Techniques of Cybersecurity

Book a Meeting Login Competency Techniques of Cybersecurity This competency provides a comprehensive understanding of essential cybersecurity practices, covering attack methods, protective measures, and cryptography principles. 5 Trainers About Course Overview: With a focus on real-world applications, this course will guide participants through various attack mechanisms, security controls, and cryptographic solutions. Through practical examples, participants will gain the knowledge needed to assess vulnerabilities, implement effective security measures, and understand the importance of cryptography in securing data. What You’ll Learn: Attack mechanisms and internal/external threats Security controls including application-level, server, and client-level controls Techniques for managing access controls (Identification, Authorization, Authentication, Accountability) Key concepts of cryptography including symmetric and asymmetric encryption, hybrid systems, and key management Who Should Take This Course? This course is perfect for: Cybersecurity professionals IT security managers Data protection officers Security consultants Compliance officers IT professionals interested in cybersecurity What You’ll Get: Certification of completion Practical knowledge of cybersecurity attack mechanisms and defense strategies Access to course materials Hands-on experience with cryptographic techniques and access control mechanisms Module 1 Attack Mechanisms Attacks from Inside the Private Network: 13 mins Internal and External Attacks: 14 mins Types of Cyberattacks: 13 mins Mitigation of Internal and External Attacks: 13 mins Take the Practice Quiz Module 2 Cybersecurity Controls Application-level Controls: 15 mins Server Protection: 14 mins Client-level Service Authentication: 15 mins Controls against Social Engineering Attacks: 14 mins Take the Practice Quiz Module 3 Access Controls Identification: 16 mins Authorization: 14 mins Authentication: 15 mins Accountability: 13 mins Take the Practice Quiz Module 4 Cryptography Symmetric Cryptography: 13 mins Asymmetric Cryptography: 15 mins Hybrid Systems: 13 mins Key Management: 16 mins Take the Practice Quiz Specialization · 4 modules Watch Now   4 Modules   100% Positive Reviews (24 reviews)   104 Lessons (4h 15m)   3,011 Students   Languages Available: Spanish, English, German, French   Exam   Certificate upon completion of the course Tags Cybersecurity Techniques for Cybersecurity Data Protection Cybersecurity Controls Cryptography Cyber Incident Response Cybersecurity Standards About the Trainer Algis Kibirkstis Cybersecurity and Information Security Advisor Algis Kibirkstis stands out as an expert in information security, highly regarded for his proficiency as an ISO/IEC 27001, CISSP, and CISA trainer. Fluent in English and French, his communication skills reflect his international exposure and dual nationality (Canadian and Lithuanian/EU). With a career spanning over thirty years, Algis has dedicated more than two decades to information security. Algis has deep insights into ISO/IEC 27001 governance, risk management, audit, and compliance, earning recognition as a leading specialist. As a freelancer, Algis is interested in contractual opportunities, using his experience to support organizations in meeting their information security goals. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Implementing Information Security Management Systems IV

Book a Meeting Login Competency Implementing Information Security Management Systems IV This competency covers ISO/IEC 27001 Annex A Controls IV (A5.17 – A5.33). Learn authentication, access rights, supplier security, identity management, cloud security, and business continuity. 5 Trainers About Course Overview: This comprehensive course introduces participants to the implementation of key ISMS controls. It covers best practices for authentication management, secure supplier relationships, cloud security strategies, and business continuity planning to enhance ISMS compliance and cybersecurity measures. What You’ll Learn: Fundamentals of implementing Annex A controls under ISO/IEC 27001 Identity and access management best practices Secure supplier relationship management and auditing Cloud security and business continuity frameworks Compliance assurance and continuous improvement for ISMS Who Should Take This Course? This course is perfect for: IT security professionals and compliance officers ISMS implementers and auditors Business continuity and risk management specialists Information security consultants and governance specialists IT managers securing supplier relationships and cloud services What You’ll Get: A certification of completion Practical knowledge of ISMS