Eccentrix - Trainings catalog - Compliance and governance - ISO/IEC 27002 Foundation (PC3874)

ISO/IEC 27002 Foundation (PC3874)

The ISO/IEC 27002 Foundation training enables participants to learn the fundamental concepts related to the implementation and management of information security controls based on ISO/IEC 27002 guidelines. Through this comprehensive training, participants will be able to identify the information security controls of ISO/IEC 27002 that are categorized into four main themes: organizational, people, physical, and technological. The training also provides information on how ISO/IEC 27002 relates to other standards, such as ISO/IEC 27001 and ISO/IEC 27003.

The training is followed by a certification exam. Upon successful completion, you can apply for the “PECB Certificate Holder in ISO/IEC 27002 Foundation” certificate. This certificate demonstrates that you possess general knowledge of ISO/IEC 27002 information security controls.

Related trainings

Exclusives

  • Certification exam participation: Voucher included with a retake
  • Video recording: 365 days of access to your course for viewing
  • Class material: Delivered in digital format for everyone, downloadable, accessible during and after the training
  • Proof of attendance: Digital badge and completion certificate available for all participants
  • Fast and guaranteed schedule: Maximum wait of 4 to 6 weeks after participant registrations, guaranteed date

Applicable solutions

Discover all the exclusive solutions available for this course to maximize your learning, savings, and benefits. Take advantage of unique offers reserved for our participants.

Private class

Reserve this training exclusively for your organization with pricing adapted to the number of participants. Our pricing for private classes varies according to the size of your group, with a guaranteed minimum threshold to maintain pedagogical quality.

  • Volume-based pricing discount according to the number of participants
  • Training delivered in an environment dedicated to your team
  • Scheduling flexibility according to your availability
  • Enhanced interaction among colleagues from the same organization
  • Same exclusive benefits as our public training sessions

How to get a proposal?

Use the request form by specifying the number of participants. We will quickly send you a complete proposal with the exact pricing, available dates, and details of all the benefits included in your private training.

ISO/IEC 27002 Foundation PC-3874 Training Plan: Detailed Modules

This foundational module introduces participants to the essential concepts of ISO/IEC 27002 and organizational security controls. Participants will explore the structure and organization of the standard, the relationship with ISO/IEC 27001, and the approach by control categories. The module covers organizational security controls including information security policies, information security organization, human resource security, and asset management. Special attention is given to security roles and responsibilities, personnel awareness, and establishing a security governance framework. Participants will develop an in-depth understanding of organizational controls, their practical implementation, and integration into existing business processes. The module also addresses the selection criteria for appropriate controls, risk-based control implementation, and the importance of organizational culture in security effectiveness.

This practical module covers security controls specific to people, physical environment, and technologies. Participants will explore physical and environmental security controls, operations and communications management, access control, cryptography, and information systems security. The module includes security in development and support, supplier relationships, information security incident management, and business continuity aspects. Participants will learn practical control application, appropriate selection criteria, and effectiveness assessment of measures. The module covers implementation challenges, control testing methods, and integration with organizational processes. The day concludes with intensive certification exam preparation featuring practical exercises, case studies, and exam strategies to maximize success chances for the PECB ISO/IEC 27002 Foundation certification. Emphasis is placed on understanding control objectives, implementation guidance, and real-world application scenarios.

Recommended prerequisite knowledge

  • Basic Information Security Knowledge: Understanding of fundamental cybersecurity concepts, security controls, and protection measures
  • Minimum Professional Experience: Minimum 6 months of experience in IT, security, system administration, or related technical functions
  • Familiarity with ISO/IEC 27001: Basic knowledge of information security management systems recommended but not mandatory
  • Basic Technical Skills: Understanding of IT infrastructures, networks, operating systems, and enterprise technology environments

Credentials and certification

Exam features

  • Cost: $0 (included in your training)
  • Questions Format: Multiple choice 
  • Duration: 1 hour
  • Number of Questions: 40
  • Passing Score: 26/40

Exam topics

  • Domain 1: Fundamental principles and concepts of information security, cybersecurity, and privacy
  • Domain 2: Information security controls based on ISO/IEC 27002

All details >>

ISO/IEC 27002 Foundation

The ISO/IEC 27002 Foundation training is designed for professionals seeking to understand the fundamentals of information security controls according to ISO/IEC 27002. This course introduces essential concepts of selecting, implementing, and managing security controls to protect organizational information. The training covers control categories, implementation best practices, and integration with security management systems.

