Implementing Information Security Management Systems III

Book a Meeting Login Competency Implementing Information Security Management Systems IV This competency covers ISO/IEC 27001 Annex A Controls IV (A5.17 – A5.33). Learn authentication, access rights, supplier security, identity management, cloud security, and business continuity. 5 Trainers About Course Overview: This comprehensive course introduces participants to the implementation of key ISMS controls. It covers best practices for authentication management, secure supplier relationships, cloud security strategies, and business continuity planning to enhance ISMS compliance and cybersecurity measures. What You’ll Learn: Fundamentals of implementing Annex A controls under ISO/IEC 27001 Identity and access management best practices Secure supplier relationship management and auditing Cloud security and business continuity frameworks Compliance assurance and continuous improvement for ISMS Who Should Take This Course? This course is perfect for: IT security professionals and compliance officers ISMS implementers and auditors Business continuity and risk management specialists Information security consultants and governance specialists IT managers securing supplier relationships and cloud services What You’ll Get: A certification of completion Practical knowledge of ISMS implementation and compliance Access to a global community of security professionals Hands-on experience with access control, supplier security, and cloud security Access to course materials in multiple languages Module 1 Implementing ISO/IEC 27001, Annex A Controls 5.17 to 5.19 Implementing Control 5.17 (14 mins) Implementing Control 5.18 (14 mins) Implementing Control 5.19 (Part I) (13 mins) Implementing Control 5.19 (Part II) (13 mins) Take the Practice Quiz (8 Questions) Module 2 Implementing ISO/IEC 27001, Annex A Controls 5.16 and 5.20 to 5.22 Access Control Policies and Identity Management Secure Authentication and Multi-Factor Authentication (MFA) Supplier Security and Third-Party Risk Management Compliance with ISO/IEC 27001 Supplier Controls Module 3 Implementing ISO/IEC 27001, Annex A Controls 5.23 to 5.26 Cloud Security and Secure Data Storage Securing Remote Work Environments Business Continuity and ISMS Integration Security in Supply Chain Operations Module 4 Implementing ISO/IEC 27001, Annex A Controls 5.29 to 5.33 Information Security in Supplier Contracts Managing Information Security in Cloud Environments Continuous Monitoring and Security Incident Management Ensuring Compliance and Regular ISMS Audits Specialization · 4 modules Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags ISO/IEC 27001 Information Security Data Protection Information Security Management Annex A Controls Information Security Implementation About the Trainer Eliza Popa Security Advisor, Managing Director, and Auditor Eliza Popa is a distinguished member of ISC2, ISACA, PECB, and CSA, bringing extensive knowledge to her role as a trainer. As the Founder and Managing Director of Cyberstrat IT Consulting in Abu Dhabi since 2019, Eliza has shown exceptional leadership in information security. She is an ISC2 Official Training Instructor for CISSP and a PECB Certified Trainer for ISO/IEC 27001, Lead Cybersecurity Manager, and CISO. As a CSA Authorized Trainer for CCSK, she excels in cloud security. Eliza’s consultancy and auditing expertise is marked by her self-motivated and results-driven approach, establishing the GRC practice across two continents. With over a decade of experience in risk assessments, ISMS gap analysis, and internal audits, her proficiency is well-established. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.