implementation and compliance Access to a global community of security professionals Hands-on experience with access control, supplier security, and cloud security Access to course materials in multiple languages Module 1 Implementing ISO/IEC 27001, Annex A Controls 5.17 to 5.19 Implementing Control 5.17 (14 mins) Implementing Control 5.18 (14 mins) Implementing Control 5.19 (Part I) (13 mins) Implementing Control 5.19 (Part II) (13 mins) Take the Practice Quiz (8 Questions) Module 2 Implementing ISO/IEC 27001, Annex A Controls 5.16 and 5.20 to 5.22 Access Control Policies and Identity Management Secure Authentication and Multi-Factor Authentication (MFA) Supplier Security and Third-Party Risk Management Compliance with ISO/IEC 27001 Supplier Controls Module 3 Implementing ISO/IEC 27001, Annex A Controls 5.23 to 5.26 Cloud Security and Secure Data Storage Securing Remote Work Environments Business Continuity and ISMS Integration Security in Supply Chain Operations Module 4 Implementing ISO/IEC 27001, Annex A Controls 5.29 to 5.33 Information Security in Supplier Contracts Managing Information Security in Cloud Environments Continuous Monitoring and Security Incident Management Ensuring Compliance and Regular ISMS Audits Specialization · 4 modules Watch Now   4 Modules   100% Positive Reviews (24 reviews)   104 Lessons (4h 15m)   3,011 Students   Languages Available: Spanish, English, German, French   Exam   Certificate upon completion of the course Tags ISO/IEC 27001 Information Security Data Protection Information Security Management Annex A Controls Information Security Implementation About the Trainer Eliza Popa Security Advisor, Managing Director, and Auditor Eliza Popa is a distinguished member of ISC2, ISACA, PECB, and CSA, bringing extensive knowledge to her role as a trainer. As the Founder and Managing Director of Cyberstrat IT Consulting in Abu Dhabi since 2019, Eliza has shown exceptional leadership in information security. She is an ISC2 Official Training Instructor for CISSP and a PECB Certified Trainer for ISO/IEC 27001, Lead Cybersecurity Manager, and CISO. As a CSA Authorized Trainer for CCSK, she excels in cloud security. Eliza’s consultancy and auditing expertise is marked by her self-motivated and results-driven approach, establishing the GRC practice across two continents. With over a decade of experience in risk assessments, ISMS gap analysis, and internal audits, her proficiency is well-established. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Implementing Information Security Management Systems III

Book a Meeting Login Competency Implementing Information Security Management Systems IV This competency covers ISO/IEC 27001 Annex A Controls IV (A5.17 – A5.33). Learn authentication, access rights, supplier security, identity management, cloud security, and business continuity. 5 Trainers About Course Overview: This comprehensive course introduces participants to the implementation of key ISMS controls. It covers best practices for authentication management, secure supplier relationships, cloud security strategies, and business continuity planning to enhance ISMS compliance and cybersecurity measures. What You’ll Learn: Fundamentals of implementing Annex A controls under ISO/IEC 27001 Identity and access management best practices Secure supplier relationship management and auditing Cloud security and business continuity frameworks Compliance assurance and continuous improvement for ISMS Who Should Take This Course? This course is perfect for: IT security professionals and compliance officers ISMS implementers and auditors Business continuity and risk management specialists Information security consultants and governance specialists IT managers securing supplier relationships and cloud services What You’ll Get: A certification of completion Practical knowledge of ISMS implementation and compliance Access to a global community of security professionals Hands-on experience with access control, supplier security, and cloud security Access to course materials in multiple languages Module 1 Implementing ISO/IEC 27001, Annex A Controls 5.17 to 5.19 Implementing Control 5.17 (14 mins) Implementing Control 5.18 (14 mins) Implementing Control 5.19 (Part I) (13 mins) Implementing Control 5.19 (Part II) (13 mins) Take the Practice Quiz (8 Questions) Module 2 Implementing ISO/IEC 27001, Annex A Controls 5.16 and 5.20 to 5.22 Access Control Policies and Identity Management Secure Authentication and Multi-Factor Authentication (MFA) Supplier Security and Third-Party Risk Management Compliance with ISO/IEC 27001 Supplier Controls Module 3 Implementing ISO/IEC 27001, Annex A Controls 5.23 to 5.26 Cloud Security and Secure Data Storage Securing Remote Work Environments