Participants will benefit from structured learning and concrete examples, helping them prepare effectively for the PECB certification exam. This certification validates your understanding of fundamental security controls and your ability to contribute to their organizational implementation.

Why choose ISO/IEC 27002 Foundation training?

The ISO/IEC 27002 Foundation certification is essential for understanding practical security controls that protect organizational information. It demonstrates your understanding of security best practices and your ability to contribute to implementing effective protection measures. With constantly evolving threats, companies seek professionals who master standard security controls.

This training equips you with practical knowledge necessary to excel in roles such as security controls analyst, security implementation specialist, or information protection consultant. It provides a solid foundation for your progression to more specialized certifications.

Skills developed during training

  1. Security Controls Understanding
    Master the 93 controls of ISO/IEC 27002, their classification, and application in different organizational contexts.

  2. Controls Selection and Implementation
    Learn to select appropriate controls according to organizational needs and plan their effective implementation.

  3. Security Measures Management
    Develop understanding of operational management of security controls and their continuous maintenance.

  4. Controls Effectiveness Assessment
    Understand methods for assessing control effectiveness and continuous improvement techniques.

  5. ISMS Integration
    Acquire basics of integrating ISO/IEC 27002 controls into security management systems according to ISO/IEC 27001.

  6. Documentation and Reporting
    Learn best practices for documenting controls and reporting their implementation status.

Interactive training by certified experts

The ISO/IEC 27002 Foundation training is delivered by certified PECB instructors with extensive experience in security controls implementation. Participants will benefit from practical case studies and concrete implementation examples across different sectors.

Who is this training for?

This training is ideal for:

  • IT professionals responsible for implementing security controls
  • Security analysts seeking to deepen their practical knowledge
  • Consultants wanting to master industry standard controls
  • Individuals preparing for more advanced security certifications

Master security controls with ISO/IEC 27002 Foundation

The ISO/IEC 27002 Foundation training equips you with practical knowledge necessary to understand and contribute to information security controls implementation. Register today to obtain an internationally recognized PECB certification.

Exam Success Strategies for ISO 27002 Foundation

Mastering the ISO/IEC 27002 Foundation certification requires understanding the 93 information security controls organized across four key themes: organizational, people, physical, and technological. By developing knowledge of control objectives, implementation guidance, and practical application scenarios, you will build the confidence needed to excel in this foundational PECB certification.

ISO 27002 Foundation Exam Statistics & Success Rates

  • Average pass rate: 70-80% on first attempt
  • Most common score range: 30-35 correct answers for passing candidates (passing score: 28 out of 40, 70%)
  • Average study time: 2-4 weeks for professionals with basic information security knowledge
  • Retake rate: 20-30% of candidates require a second attempt
  • Top failure areas: Distinguishing between the four control themes (organizational, people, physical, technological), understanding control selection criteria and risk-based implementation, memorizing the 93 controls and their specific objectives, differentiating between ISO/IEC 27001 requirements and ISO/IEC 27002 guidance, applying controls to practical organizational scenarios

Study Method Comparison

Study Approach Duration Pass rate Best For

Self-Study Only

3-5 weeks

50-60%

Experienced security professionals

Documentation + Practice

2-4 weeks

70-80%

Methodical learners

Training + Practice Tests

2-3 weeks

75-85%

Comprehensive preparation

Practice Tests Only

2 weeks

60-70%

Not recommended

Strategic Study Approach

  • Create a 2- to 4-week study schedule – ISO/IEC 27002 Foundation covers control themes, control objectives, implementation guidance, and integration with ISO/IEC 27001
  • Follow the 40-40-20 rule – 40% understanding control categories and objectives, 40% practicing sample questions and scenario application, 20% reviewing ISO/IEC 27001 relationship and control selection principles
  • Focus on understanding control objectives and practical application, not just memorizing control numbers – the exam tests your ability to recognize appropriate controls for given scenarios
  • Study in 60- to 90-minute blocks with 10-minute breaks to maintain focus and retention
  • Think in terms of the four control themes – always categorize controls as Organizational (policies, governance, asset management), People (awareness, training, responsibilities), Physical (facility security, equipment protection), or Technological (access control, cryptography, system security)
  • Master the control structure – understand that each control has a Control Type (preventive, detective, corrective), Control Objective (what it aims to achieve), Implementation Guidance (how to apply it), and Other Information (additional considerations)
  • Practice recognizing controls from scenario descriptions – exam questions often present security situations and ask you to identify the most appropriate control or control category
  • Understand the relationship between ISO/IEC 27001 and ISO/IEC 27002 – know that 27001 defines ISMS requirements while 27002 provides detailed control implementation guidance
  • Know control selection principles – understand risk-based selection, organizational context considerations, legal and regulatory requirements, and cost-benefit analysis
  • Memorize key control numbers and themes – while understanding is most important, familiarity with control numbering (e.g., 5.X for Organizational, 6.X for People, 7.X for Physical, 8.X for Technological) helps with exam navigation