Implementing Information Security Management Systems I

Book a Meeting Login Competency Implementing Information Security Management Systems I This competency provides a comprehensive understanding of ISO/IEC 27001, focusing on Annex A controls to establish an effective Information Security Management System (ISMS). Participants will learn to develop security policies, define roles, ensure threat intelligence, integrate security into projects, and implement key security controls. 5 Trainers About Course Overview: This comprehensive course guides participants in understanding and applying ISO/IEC 27001 controls to implement an ISMS. The course includes real-world case studies and practical examples for applying ISO/IEC 27001’s Annex A controls in various organizational settings. What You’ll Learn: Fundamentals of ISO/IEC 27001 and its Annex A controls How to implement ISO/IEC 27001 controls 5.1 to 5.15 and 8.1 Developing information security policies and procedures Defining roles and responsibilities in an ISMS Ensuring ongoing monitoring and compliance with security controls Who Should Take This Course? This course is perfect for: Cybersecurity professionals and IT security managers Compliance officers and auditors Risk management specialists Security consultants and business leaders What You’ll Get: A certification of completion Practical knowledge of ISO/IEC 27001 and its security controls Access to course materials in multiple languages Hands-on experience with the implementation of Annex A controls Module 1 Implementing ISO/IEC 27001, Annex A Controls 5.1 to 5.4 Implementing Control 5.1: 15 mins Implementing Control 5.2: 14 mins Implementing Control 5.3: 15 mins Implementing Control 5.4: 13 mins Take the Practice Quiz Module 2 Implementing ISO/IEC 27001, Annex A Controls 5.5 to 5.8 Implementing Controls 5.5 and 5.6: 15 mins Implementing Control 5.7 (Part I): 14 mins Implementing Control 5.7 (Part II): 15 mins Implementing Control 5.8: 17 mins Take the Practice Quiz Module 3 Implementing ISO/IEC 27001, Annex A Controls 5.9 to 5.12 Implementing Control 5.9: 15 mins Implementing Control 5.10: 15 mins Implementing Control 5.11: 14 mins Implementing Control 5.12: 16 mins Take the Practice Quiz Module 4 Implementing ISO/IEC 27001, Annex A Controls 5.13 to 5.15 and 8.1 Implementing Control 5.13: 13 mins Implementing Control 5.14: 15 mins Implementing Control 5.15: 15 mins Implementing Control 8.1: 14 mins Take the Practice Quiz Specialization · 4 modules Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags ISO/IEC 27001 Information Security Data Protection Information Security Management Annex A Controls Auditing About the Trainer Graeme Parker Cybersecurity and Information Security Expert Meet Graeme Parker, a Security, Technology, Risk, and Compliance professional with vast experience in high-profile private and public sector roles. Graeme excels in implementing information risk management solutions and developing security architectures and programs. He has led projects for standards like ISO/IEC 27001, PCI-DSS, and HMG Accreditation. Graeme is also a certified trainer with PECB, delivering global courses on ISO/IEC 27001, ISO 22301, ISO/IEC 42001, CISSP, CISM, and CISA exam prep. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.
GDPR Compliance: A Practical Approach to Data Protection

Book a Meeting Login Competency GDPR Compliance: A Practical Approach to Data Protection This competency delves into the principles of personal data processing and explores the rights of data subjects in detail. Learn about the crucial role of personal data processors in compliance and protecting privacy. 5 Trainers About Course Overview: This course explores the European General Data Protection Regulation (GDPR), offering participants a thorough understanding of personal data processing, data subject rights, and the roles of data controllers and processors. The course emphasizes the importance of GDPR compliance, guiding participants through legal frameworks, the necessary documentation, and the rights and obligations of data handlers. What You’ll Learn: Personal data processing principles under GDPR The rights of data subjects and conditions for consent The role of data controllers and processors in GDPR compliance Automated decision-making and the right to object Managing records of processing activities and data protection officers Who Should Take This Course? This course is perfect for: Data protection officers (DPOs) and privacy professionals Compliance officers and auditors IT and security professionals Legal professionals specializing in data privacy Business leaders and managers responsible for GDPR compliance What You’ll Get: Certification of completion Comprehensive knowledge of GDPR and personal data protection Practical strategies for implementing GDPR in organizations Access to global privacy and data protection networks Hands-on experience with data subject rights and processing activities Module 1 Personal Data Processing Principles Introduction to Data Protection (16 mins) General Provisions of the GDPR (15 mins) Personal Data Processing (Part I) (13 mins) Personal Data Processing (Part II) (14 mins) Take the Practice Quiz Module 2 Data Subject Rights (Part I) Conditions for Consent (15 mins) Consent Considerations and Sensitivities (13 mins) Data Subject Rights (14 mins) Right to Access (16 mins) Take the Practice Quiz Module 3 Data Subject Rights (Part II) Restriction, Notification Obligations, and Right to Object (13 mins) Right to Object (15 mins) Automated Decision-making (14 mins) Data Controllers (15 mins) Take the Practice Quiz Module 4 Personal Data Processor Processing Activity Records (15 mins) Obligations of the Processor (13 mins) Data Protection Officer (16 mins) CISO vs. DPO (14 mins) Take the Practice Quiz Specialization · 4 modules Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags GDPR Data Protection Data Privacy Privacy Laws Data Subject Rights Personal Data Processing Consent Management Information Security Information Security Management ISO/IEC 27001 About the Trainer Peter Geelen Cybersecurity Specialist and Certified Ethical Hacker Peter Geelen is a professional with over 25 years in Information Security and Cybersecurity. As Executive Director at CyberMinute and owner at Quest for Security, Peter focuses on ISO/IEC 27001 and other ISO certifications. Peter has developed a strong focus on ISO/IEC 27001 and other ISO certification mechanisms in recent years. Peter is a certified and accredited Lead Auditor for ISMS, QMS, BCMS, and supply chain security. As a certified trainer, Peter shares his expertise through teaching, mentoring, workshops, and speaking engagements. Passionate about cybersecurity legislation and certification, Peter drives progress in data protection for products, services, and processes. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.