Business Continuity and ISMS Integration Security in Supply Chain Operations Module 4 Implementing ISO/IEC 27001, Annex A Controls 5.29 to 5.33 Information Security in Supplier Contracts Managing Information Security in Cloud Environments Continuous Monitoring and Security Incident Management Ensuring Compliance and Regular ISMS Audits Specialization · 4 modules Watch Now 4 Modules   100% Positive Reviews (24 reviews)   104 Lessons (4h 15m)   3,011 Students   Languages Available: Spanish, English, German, French   Exam   Certificate upon completion of the course Tags ISO/IEC 27001 Information Security Data Protection Information Security Management Annex A Controls Information Security Implementation About the Trainer Eliza Popa Security Advisor, Managing Director, and Auditor Eliza Popa is a distinguished member of ISC2, ISACA, PECB, and CSA, bringing extensive knowledge to her role as a trainer. As the Founder and Managing Director of Cyberstrat IT Consulting in Abu Dhabi since 2019, Eliza has shown exceptional leadership in information security. She is an ISC2 Official Training Instructor for CISSP and a PECB Certified Trainer for ISO/IEC 27001, Lead Cybersecurity Manager, and CISO. As a CSA Authorized Trainer for CCSK, she excels in cloud security. Eliza’s consultancy and auditing expertise is marked by her self-motivated and results-driven approach, establishing the GRC practice across two continents. With over a decade of experience in risk assessments, ISMS gap analysis, and internal audits, her proficiency is well-established. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Implementing Information Security Management Systems I

Book a Meeting Login Competency Implementing Information Security Management Systems I This competency provides a comprehensive understanding of ISO/IEC 27001, focusing on Annex A controls to establish an effective Information Security Management System (ISMS). Participants will learn to develop security policies, define roles, ensure threat intelligence, integrate security into projects, and implement key security controls. 5 Trainers About Course Overview: This comprehensive course guides participants in understanding and applying ISO/IEC 27001 controls to implement an ISMS. The course includes real-world case studies and practical examples for applying ISO/IEC 27001’s Annex A controls in various organizational settings. What You’ll Learn: Fundamentals of ISO/IEC 27001 and its Annex A controls How to implement ISO/IEC 27001 controls 5.1 to 5.15 and 8.1 Developing information security policies and procedures Defining roles and responsibilities in an ISMS Ensuring ongoing monitoring and compliance with security controls Who Should Take This Course? This course is perfect for: Cybersecurity professionals and IT security managers Compliance officers and auditors Risk management specialists Security consultants and business leaders What You’ll Get: A certification of completion Practical knowledge of ISO/IEC 27001 and its security controls Access to course materials in multiple languages Hands-on experience with the implementation of Annex A controls Module 1 Implementing ISO/IEC 27001, Annex A Controls 5.1 to 5.4 Implementing Control 5.1: 15 mins Implementing Control 5.2: 14 mins Implementing Control 5.3: 15 mins Implementing Control 5.4: 13 mins Take the Practice Quiz Module 2 Implementing ISO/IEC 27001, Annex A Controls 5.5 to 5.8 Implementing Controls 5.5 and 5.6: 15 mins Implementing Control 5.7 (Part I): 14 mins Implementing Control 5.7 (Part II): 15 mins Implementing Control 5.8: 17 mins Take the Practice Quiz Module 3 Implementing ISO/IEC 27001, Annex A Controls 5.9 to 5.12 Implementing Control 5.9: 15 mins Implementing Control 5.10: 15 mins Implementing Control 5.11: 14 mins Implementing Control 5.12: 16 mins Take the Practice Quiz Module 4 Implementing ISO/IEC 27001, Annex A Controls 5.13 to 5.15 and 8.1 Implementing Control 5.13: 13 mins Implementing Control 5.14: 15 mins Implementing Control 5.15: 15 mins Implementing Control 8.1: 14 mins Take the Practice Quiz Specialization · 4 modules Watch Now 4 Modules   100% Positive Reviews (24 reviews)   104 Lessons (4h 15m)   3,011 Students   Languages Available: Spanish, English, German, French   Exam   Certificate upon completion of the course Tags ISO/IEC 27001 Information Security Data Protection Information Security Management Annex A Controls Auditing About the Trainer Graeme Parker Cybersecurity and Information Security Expert Meet Graeme Parker, a Security, Technology, Risk, and Compliance professional with vast experience in high-profile private and public sector roles. Graeme excels in implementing information risk management solutions and developing security architectures and programs. He has led projects for standards like ISO/IEC 27001, PCI-DSS, and HMG Accreditation. Graeme is also a certified trainer with PECB, delivering global courses on ISO/IEC 27001, ISO 22301, ISO/IEC 42001, CISSP, CISM, and CISA exam prep. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