Common Exam Pitfalls to Avoid

  • Don’t confuse ISO/IEC 27001 and ISO/IEC 27002 – 27001 is the certifiable ISMS standard with requirements; 27002 is the guidance document for implementing controls
  • Control themes are NOT interchangeable – organizational controls address governance and policies; people controls address human factors; physical controls address facility security; technological controls address IT systems
  • Not all 93 controls apply to every organization – control selection must be risk-based and context-appropriate; the exam tests your understanding of when controls are applicable
  • Control objectives are NOT the same as control implementation – understand what each control aims to achieve (objective) versus how to implement it (guidance)
  • Don’t overlook the “Other Information” sections – these provide important context, related controls, and additional considerations that may appear in exam questions
  • Preventive, detective, and corrective controls serve different purposes – preventive controls stop incidents before they occur; detective controls identify incidents; corrective controls remediate after incidents
  • Asset management is NOT just inventory – it includes classification, handling, labeling, and lifecycle management of information assets
  • Access control is NOT just passwords – it encompasses identity management, authentication, authorization, privileged access management, and access reviews
  • Physical security is NOT limited to locks and alarms – it includes environmental controls, equipment security, secure disposal, and clear desk/clear screen policies
  • Cryptography is NOT just encryption – it includes key management, digital signatures, non-repudiation, and secure communication protocols
  • Your answers must reflect ISO/IEC 27002:2022 guidance – the standard was significantly restructured in 2022; outdated knowledge of previous versions will lead to incorrect answers

Topic Weight Distribution

Exam Domain Weight Focus Areas Priority

Organizational Controls (5.X)

30%

Information security policies, organization of information security, human resource security, asset management, access control policies, supplier relationships

Critical

People Controls (6.X)

20%

Screening, terms and conditions of employment, information security awareness and training, disciplinary process, responsibilities after termination

High

Physical Controls (7.X)

20%

Physical security perimeters, physical entry, securing offices and facilities, protecting against threats, equipment security, secure disposal, clear desk and screen, equipment siting and protection

High

Technological Controls (8.X)

30%

User endpoint devices, privileged access rights, information access restriction, access to source code, secure authentication, capacity management, malware protection, logging and monitoring, backup, cryptography, secure development, security testing, change management

Critical

Exam Day Time Management

  • ISO/IEC 27002 Foundation exam format – 40 multiple-choice questions, 60 minutes (1 hour)
  • Allocate approximately 1.5 minutes per question – read carefully, eliminate wrong answers, select the best option
  • All questions are multiple-choice with one correct answer – no essay questions or scenario-based written responses
  • The exam is CLOSED BOOK – no reference materials, notes, or access to the ISO/IEC 27002 standard during the exam
  • You can flag questions and return to them – use this feature to skip difficult questions and maximize your score on questions you know
  • Reserve 5-10 minutes at the end to review flagged questions and verify your answers
  • Manage your pace strategically – aim to complete 30 questions in the first 40 minutes, leaving 20 minutes for remaining questions and review
  • Don’t spend more than 2-3 minutes on a single question – if you’re unsure, make your best educated guess, flag it, and move on
  • Read questions carefully for keywords – words like “BEST,” “MOST appropriate,” “PRIMARY purpose,” and “FIRST step” indicate you need to select the most correct answer among multiple potentially correct options
  • Eliminate obviously wrong answers first – narrow down to 2-3 options, then select based on ISO/IEC 27002 guidance and control objectives