Privacy Information Management based on ISO/IEC 27701

Book a Meeting Login Competency Privacy Information Management based on ISO/IEC 27701 This competency equips participants with privacy information management practices, covering impact assessments, risk management, and security in collaborations. 5 Trainers About Course Overview: This comprehensive course covers key privacy information management practices based on ISO/IEC 27701. Participants will gain insights into the scope of a Privacy Information Management System (PIMS), conducting Privacy Impact Assessments (PIAs), managing information security in supplier relationships, and designing secure information architectures. The course emphasizes aligning privacy management practices with regulatory requirements and international standards. What You’ll Learn: Defining the scope of a Privacy Information Management System (PIMS) Conducting Privacy Impact Assessments (PIAs) Managing privacy risks through effective solutions Understanding information security requirements in supply chain relationships Designing and implementing security architecture to protect personally identifiable information (PII) Who Should Take This Course? This course is perfect for: Privacy professionals and data protection officers Risk management specialists Compliance officers and auditors IT and cybersecurity managers Business leaders seeking to align privacy practices with ISO/IEC 27701 What You’ll Get: Certification of completion Practical knowledge of privacy management and impact assessments Access to global networks of privacy professionals Hands-on experience with PIMS and privacy risk solutions Access to materials in multiple languages Module 1 PIMS Scope Business Processes and Organizational Boundaries (17 mins) Scope Boundaries and Scope Statements (14 mins) PIMS Scope Policy (14 mins) PIMS Scope Extension (13 mins) Take the Practice Quiz Module 2 Privacy Impact Assessment (PIA) Privacy Impact Assessment: Recognizing Privacy Risks (14 mins) Conducting a Privacy Impact Assessment (15 mins) Privacy Risk Solutions (Part I) (15 mins) Privacy Risk Solutions (Part II) (14 mins) Take the Practice Quiz Module 3 Information Security in Supplier Relationships Supply Chain Risk Management (15 mins) Outsourcing Risk (14 mins) The Role of ISO Standards in the Supply Chain (13 mins) The Role of SOC2 Audits in the Supply Chain (15 mins) Take the Practice Quiz Module 4 Security Architecture Security Architecture (Part I) (15 mins) Security Architecture (Part II) (14 mins) PII Data Breaches (15 mins) PII Incident Response (13 mins) Take the Practice Quiz Specialization · 4 modules Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags Privacy Information Management PIMS ISO/IEC 27701 Risk Management Data Protection Privacy Impact Assessment Supply Chain Risk Management Security Architecture About the Trainer Graeme Parker Cybersecurity and Information Security Expert Meet Graeme Parker, a Security, Technology, Risk, and Compliance professional with vast experience in high-profile private and public sector roles. Graeme excels in implementing information risk management solutions and developing security architectures and programs. Graeme has led projects for standards like ISO/IEC 27001, PCI-DSS, and HMG Accreditation. Graeme has conducted risk assessments, led security initiatives, and managed due diligence for outsourcing contracts. His experience spans financial services, government, manufacturing, healthcare, and retail. Graeme is also a certified trainer with PECB, delivering courses globally on ISO/IEC 27001, ISO 22301, ISO/IEC 42001, CISSP, CISM, and CISA exam prep. Graeme has international experience in the UK, USA, Canada, Sweden, Ireland, Germany, and more. Graeme thrives in dynamic environments, advancing cybersecurity practices globally. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.