GDPR Compliance: A Practical Approach to Data Protection

Book a Meeting Login Competency GDPR Compliance: A Practical Approach to Data Protection This competency delves into the principles of personal data processing and explores the rights of data subjects in detail. Learn about the crucial role of personal data processors in compliance and protecting privacy. 5 Trainers About Course Overview: This course explores the European General Data Protection Regulation (GDPR), offering participants a thorough understanding of personal data processing, data subject rights, and the roles of data controllers and processors. The course emphasizes the importance of GDPR compliance, guiding participants through legal frameworks, the necessary documentation, and the rights and obligations of data handlers. What You’ll Learn: Personal data processing principles under GDPR  The rights of data subjects and conditions for consent The role of data controllers and processors in GDPR compliance  Automated decision-making and the right to object Managing records of processing activities and data protection officers Who Should Take This Course? This course is perfect for: Data protection officers (DPOs) and privacy professionals  Compliance officers and auditors  IT and security professionals  Legal professionals specializing in data privacy  Business leaders and managers responsible for GDPR compliance What You’ll Get: Certification of completion  Comprehensive knowledge of GDPR and personal data protection  Practical strategies for implementing GDPR in organizations  Access to global privacy and data protection networks  Hands-on experience with data subject rights and processing activities   Module 1 Personal Data Processing Principles Introduction to Data Protection (16 mins)  General Provisions of the GDPR (15 mins)  Personal Data Processing (Part I) (13 mins)  Personal Data Processing (Part II) (14 mins)  Take the Practice Quiz Module 2 Data Subject Rights (Part I) Conditions for Consent (15 mins)  Consent Considerations and Sensitivities (13 mins)  Data Subject Rights (14 mins)  Right to Access (16 mins)  Take the Practice Quiz Module 3 Data Subject Rights (Part II) Restriction, Notification Obligations, and Right to Object (13 mins)  Right to Object (15 mins)  Automated Decision-making (14 mins)  Data Controllers (15 mins)  Take the Practice Quiz Module 4 Personal Data Processor Processing Activity Records (15 mins)  Obligations of the Processor (13 mins)  Data Protection Officer (16 mins)  CISO vs. DPO (14 mins)  Take the Practice Quiz Specialization · 4 modules              Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags GDPR Data Protection Data Privacy Privacy Laws Data Subject Rights Personal Data Processing Consent Management Information Security Information Security Management ISO/IEC 27001 About the Trainer Peter Geelen Cybersecurity Specialist and Certified Ethical Hacker Peter Geelen is a professional with over 25 years in Information Security and Cybersecurity. As Executive Director at CyberMinute and owner at Quest for Security, Peter focuses on ISO/IEC 27001 and other ISO certifications. Peter has developed a strong focus on ISO/IEC 27001 and other ISO certification mechanisms in recent years. Peter is a certified and accredited Lead Auditor for ISMS, QMS, BCMS, and supply chain security. As a certified trainer, Peter shares his expertise through teaching, mentoring, workshops, and speaking engagements. Passionate about cybersecurity legislation and certification, Peter drives progress in data protection for products, services, and processes.   Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Privacy Information Management based on ISO/IEC 27701

Book a Meeting Login Competency Privacy Information Management based on ISO/IEC 27701 This competency equips participants with privacy information management practices, covering impact assessments, risk management, and security in collaborations.   