Managing Exam Stress & Performance

  • Get 7-8 hours of quality sleep the night before – ISO/IEC 27002 Foundation requires clear thinking and accurate recall for 60 minutes
  • Set up your online proctoring environment 15-20 minutes early – test your webcam, microphone, internet connection, and have your ID ready
  • Use deep breathing techniques if you feel anxious – calm, focused thinking improves recall and decision-making
  • Trust your training and study preparation – your knowledge of control themes, objectives, and implementation guidance is your foundation
  • Remember that the passing score is 70% (28 out of 40) – you don’t need perfection, just solid understanding of core concepts
  • Stay focused on control objectives and themes – always think about what each control aims to achieve and which theme it belongs to
  • Don’t second-guess yourself excessively – your first instinct is often correct if you’ve studied thoroughly
  • Take a moment to center yourself if you encounter a difficult question – re-read it carefully, think about control objectives, and apply your knowledge systematically

Technical Preparation Tips

  • Master the four control themes and their scope – understand Organizational Controls (37 controls: 5.1-5.37 covering policies, governance, asset management, supplier relationships, legal compliance), People Controls (8 controls: 6.1-6.8 covering screening, awareness, training, responsibilities), Physical Controls (14 controls: 7.1-7.14 covering facility security, equipment protection, environmental controls), Technological Controls (34 controls: 8.1-8.34 covering access control, cryptography, system security, development security, incident management)
  • Know key organizational controls – understand Information security policies (5.1: establish, approve, communicate security policies), Information security roles and responsibilities (5.2: define and assign security responsibilities), Segregation of duties (5.3: separate conflicting duties to reduce fraud/error risk), Management responsibilities (5.4: require management to apply security per policies), Contact with authorities (5.5: maintain relationships with law enforcement, regulators), Contact with special interest groups (5.6: participate in security forums), Threat intelligence (5.7: collect and analyze threat information), Information security in project management (5.8: integrate security into projects), Inventory of information and assets (5.9: identify and document assets), Acceptable use of information and assets (5.10: establish rules for asset use), Return of assets (5.11: ensure return upon termination), Classification of information (5.12: classify based on sensitivity), Labelling of information (5.13: label according to classification), Information transfer (5.14: secure transfer procedures), Access control (5.15: establish access control policies), Identity management (5.16: manage user identities), Authentication information (5.17: manage passwords, tokens, biometrics), Access rights (5.18: provision, review, revoke access), Supplier relationships (5.19-5.23: address security in supplier agreements, monitor performance, manage changes) • Understand people controls – know Screening (6.1: background checks before employment), Terms and conditions of employment (6.2: include security responsibilities in contracts), Information security awareness, education and training (6.3: provide ongoing security training), Disciplinary process (6.4: address security violations), Responsibilities after termination or change (6.5: ensure continued security after role changes), Confidentiality or non-disclosure agreements (6.6: protect sensitive information), Remote working (6.7: secure remote work arrangements), Information security event reporting (6.8: establish reporting mechanisms)
  • Master physical controls – understand Physical security perimeters (7.1: define and protect facility boundaries), Physical entry (7.2: control access to secure areas), Securing offices, rooms and facilities (7.3: protect work areas), Physical security monitoring (7.4: monitor premises for unauthorized access), Protecting against physical and environmental threats (7.5: safeguard against fire, flood, earthquake, etc.), Working in secure areas (7.6: establish procedures for secure zones), Clear desk and clear screen (7.7: minimize information exposure), Equipment siting and protection (7.8: locate and protect equipment appropriately), Security of assets off-premises (7.9: protect assets outside organizational control), Storage media (7.10: manage media throughout lifecycle), Supporting utilities (7.11: protect power, cooling, telecommunications), Cabling security (7.12: protect network and power cables), Equipment maintenance (7.13: maintain equipment to ensure availability and integrity), Secure disposal or re-use of equipment (7.14: remove sensitive data before disposal)
  • Know technological controls – understand User endpoint devices (8.1: secure laptops, mobile devices), Privileged access rights (8.2: control administrative access), Information access restriction (8.3: limit access based on need-to-know), Access to source code (8.4: protect application source code), Secure authentication (8.5: implement strong authentication mechanisms), Capacity management (8.6: monitor and forecast resource requirements), Protection against malware (8.7: implement anti-malware controls), Management of technical vulnerabilities (8.8: identify and remediate vulnerabilities), Configuration management (8.9: document and control system configurations), Information deletion (8.10: securely delete information when no longer needed), Data masking (8.11: mask sensitive data in non-production environments), Data leakage prevention (8.12: prevent unauthorized data exfiltration), Information backup (8.13: maintain backups and test restoration), Redundancy of information processing facilities (8.14: ensure availability through redundancy), Logging (8.15: record security-relevant events), Monitoring activities (8.16: detect anomalous behavior), Clock synchronization (8.17: synchronize system clocks for accurate logging), Use of privileged utility programs (8.18: control system utilities), Installation of software on operational systems (8.19: control software installation), Networks security (8.20: protect network infrastructure), Security of network services (8.21: secure network services), Segregation of networks (8.22: separate networks based on risk), Web filtering (8.23: control web access), Use of cryptography (8.24: protect confidentiality, integrity, authenticity), Secure development life cycle (8.25: integrate security into SDLC), Application security requirements (8.26: define security requirements for applications), Secure system architecture and engineering principles (8.27: apply security design principles), Secure coding (8.28: follow secure coding practices), Security testing in development and acceptance (8.29: test security throughout SDLC), Outsourced development (8.30: manage security in outsourced development), Separation of development, test and production environments (8.31: segregate environments), Change management (8.32: control changes to production systems), Test information (8.33: protect test data), Protection of information systems during audit testing (8.34: minimize audit impact on production systems)
  • Understand control types – know Preventive controls (stop security incidents before they occur; examples: access control, encryption, firewalls, security awareness training), Detective controls (identify security incidents when they occur; examples: logging, monitoring, intrusion detection, audit reviews), Corrective controls (remediate security incidents after they occur; examples: incident response, backup restoration, patch management, corrective actions)
  • Master control selection principles – understand Risk-based selection (select controls based on risk assessment results; prioritize high-risk areas), Legal and regulatory requirements (implement controls mandated by laws, regulations, contracts), Organizational context (consider size, complexity, industry, culture, resources), Cost-benefit analysis (balance security benefits against implementation and operational costs), Control effectiveness (select controls proven to mitigate identified risks), Integration with existing processes (leverage existing controls and processes where possible) • Know the relationship between ISO/IEC 27001 and ISO/IEC 27002 – understand that ISO/IEC 27001 Annex A lists 93 controls that organizations select based on risk assessment, ISO/IEC 27002 provides detailed implementation guidance for each Annex A control, ISO/IEC 27001 is certifiable (organizations can be certified compliant), ISO/IEC 27002 is guidance only (not certifiable), Statement of Applicability (SoA) documents which controls are selected and justification for inclusion or exclusion
  • Understand control implementation phases – know Planning (identify applicable controls, assess current state, prioritize based on risk and resources), Implementation (deploy controls according to guidance, integrate into processes, configure technical controls), Operation (maintain controls, monitor effectiveness, provide ongoing training), Review (assess control effectiveness, identify improvements, update based on changes in risk or context)