Navigating NIST SP 800-171 Compliance: A Practical Approach

Book a Meeting Login Competency Navigating NIST SP 800-171 Compliance: A Practical Approach This competency provides skills for NIST compliance, covering CUI handling, safeguarding controls, and security measures. Gain practical knowledge of CUI handling policies and guidance for compliance. 5 Trainers About Course Overview: This comprehensive course introduces participants to the NIST SP 800-171 compliance framework, offering a deep dive into CUI management, safeguarding controls, and security policies. Participants will gain practical knowledge of how to handle, protect, and destroy CUI while ensuring compliance with NIST standards and best practices. What You’ll Learn: Overview of NIST SP 800-171 compliance requirements Understanding the classification, storage, and sharing of CUI Best practices for implementing logical, physical, and cryptographic safeguards CUI governance and policy development How to ensure compliance with Executive Order 13556 and 32 CFR Part 2002 Who Should Take This Course? This course is perfect for: Cybersecurity professionals and IT managers Compliance officers and auditors Risk management specialists Government contractors handling CUI Business leaders seeking to ensure NIST SP 800-171 compliance What You’ll Get: Certification of completion Practical knowledge of CUI handling and safeguarding measures Access to global networks of cybersecurity professionals Hands-on experience with NIST SP 800-171 compliance strategies Access to materials in multiple languages Module 1 Introduction to CUI Controlled Unclassified Information (CUI) Overview (13 mins) Threats to CUI (14 mins) CUI Storage (15 mins) CUI Governance and Organizational Security (15 mins) Take the Practice Quiz Module 2 CUI Handling CUI Determination and Classification (14 mins) Best Practices for Marking (15 mins) CUI Sharing and Dissemination (14 mins) CUI Destruction (16 mins) Take the Practice Quiz Module 3 CUI Safeguarding Controls Logical Controls (14 mins) Cryptography and Firewall Technologies (14 mins) Preventative Measures (14 mins) Physical Controls (15 mins) Take the Practice Quiz Module 4 CUI Policies and Guidance Documents Agency Policy (15 mins) Executive Order 13556 and 32 CFR Part 2002 (14 mins) Implementation Guidance for CUI (14 mins) CUI Registry (14 mins) Take the Practice Quiz Specialization · 4 modules Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags NIST CUI Cybersecurity NIST SP 800-171 Information Security Management Compliance Information Security Policies Data Protection About the Trainer Graeme Parker Cybersecurity and Information Security Expert Meet Graeme Parker, a Security, Technology, Risk, and Compliance professional with vast experience in high-profile private and public sector roles. Graeme excels in implementing information risk management solutions and developing security architectures and programs. Graeme has led projects for standards like ISO/IEC 27001, PCI-DSS, and HMG Accreditation. Graeme has conducted risk assessments, led security initiatives, and managed due diligence for outsourcing contracts. His experience spans financial services, government, manufacturing, healthcare, and retail. Graeme is also a certified trainer with PECB, delivering courses globally on ISO/IEC 27001, ISO 22301, ISO/IEC 42001, CISSP, CISM, and CISA exam prep. Graeme has international experience in the UK, USA, Canada, Sweden, Ireland, Germany, and more. Graeme thrives in dynamic environments, advancing cybersecurity practices globally. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.