5 Trainers About Course Overview: This comprehensive course covers key privacy information management practices based on ISO/IEC 27701. Participants will gain insights into the scope of a Privacy Information Management System (PIMS), conducting Privacy Impact Assessments (PIAs), managing information security in supplier relationships, and designing secure information architectures. The course emphasizes aligning privacy management practices with regulatory requirements and international standards. What You’ll Learn: Defining the scope of a Privacy Information Management System (PIMS)  Conducting Privacy Impact Assessments (PIAs)  Managing privacy risks through effective solutions  Understanding information security requirements in supply chain relationships  Designing and implementing security architecture to protect personally identifiable information (PII) Who Should Take This Course? This course is perfect for:  Privacy professionals and data protection officers  Risk management specialists  Compliance officers and auditors  IT and cybersecurity managers  Business leaders seeking to align privacy practices with ISO/IEC 27701 What You’ll Get:  Certification of completion  Practical knowledge of privacy management and impact assessments  Access to global networks of privacy professionals Hands-on experience with PIMS and privacy risk solutions  Access to materials in multiple languages Module 1 PIMS Scope Business Processes and Organizational Boundaries (17 mins)  Scope Boundaries and Scope Statements (14 mins)  PIMS Scope Policy (14 mins) PIMS Scope Extension (13 mins)  Take the Practice Quiz Module 2 Privacy Impact Assessment (PIA) Privacy Impact Assessment: Recognizing Privacy Risks (14 mins)  Conducting a Privacy Impact Assessment (15 mins)  Privacy Risk Solutions (Part I) (15 mins)  Privacy Risk Solutions (Part II) (14 mins) Take the Practice Quiz Module 3 Information Security in Supplier Relationships Supply Chain Risk Management (15 mins)  Outsourcing Risk (14 mins) The Role of ISO Standards in the Supply Chain (13 mins)  The Role of SOC2 Audits in the Supply Chain (15 mins) Take the Practice Quiz Module 4 Security Architecture Security Architecture (Part I) (15 mins)  Security Architecture (Part II) (14 mins)  PII Data Breaches (15 mins)  PII Incident Response (13 mins)  Take the Practice Quiz Specialization · 4 modules              Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags Privacy Information Management PIMS ISO/IEC 27701 Risk Management Data Protection Privacy Impact Assessment Supply Chain Risk Management Security Architecture About the Trainer Graeme Parker Cybersecurity and Information Security Expert Meet Graeme Parker, a Security, Technology, Risk, and Compliance professional with vast experience in high-profile private and public sector roles. Graeme excels in implementing information risk management solutions and developing security architectures and programs. Graeme has led projects for standards like ISO/IEC 27001, PCI-DSS, and HMG Accreditation. Graeme has conducted risk assessments, led security initiatives, and managed due diligence for outsourcing contracts. His experience spans financial services, government, manufacturing, healthcare, and retail. Graeme is also a certified trainer with PECB, delivering courses globally on ISO/IEC 27001, ISO 22301, ISO/IEC 42001, CISSP, CISM, and CISA exam prep. Graeme has international experience in the UK, USA, Canada, Sweden, Ireland, Germany, and more. Graeme thrives in dynamic environments, advancing cybersecurity practices globally. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Navigating NIST SP 800-171 Compliance: A Practical Approach

Book a Meeting Login Competency Navigating NIST SP 800-171 Compliance: A Practical Approach This competency provides skills for NIST compliance, covering CUI handling, safeguarding controls, and security measures. Gain practical knowledge of CUI handling policies and guidance for compliance. 5 Trainers About Course Overview: This comprehensive course introduces participants to the NIST SP 800-171 compliance framework, offering a deep dive into CUI management, safeguarding controls, and security policies. Participants will gain practical knowledge of how to handle, protect, and destroy CUI while ensuring compliance with NIST standards and best practices. What You’ll Learn: Overview of NIST SP 800-171 compliance requirements  Understanding the classification, storage, and sharing of CUI  Best practices for implementing logical, physical, and cryptographic safeguards CUI governance and policy development  How to ensure compliance with Executive Order 13556 and 32 CFR Part 2002 Who Should Take This Course? This course is perfect for: Cybersecurity professionals and IT managers Compliance officers and auditors Risk management specialists  Government contractors handling CUI  Business leaders seeking to ensure NIST SP 800-171 compliance What You’ll Get: Certification of completion  Practical knowledge of CUI handling and safeguarding measures  Access to global networks of cybersecurity professionals  Hands-on experience with NIST SP 800-171 compliance strategies  Access to materials in multiple languages Module 1 Introduction to CUI  