Final Week Preparation

  • Review 3-5 practice exams (40 questions, 60 minutes each) to develop familiarity with question formats, time pressure, and control recognition
  • Review the official ISO/IEC 27002:2022 structure and the PECB ISO/IEC 27002 Foundation learning objectives one final time
  • Focus on your weakest control themes – if you struggle with technological controls or physical controls, dedicate extra time to memorizing their objectives and implementation guidance
  • Practice categorizing controls by theme – for each practice question, identify whether the control is Organizational, People, Physical, or Technological
  • Create quick reference summaries – one-page overviews of each control theme with key controls, control numbers, and primary objectives
  • Review control selection scenarios – practice identifying which controls are most appropriate for given organizational contexts, risk scenarios, and compliance requirements
  • Create a comparison table for related concepts – ISO/IEC 27001 vs. ISO/IEC 27002, preventive vs. detective vs. corrective controls, access control vs. identity management, encryption vs. key management, physical perimeter vs. physical entry
  • Memorize key control numbers – focus on the most frequently tested controls (5.1 policies, 5.15 access control, 6.3 awareness training, 7.1 physical perimeters, 7.7 clear desk/screen, 8.1 endpoint devices, 8.5 authentication, 8.7 malware protection, 8.13 backup, 8.24 cryptography)
  • Avoid learning completely new concepts – focus on reinforcing your understanding of the 93 controls, their themes, objectives, and practical application
  • Prepare your exam environment – quiet space, stable internet, webcam/microphone tested, ID ready, no reference materials (closed book exam)
  • Review exam-passing strategies – read questions carefully, identify keywords (BEST, MOST, PRIMARY), eliminate obviously wrong answers, select based on control objectives and ISO/IEC 27002 guidance, flag difficult questions and return later