Getting Started with (NIST) the National Institute of Standards and Technology

Book a Meeting Login Competency Getting started with NIST This competency offers essential insights into NIST standards, covering foundational NIST principles and frameworks. It ensures proficiency in navigating NIST and managing CUI requirements effectively. 5 Trainers | 4 Modules | 100% Positive Reviews (24 reviews) | 104 Lessons (4h 15m) 5 Trainers About Course Overview: This comprehensive course introduces participants to NIST standards, including its cybersecurity frameworks, regulatory requirements, and best practices for securing information systems. Through real-world case studies, participants will learn to integrate NIST compliance measures into their cybersecurity programs. What You’ll Learn: Fundamentals of NIST standards and their applications Implementing the NIST Cybersecurity Framework (CSF) Managing Controlled Unclassified Information (CUI) Compliance with NIST SP 800-53 and SP 800-171 Best practices for integrating NIST frameworks into security programs Who Should Take This Course? This course is perfect for: Cybersecurity professionals and IT security managers Compliance officers and auditors Risk management specialists Government contractors handling CUI Business leaders ensuring compliance with NIST standards What You’ll Get: A certification of completion Practical knowledge of NIST frameworks and compliance strategies Access to a global community of cybersecurity professionals Hands-on experience with NIST security controls Access to course materials in multiple languages Module 1 NIST Essentials Introduction to NIST Standards Key Components of the NIST Cybersecurity Framework Understanding Critical Security Controls (CIS Controls) Accessing and Utilizing NIST Resources Take the Practice Quiz (8 Questions) Module 2 Controlled Unclassified Information (CUI) Defining CUI and Its Security Requirements Managing and Protecting CUI in Compliance with NIST Security Protocols for Handling Sensitive Data Case Studies: Successful CUI Management Module 3 CUI Configuration Management (Part I) Best Practices for CUI Security Configuration Implementing Security Baselines for CUI Systems Risk Assessment and Security Audits for CUI Compliance Security Testing and Validation for NIST Compliance Module 4 CUI Configuration Management (Part II) Advanced Security Measures for Protecting CUI Continuous Monitoring and Incident Response for NIST Compliance Compliance Auditing and Risk Reporting Future Trends in NIST Compliance and Cybersecurity Specialization · 4 modules Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags NIST CUI Cybersecurity Information Security Information Security Management ISO/IEC 27001 NIST Framework NIST SP 800-53 NIST SP 800-171 NIST Compliance NIST Cybersecurity Framework About the Trainer Graeme Parker Cybersecurity and Information Security Expert Meet Graeme Parker, a Security, Technology, Risk, and Compliance professional with vast experience in high-profile private and public sector roles. Graeme excels in implementing information risk management solutions and developing security architectures and programs. Graeme has led projects for standards like ISO/IEC 27001, PCI-DSS, and HMG Accreditation. Graeme has conducted risk assessments, led security initiatives, and managed due diligence for outsourcing contracts. His experience spans financial services, government, manufacturing, healthcare, and retail. Graeme is also a certified trainer with PECB, delivering courses globally on ISO/IEC 27001, ISO 22301, ISO/IEC 42001, CISSP, CISM, and CISA exam prep. Graeme has international experience in the UK, USA, Canada, Sweden, Ireland, Germany, and more. Graeme thrives in dynamic environments, advancing cybersecurity practices globally. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.
Implementation of Control A 5.30 ICT Readiness for Business Continuity

Book a Meeting Login Competency Implementation of Control A 5.30 ICT Readiness for Business Continuity This competency offers a comprehensive overview of ICT readiness and business continuity. Participants will explore the importance of cybersecurity, align ICT with business objectives, and understand documentation and human factors. The competency also covers backup and recovery protocols, including redundancy and failover systems, while emphasizing regular maintenance, testing, and ISO/IEC 27001 compliance. Mastering these elements will enhance your organization’s resilience and preparedness for disruptions. 