Controlled Unclassified Information (CUI) Overview (13 mins)  Threats to CUI (14 mins) CUI Storage (15 mins) CUI Governance and Organizational Security (15 mins)  Take the Practice Quiz Module 2 CUI Handling CUI Determination and Classification (14 mins)  Best Practices for Marking (15 mins)  CUI Sharing and Dissemination (14 mins)  CUI Destruction (16 mins)  Take the Practice Quiz Module 3 CUI Safeguarding Controls Logical Controls (14 mins)  Cryptography and Firewall Technologies (14 mins)  Preventative Measures (14 mins)  Physical Controls (15 mins)  Take the Practice Quiz Module 4 CUI Policies and Guidance Documents Agency Policy (15 mins)  Executive Order 13556 and 32 CFR Part 2002 (14 mins)  Implementation Guidance for CUI (14 mins)  CUI Registry (14 mins)  Take the Practice Quiz Specialization · 4 modules              Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags NIST CUI Cybersecurity NIST SP 800-171 Information Security Management Compliance Information Security Policies Data Protection About the Trainer Graeme Parker Cybersecurity and Information Security Expert Meet Graeme Parker, a Security, Technology, Risk, and Compliance professional with vast experience in high-profile private and public sector roles. Graeme excels in implementing information risk management solutions and developing security architectures and programs. Graeme has led projects for standards like ISO/IEC 27001, PCI-DSS, and HMG Accreditation. Graeme has conducted risk assessments, led security initiatives, and managed due diligence for outsourcing contracts. His experience spans financial services, government, manufacturing, healthcare, and retail. Graeme is also a certified trainer with PECB, delivering courses globally on ISO/IEC 27001, ISO 22301, ISO/IEC 42001, CISSP, CISM, and CISA exam prep. Graeme has international experience in the UK, USA, Canada, Sweden, Ireland, Germany, and more. Graeme thrives in dynamic environments, advancing cybersecurity practices globally. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Getting Started with (NIST) the National Institute of Standards and Technology

Book a Meeting Login Competency Getting started with NIST This competency offers essential insights into NIST standards, covering foundational NIST principles and frameworks. It ensures proficiency in navigating NIST and managing CUI requirements effectively. 5 Trainers | 4 Modules | 100% Positive Reviews (24 reviews) | 104 Lessons (4h 15m) 5 Trainers About Course Overview: This comprehensive course introduces participants to NIST standards, including its cybersecurity frameworks, regulatory requirements, and best practices for securing information systems. Through real-world case studies, participants will learn to integrate NIST compliance measures into their cybersecurity programs. What You’ll Learn:  Fundamentals of NIST standards and their applications  Implementing the NIST Cybersecurity Framework (CSF)  Managing Controlled Unclassified Information (CUI)  Compliance with NIST SP 800-53 and SP 800-171  Best practices for integrating NIST frameworks into security programs Who Should Take This Course? This course is perfect for:  Cybersecurity professionals and IT security managers  Compliance officers and auditors  Risk management specialists  Government contractors handling CUI  Business leaders ensuring compliance with NIST standards What You’ll Get: A certification of completion  Practical knowledge of NIST frameworks and compliance strategies  Access to a global community of cybersecurity professionals  Hands-on experience with NIST security controls  Access to course materials in multiple languages Module 1 NIST Essentials  Introduction to NIST Standards Key Components of the NIST Cybersecurity Framework  Understanding Critical Security Controls (CIS Controls)  Accessing and Utilizing NIST Resources  Take the Practice Quiz (8 Questions) Module 2 Controlled Unclassified Information (CUI) Defining CUI and Its Security Requirements  Managing and Protecting CUI in Compliance with NIST  Security Protocols for Handling Sensitive Data  Case Studies: Successful CUI Management Module 3 CUI Configuration Management (Part I)  Best Practices for CUI Security Configuration  Implementing Security Baselines for CUI Systems  Risk Assessment and Security Audits for CUI Compliance  Security Testing and Validation for NIST Compliance Module 4 CUI Configuration Management (Part II) Advanced Security Measures for Protecting CUI  Continuous Monitoring and Incident Response for NIST Compliance Compliance Auditing and Risk Reporting  Future Trends in NIST Compliance and Cybersecurity Specialization · 4 modules Watch Now 4 Modules   100% Positive Reviews (24 reviews)   104 Lessons (4h 15m)   3,011 