Mental Preparation Strategies

  • Visualize success scenarios – imagine yourself calmly reading questions, recognizing control themes, recalling control objectives, and selecting correct answers confidently
  • Remember your training and study preparation – you have learned the 93 controls, their themes, objectives, and implementation guidance; trust your knowledge
  • Stay positive when facing difficult questions – ISO/IEC 27002 Foundation tests foundational understanding; challenging questions are opportunities to apply your knowledge systematically
  • Remember that ISO/IEC 27002 Foundation is an entry-level certification – you are demonstrating foundational understanding of security controls, not expert-level implementation experience 
  • Approach the exam as a validation of your control knowledge and your ability to recognize appropriate security measures for different scenarios
  • Think “information security controls practitioner” – always consider control objectives, control themes, risk-based selection, and practical organizational application

How to Schedule Your ISO 27002 Foundation Exam

  • Exam registration and scheduling is done through PECB at https://www.pecb.com
  • The exam voucher IS included in your Eccentrix training – you will receive your voucher code after completing the course
  • One free retake IS included – if you do not pass on your first attempt, you can retake the exam once at no additional cost
  • Scheduling process: Create a PECB account (or log in with your existing account), enter your exam voucher code (provided by Eccentrix), select “Online Proctored” exam delivery, choose your preferred date and time (24/7 availability), complete the technical requirements check (webcam, microphone, stable internet)
  • Scheduling timeline: Book at least 48-72 hours in advance for best time slot availability (same-day scheduling may be available)
  • Rescheduling policy: Free rescheduling up to 24 hours before your scheduled exam time; late rescheduling or no-show may incur fees
  • ID requirements: One government-issued photo ID required (passport, driver’s license, national ID card) with name matching your PECB registration
  • Closed book exam: No reference materials, notes, or access to ISO/IEC 27002 standard allowed during the exam
  • Online proctoring requirements: Quiet, private room with no interruptions, clear desk (only ID and water allowed), webcam and microphone enabled throughout exam, stable internet connection (minimum 1 Mbps upload/download), no mobile devices or secondary monitors
  • Technical check: Complete PECB’s system check before your exam to ensure your computer meets requirements
  • Exam delivery: Fully online with live remote proctoring via webcam; results provided immediately after exam completion (pass/fail displayed on screen)

Success Mindset: Approach ISO/IEC 27002 Foundation as a validation of your understanding of information security controls and their practical application, not as a test of memorized facts. Your knowledge of control themes, control objectives, implementation guidance, and risk-based selection principles are your greatest assets. Think like an information security controls practitioner who understands what each control aims to achieve, when it should be applied, and how it integrates into organizational security management systems.

Frequently Asked Questions - ISO/IEC 27002 Foundation Training (FAQ)

ISO/IEC 27001 defines requirements for establishing an ISMS, while ISO/IEC 27002 provides detailed security controls to implement these requirements. Both standards are complementary and this training helps understand this synergy.

No, controls are selected according to risk assessment and organizational context. This training teaches how to make this appropriate selection and justify the choices made.

This Foundation certification provides a solid foundation, but management roles generally require more advanced certifications like Manager or Lead Manager, as well as significant practical experience.

Yes, the training covers controls applicable to cloud environments, including shared security aspects, data governance, and controls specific to cloud services.

This training focuses specifically on ISO/IEC 27002 controls, offering detailed technical expertise, while CISSP and CISM cover a broader spectrum of security with a more managerial approach.

Yes, the content is regularly updated to reflect technological developments, new threats, and emerging best practices in security controls implementation.

Request form for a private class training

Dear Customer,

We thank you for your interest in our services. Here is the important information that will be provided to us upon completion of this form:

Training name: ISO/IEC 27002 Foundation (PC3874)

Language: English

Duration: 2 days / 14 hours

Number of participants from your organization *

Minimum number of participants: 6

Organization name *
Your first and last name *
Telephone number *
Professional email *
Please provide a work or professional email address.
How did you hear about us? *
Comments or Remarks
Promotional code
The General Conditions are accessible on this page.

Our website uses cookies to personalize your browsing experience. By clicking ‘I accept,’ you consent to the use of cookies.