5 Trainers About Course Overview: This course provides essential knowledge for implementing Control A 5.30 from ISO/IEC 27001, focusing on ICT readiness within the context of business continuity. Through four modules, learners will explore strategic alignment of ICT with business needs, employee readiness, recovery protocols, and ISO/IEC 27001-compliant testing and maintenance. By completing this course, professionals will be equipped to enhance organizational resilience and minimize downtime during disruptions. What You’ll Learn: Core principles of ICT readiness for business continuity How to align ICT operations with continuity objectives Best practices in documentation, employee training, and communication Protocols for backup, recovery, and redundancy ISO/IEC 27001 guidelines for maintenance, testing, and auditing Who Should Take This Course? This course is perfect for: Information security professionals Business continuity and risk managers IT administrators and system architects ISO/IEC 27001 implementers and auditors Professionals responsible for ICT service continuity What You’ll Get: A certification of completion Step-by-step guidance for implementing Control A 5.30 Tools to ensure ICT resilience during crises Deep understanding of BCMS and ISMS integration Practice quizzes and real-world scenarios Module 1 Understanding ICT Readiness and Business Continuity Introduction to ICT Readiness (16 mins) Business Continuity Objectives (13 mins) Significance of Cybersecurity in Business Continuity (16 mins) Aligning ICT with Business Objectives (13 mins) Take the Practice Quiz Module 2 Documentation and Human Factor BIA and Crisis Communication Strategies (14 mins) Establishing Best Practices Among Personnel (16 mins) Employee Training and Awareness (13 mins) Documentation and Communication (14 mins) Take the Practice Quiz Module 3 Backup and Recovery Protocols ICT Protocols for Backup, Recovery, and Continuity (14 mins) Redundancy and Failover Systems (18 mins) Virtualization and Remote Access (16 mins) Other Cybersecurity Measures (14 mins) Take the Practice Quiz Module 4 Maintenance, Testing, and ISO/IEC 27001 Regular Maintenance and Updates (14 mins) Testing and Exercises (14 mins) Implementation as per ISO/IEC 27001 (14 mins) Auditing as per ISO/IEC 27001 (13 mins) Take the Practice Quiz Specialization · 4 modules Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags ICT Readiness for Business Continuity Implementation of Control 5.30 About the Trainer Ramy Mohammed Information Security and Business Continuity Expert Ramy Mohammed is a passionate expert in security, business continuity, and project management. He founded ISQuality in 2012, specializing in consulting, auditing, and training in cybersecurity and business continuity. As CEO of RISKILIENCE, he focuses on risks and resilience, particularly in information security and business continuity. With 21 years of experience, Ramy leads the North West Africa branch of the Business Continuity Institute and has contributed to over 20 projects, conducted more than 100 training courses, and performed around 40 ISMS and BCMS audits. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.
Leveraging ISO 22301 for Supply Chain Continuity and Resilience

Book a Meeting Login Competency Leveraging ISO 22301 for Supply Chain Continuity and Resilience Gain a thorough understanding of ISO 22301 principles that enhance supply chain continuity and resilience. This competency involves understanding and assessing supply chain risks, integrating these insights into a comprehensive business continuity management system (BCMS), and applying ISO 22301 standards to develop risk management strategies. 5 Trainers About Course Overview: This course delivers an in-depth guide to applying ISO 22301 standards for managing and enhancing supply chain resilience. Learners will assess risk types, engage resilient partners, and apply modern tools like blockchain, IoT, and digital twins to support real-time monitoring and continuity. The goal is to build robust, agile supply chains that align with global best practices for business continuity. What You’ll Learn: How to identify and assess key supply chain risks How ISO 22301 supports resilient supply chain strategies Methods to integrate risk insights into BCMS Best practices for resilient partnerships and collaboration Emerging technologies for improving supply chain continuity Who Should Take This Course? This course is perfect for: Supply chain and logistics managers Risk and business continuity professionals ISO 22301 implementers and auditors Procurement and operations leaders Professionals managing global or complex supplier networks What You’ll Get: A certification of completion Strategic frameworks for risk-aware supply chains Tools to embed ISO 22301 into supply chain governance Insights on digital technologies and real-time supply monitoring Practice quizzes and applied case scenarios Module 1 Understanding Supply Chain Risks Introduction to Supply Chain Risks (13 mins) Assessing Risks in the Supply Chain (15 mins) External Factors Affecting Supply Chains (15 mins Integrating Supply Chain Risk Management into BCMS (15 mins) Take the Practice Quiz Module 2 ISO 22301 Principles for Supply Chain Resilience Overview of ISO 22301 Principles (14 mins) Leadership and Commitment in Supply Chain Resilience (14 mins) Risk Assessment and Treatment in the Supply Chain (15 mins) Continual Improvement of Supply Chain Resilience (14 mins) Take the Practice Quiz Module 3 Building Resilient Supply Chain Partnerships Principles of Resilient Supply Chain Partnerships (14 mins) Developing and Implementing Partner Agreements (14 mins) Communication and Collaboration in the Supply Chain (14 mins) Continuous Improvement and Monitoring (15 mins) Take the Practice Quiz Module 4 Technology and Tools for Supply Chain Continuity Overview of Technologies for Supply Chain Continuity (14 mins) Digital Twins and Simulation for Supply Chain Resilience (14 mins) IoT and Real-time Data for Supply Chain Visibility (14 mins) Leveraging Blockchain