Students   Languages Available: Spanish, English, German, French   Exam   Certificate upon completion of the course Tags NIST CUI Cybersecurity Information Security Information Security Management ISO/IEC 27001 NIST Framework NIST SP 800-53 NIST SP 800-171 NIST Compliance NIST Cybersecurity Framework About the Trainer Graeme Parker Cybersecurity and Information Security Expert Meet Graeme Parker, a Security, Technology, Risk, and Compliance professional with vast experience in high-profile private and public sector roles. Graeme excels in implementing information risk management solutions and developing security architectures and programs. Graeme has led projects for standards like ISO/IEC 27001, PCI-DSS, and HMG Accreditation. Graeme has conducted risk assessments, led security initiatives, and managed due diligence for outsourcing contracts. His experience spans financial services, government, manufacturing, healthcare, and retail. Graeme is also a certified trainer with PECB, delivering courses globally on ISO/IEC 27001, ISO 22301, ISO/IEC 42001, CISSP, CISM, and CISA exam prep. Graeme has international experience in the UK, USA, Canada, Sweden, Ireland, Germany, and more. Graeme thrives in dynamic environments, advancing cybersecurity practices globally. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Implementation of Control A 5.30 ICT Readiness for Business Continuity

Book a Meeting Login Competency Implementation of Control A 5.30 ICT Readiness for Business Continuity This competency offers a comprehensive overview of ICT readiness and business continuity. Participants will explore the importance of cybersecurity, align ICT with business objectives, and understand documentation and human factors. The competency also covers backup and recovery protocols, including redundancy and failover systems, while emphasizing regular maintenance, testing, and ISO/IEC 27001 compliance. Mastering these elements will enhance your organization’s resilience and preparedness for disruptions. 5 Trainers About Course Overview: This course provides essential knowledge for implementing Control A 5.30 from ISO/IEC 27001, focusing on ICT readiness within the context of business continuity. Through four modules, learners will explore strategic alignment of ICT with business needs, employee readiness, recovery protocols, and ISO/IEC 27001-compliant testing and maintenance. By completing this course, professionals will be equipped to enhance organizational resilience and minimize downtime during disruptions. What You’ll Learn: Core principles of ICT readiness for business continuity  How to align ICT operations with continuity objectives  Best practices in documentation, employee training, and communication  Protocols for backup, recovery, and redundancy  ISO/IEC 27001 guidelines for maintenance, testing, and auditing Who Should Take This Course? This course is perfect for: Information security professionals  Business continuity and risk managers  IT administrators and system architects ISO/IEC 27001 implementers and auditors  Professionals responsible for ICT service continuity What You’ll Get:  A certification of completion  Step-by-step guidance for implementing Control A 5.30  Tools to ensure ICT resilience during crises  Deep understanding of BCMS and ISMS integration  Practice quizzes and real-world scenarios Module 1 Understanding ICT Readiness and Business Continuity  Introduction to ICT Readiness (16 mins)  Business Continuity Objectives (13 mins)  Significance of Cybersecurity in Business Continuity (16 mins)  Aligning ICT with Business Objectives (13 mins)  Take the Practice Quiz Module 2 Documentation and Human Factor BIA and Crisis Communication Strategies (14 mins)  Establishing Best Practices Among Personnel (16 mins)  Employee Training and Awareness (13 mins)  Documentation and Communication (14 mins)  Take the Practice Quiz Module 3 Backup and Recovery Protocols ICT Protocols for Backup, Recovery, and Continuity (14 mins)  Redundancy and Failover Systems (18 mins)  Virtualization and Remote Access (16 mins)  Other Cybersecurity Measures (14 mins) Take the Practice Quiz Module 4 Maintenance, Testing, and ISO/IEC 27001  Regular Maintenance and Updates (14 mins)  Testing and Exercises (14 mins)  Implementation as per ISO/IEC 27001 (14 mins)  Auditing as per ISO/IEC 27001 (13 mins)  Take the Practice Quiz Specialization · 4 modules              Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags ICT Readiness for Business Continuity Implementation of Control 5.30 About the Trainer Ramy Mohammed Information Security and Business Continuity Expert Ramy Mohammed is a passionate expert in security, business continuity, and project management. He founded ISQuality in 2012, specializing in consulting, auditing, and training in cybersecurity and business continuity. As CEO of RISKILIENCE, he focuses on risks and resilience, particularly in information security and business continuity. With 21 years of experience, Ramy leads the North West Africa branch of the Business Continuity Institute and has contributed to over 20 projects, conducted more than 100 training courses, and performed around 40 ISMS and BCMS audits. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Leveraging ISO 22301 for Supply Chain Continuity and Resilience

