image&#8221; iconbox_title=&#8221;CISM&#8221; iconbox_readmore_text=&#8221;&#8221; iconbox_border=&#8221;border&#8221; iconbox_align=&#8221;center&#8221; ib_icon_style=&#8221;bg-circle&#8221; ib_icon_shadow=&#8221;icon-drop-shadow&#8221; iconbox_readmore_link=&#8221;|||&#8221; ib_icon_color=&#8221;#f9a13f&#8221; icon_img=&#8221;2085&#8243;]<\/p>\n<p class=\"p1\">ISACA Certified Information Security Manager<\/p>\n<p>[\/elise_iconbox][elise_iconbox icon=&#8221;upload_image&#8221; iconbox_title=&#8221;CISSP&#8221; iconbox_readmore_text=&#8221;&#8221; iconbox_border=&#8221;border&#8221; iconbox_align=&#8221;center&#8221; iconbox_readmore_link=&#8221;|||&#8221; icon_img=&#8221;2084&#8243;]<\/p>\n<p class=\"p1\">ISC\u00b2 Certified Information Systems Security Professional<\/p>\n<p>[\/elise_iconbox][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][elise_iconbox icon=&#8221;upload_image&#8221; iconbox_title=&#8221;CISA&#8221; iconbox_readmore_text=&#8221;&#8221; iconbox_border=&#8221;border&#8221; iconbox_align=&#8221;center&#8221; ib_icon_style=&#8221;bg-circle&#8221; ib_icon_shadow=&#8221;icon-drop-shadow&#8221; iconbox_readmore_link=&#8221;|||&#8221; ib_icon_color=&#8221;#ef4135&#8243; icon_img=&#8221;2086&#8243;]<\/p>\n<p class=\"p1\">ISACA Certified Information Systems Auditor<\/p>\n<p>[\/elise_iconbox][elise_iconbox icon=&#8221;upload_image&#8221; iconbox_title=&#8221;ISO\/IEC 27001&#8243; iconbox_readmore_text=&#8221;&#8221; iconbox_border=&#8221;border&#8221; iconbox_align=&#8221;center&#8221; iconbox_readmore_link=&#8221;|||&#8221; ib_icon_color=&#8221;#2c77c8&#8243; icon_img=&#8221;2526&#8243;]<\/p>\n<p class=\"p1\">ISO\/IEC 27001 Lead Implementer<\/p>\n<p>[\/elise_iconbox][\/vc_column_inner][\/vc_row_inner][\/elise_carousel][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1575199513444{background-color: #f8f8f8 !important;}&#8221;][vc_column][vc_empty_space height=&#8221;50px&#8221;][vc_cta_button2 title=&#8221;click here&#8221; size=&#8221;btn-lg&#8221; link=&#8221;url:https%3A%2F%2Fprofplansolutions.com%2F%3Fpage_id%3D1178%26lang%3Den|||&#8221; accent_color=&#8221;#ffffff&#8221;]<\/p>\n<h4>For details contact us<\/h4>\n<p>[\/vc_cta_button2][vc_empty_space height=&#8221;50px&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row background_position=&#8221;right top&#8221; css=&#8221;.vc_custom_1573771507531{margin-bottom: 0px !important;padding-top: 80px !important;background-image: url(https:\/\/profplansolutions.com\/wp-content\/uploads\/2019\/11\/lines-1.png?id=2300) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221; bg_overlay=&#8221;&#8221;][vc_column][vc_column_text] What is the Information Security and [&#8230;]<\/p>\n<p><a class=\"more-link\" href=\"https:\/\/profplansolutions.com\/?page_id=1592&#038;lang=en\">Continue Reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-full-width.php","meta":{"footnotes":""},"class_list":["post-1592","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/profplansolutions.com\/index.php?rest_route=\/wp\/v2\/pages\/1592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/profplansolutions.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/profplansolutions.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/profplansolutions.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/profplansolutions.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1592"}],"version-history":[{"count":20,"href":"https:\/\/profplansolutions.com\/index.php?rest_route=\/wp\/v2\/pages\/1592\/revisions"}],"predecessor-version":[{"id":2529,"href":"https:\/\/profplansolutions.com\/index.php?rest_route=\/wp\/v2\/pages\/1592\/revisions\/2529"}],"wp:attachment":[{"href":"https:\/\/profplansolutions.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}