for Supply Chain Transparency (14 mins) Take the Practice Quiz Specialization · 4 modules Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags Leveraging ISO 22301 Supply Chain Continuity and Resilience ISO 22301 Leadership and Commitment Digital Twins About the Trainer Henri Haenni Business Continuity and Information Security Expert Henri is the founder and CEO of Abilene Advisors, a management consulting company active in Governance, Risk Management, and Compliance. He holds a Master’s degree in Mathematics and Computer Science from the Swiss Federal Institute of Technology and an MBA from Lausanne University. Henri advises governmental organizations and multinational companies in Business Continuity, Information Security, and Risk Management, implementing ISO 22301, ISO/IEC 27001, and ISO 9001 management systems across Europe, the Middle East, and Asia. He teaches at the Business Continuity Institute and Sorbonne University, offering courses in multiple languages. Henri chairs workgroups on Information Security and Business Continuity and holds certifications including CBCI, ISO/IEC 27001 Lead Implementer, ISO 22301 Lead Auditor, and ISO/IEC 27005 Risk Manager. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.
Advanced Business Impact Analysis (BIA) Techniques and Integration

Book a Meeting Login Competency Advanced Business Impact Analysis (BIA) Techniques and Integration Master the advanced Business Impact Analysis (BIA) techniques and integrate them with cloud and virtualization technologies. This requires the ability to apply sophisticated methodologies for both quantitative and qualitative analyses, utilizing real-time data processing and scalable resources to enhance accuracy and responsiveness. 5 Trainers About Course Overview: This course explores advanced Business Impact Analysis (BIA) practices and their integration into modern enterprise environments. By combining sector-specific approaches with emerging technologies such as AI, machine learning, and cloud infrastructure, learners will enhance their ability to assess and respond to organizational risks with precision and adaptability. What You’ll Learn: Advanced BIA methodologies for quantitative and qualitative analysis Sector-specific applications in healthcare, finance, and manufacturing How to integrate BIA with ISO/IEC 27001 and ISO 31000 The role of AI, big data, and blockchain in evolving BIA practices How cloud technologies support scalable and responsive BIA Who Should Take This Course? This course is perfect for: Business continuity professionals managing complex systems Risk and IT managers seeking to modernize impact assessments ISO standard implementers and consultants Data analysts and decision-makers in regulated industries Professionals involved in cloud, AI, or security-driven business continuity What You’ll Get: Sector-specific and standards-based BIA techniques Integration strategies with cloud and ISO frameworks Tools for leveraging real-time data and automation in BIA Practice quizzes and examples from real-world use cases Module 1 Advanced Methodologies in BIA Introduction to Advanced BIA and Cloud Technologies (14 mins) Quantitative Analysis Techniques in BIA (15 mins) Qualitative Analysis Techniques and Decision-Making (15 mins) Sector-specific Applications and Best Practices (14 mins) Take the Practice Quiz Module 2 Sector-specific BIA Approaches Introduction to Sector-specific BIA Methods (15 mins) BIA in Healthcare Sector (15 mins) BIA in Financial Services (14 mins) BIA for Manufacturing and Supply Chains (13 mins) Take the Practice Quiz Module 3 Synergizing BIA with Other ISO Standards Introduction to Integrating BIA with ISO Standards (13 mins) BIA and ISO/IEC 27001 for Information Security (15 mins) Enhancing Privacy Management with BIA (15 mins) BIA and ISO 31000 for Comprehensive Risk Management (13 mins) Take the Practice Quiz Module 4 Technological Innovations in BIA Introduction to Technological Innovations in BIA (13 mins) Big Data Analytics in BIA (13 mins) AI and Machine Learning in Enhancing BIA (14 mins) Blockchain for Secure and Transparent BIA (14 mins) Take the Practice Quiz Specialization · 4 modules Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags Advanced BIA Techniques ISO/IEC 27001 ISO 31000 Sector-specific BIA AI and Machine Learning About the Trainer Henri Haenni Business Continuity and Information Security Expert Henri is the founder and CEO of Abilene Advisors, a management consulting company active in Governance, Risk Management, and Compliance. He holds a Master’s degree in Mathematics and Computer Science from the Swiss Federal Institute of Technology and an MBA from Lausanne University. Henri advises governmental organizations and multinational companies in Business Continuity, Information Security, and Risk Management, implementing ISO 22301, ISO/IEC 27001, and ISO 9001 management systems across Europe, the Middle East, and Asia. He teaches at the Business Continuity Institute and Sorbonne University, offering courses in multiple languages. Henri chairs workgroups on Information Security and Business Continuity and holds certifications including CBCI, ISO/IEC 27001 Lead Implementer, ISO 22301 Lead Auditor, and ISO/IEC 27005 Risk Manager. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.