Book a Meeting Login Competency Leveraging ISO 22301 for Supply Chain Continuity and Resilience Gain a thorough understanding of ISO 22301 principles that enhance supply chain continuity and resilience. This competency involves understanding and assessing supply chain risks, integrating these insights into a comprehensive business continuity management system (BCMS), and applying ISO 22301 standards to develop risk management strategies. 5 Trainers About Course Overview: This course delivers an in-depth guide to applying ISO 22301 standards for managing and enhancing supply chain resilience. Learners will assess risk types, engage resilient partners, and apply modern tools like blockchain, IoT, and digital twins to support real-time monitoring and continuity. The goal is to build robust, agile supply chains that align with global best practices for business continuity. What You’ll Learn: How to identify and assess key supply chain risks  How ISO 22301 supports resilient supply chain strategies  Methods to integrate risk insights into BCMS Best practices for resilient partnerships and collaboration Emerging technologies for improving supply chain continuity Who Should Take This Course? This course is perfect for: Supply chain and logistics managers  Risk and business continuity professionals  ISO 22301 implementers and auditors  Procurement and operations leaders  Professionals managing global or complex supplier networks What You’ll Get: A certification of completion Strategic frameworks for risk-aware supply chains  Tools to embed ISO 22301 into supply chain governance  Insights on digital technologies and real-time supply monitoring Practice quizzes and applied case scenarios Module 1 Understanding Supply Chain Risks Introduction to Supply Chain Risks (13 mins)  Assessing Risks in the Supply Chain (15 mins)  External Factors Affecting Supply Chains (15 mins  Integrating Supply Chain Risk Management into BCMS (15 mins)  Take the Practice Quiz Module 2 ISO 22301 Principles for Supply Chain Resilience Overview of ISO 22301 Principles (14 mins)  Leadership and Commitment in Supply Chain Resilience (14 mins)  Risk Assessment and Treatment in the Supply Chain (15 mins)  Continual Improvement of Supply Chain Resilience (14 mins)  Take the Practice Quiz Module 3 Building Resilient Supply Chain Partnerships Principles of Resilient Supply Chain Partnerships (14 mins)  Developing and Implementing Partner Agreements (14 mins)  Communication and Collaboration in the Supply Chain (14 mins)  Continuous Improvement and Monitoring (15 mins)  Take the Practice Quiz Module 4 Technology and Tools for Supply Chain Continuity Overview of Technologies for Supply Chain Continuity (14 mins)  Digital Twins and Simulation for Supply Chain Resilience (14 mins)  IoT and Real-time Data for Supply Chain Visibility (14 mins)  Leveraging Blockchain for Supply Chain Transparency (14 mins)  Take the Practice Quiz Specialization · 4 modules              Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags Leveraging ISO 22301 Supply Chain Continuity and Resilience ISO 22301 Leadership and Commitment Digital Twins About the Trainer Henri Haenni Business Continuity and Information Security Expert Henri is the founder and CEO of Abilene Advisors, a management consulting company active in Governance, Risk Management, and Compliance. He holds a Master’s degree in Mathematics and Computer Science from the Swiss Federal Institute of Technology and an MBA from Lausanne University. Henri advises governmental organizations and multinational companies in Business Continuity, Information Security, and Risk Management, implementing ISO 22301, ISO/IEC 27001, and ISO 9001 management systems across Europe, the Middle East, and Asia. He teaches at the Business Continuity Institute and Sorbonne University, offering courses in multiple languages. Henri chairs workgroups on Information Security and Business Continuity and holds certifications including CBCI, ISO/IEC 27001 Lead Implementer, ISO 22301 Lead Auditor, and ISO/IEC 27005 Risk Manager. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Book a Meeting

Skills - Book a demo

登録ありがとうございます!

Thank you for subscribing!