Risk Management: A Guide to Strategic Safeguarding

Book a Meeting Login Competency Risk Management: A Guide to Strategic Safeguarding This specialized competency equips professionals with practical risk management skills. Participants gain insights and tools to enhance organizational resilience and decision-making in line with ISO 31000. 5 Trainers About Course Overview: This course offers a structured journey through the principles and frameworks of ISO 31000. Participants will master risk assessment tools, explore treatment options, and apply techniques for embedding a resilient risk culture. Real-world applications and future-focused insights position learners to lead risk-informed decision-making across any organization. What You’ll Learn: ISO 31000 standard and foundational risk concepts How to design and apply risk management frameworks Risk assessment tools, scenario planning, and stress testing Strategies for treatment, integration, and continual monitoring Innovations, trends, and professional development in risk management Who Should Take This Course? This course is perfect for: Risk managers and compliance professionals Executives responsible for strategic planning Internal auditors and operational leaders ISO 31000 implementers and consultants Anyone looking to strengthen risk-based decision-making What You’ll Get: A certification of completion Deep understanding of ISO 31000 and risk frameworks Practical tools for risk analysis, treatment, and monitoring Exposure to digital innovations and global risk trends Practice quizzes and real-world case insights Module 1 Risk Management Foundations Introduction to ISO 31000 (14 mins) Understanding Risk (14 mins) Principles of Risk Management (15 mins) Building a Risk Culture (15 mins) Take the Practice Quiz Module 2 Risk Management Framework and Tools Designing a Risk Management Framework (14 mins) Risk Assessment Process (14 mins) Tools and Techniques for Risk Management (15 mins) Scenario Planning and Stress Testing (14 mins) Take the Practice Quiz Module 3 Risk Treatment and Strategy Risk Treatment Options (16 mins) Integrating Risk Management across Functions (14 mins) Emerging and Specialized Risk Areas (14 mins) Continual Monitoring and Review (14 mins) Take the Practice Quiz Module 4 Mastery, Implementation, and the Future of Risk Management Real-world Applications and Lessons (14 mins) Digital Innovations in Risk Management (16 mins) Professional Development in Risk Management (14 mins) Emerging Trends and Predictions (15 mins) Take the Practice Quiz Specialization · 4 modules Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags ISO 31000 Risk Management Risk Management Techniques Risk Management Culture About the Trainer Rinske Geerlings Risk, Business Continuity, and Information Security Expert Rinske Geerlings is a renowned consultant, speaker, and certified trainer in Business Continuity, Information Security, Crisis Management, Disaster Recovery, and Risk Management. With over 20 years of global experience, Rinske has provided consultancy to Central Banks, government entities, and global corporations. As MD of Business As Usual in Australia, she has driven significant growth. She is proficient in ISO standards like ISO 22301, ISO 31000, and ISO/IEC 27001 and has earned accolades including Risk Consultant of the Year. Passionate about resilience and authenticity, Rinske empowers professionals globally through her collaboration with PECB. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.