Techniques of Cybersecurity

Book a Meeting Login Competency Techniques of Cybersecurity This competency provides a comprehensive understanding of essential cybersecurity practices, covering attack methods, protective measures, and cryptography principles. 5 Trainers About Course Overview: With a focus on real-world applications, this course will guide participants through various attack mechanisms, security controls, and cryptographic solutions. Through practical examples, participants will gain the knowledge needed to assess vulnerabilities, implement effective security measures, and understand the importance of cryptography in securing data. What You’ll Learn: Attack mechanisms and internal/external threats Security controls including application-level, server, and client-level controls Techniques for managing access controls (Identification, Authorization, Authentication, Accountability) Key concepts of cryptography including symmetric and asymmetric encryption, hybrid systems, and key management Who Should Take This Course? This course is perfect for: Cybersecurity professionals IT security managers Data protection officers Security consultants Compliance officers IT professionals interested in cybersecurity What You’ll Get: Certification of completion Practical knowledge of cybersecurity attack mechanisms and defense strategies Access to course materials Hands-on experience with cryptographic techniques and access control mechanisms Module 1 Attack Mechanisms Attacks from Inside the Private Network: 13 mins Internal and External Attacks: 14 mins Types of Cyberattacks: 13 mins Mitigation of Internal and External Attacks: 13 mins Take the Practice Quiz Module 2 Cybersecurity Controls Application-level Controls: 15 mins Server Protection: 14 mins Client-level Service Authentication: 15 mins Controls against Social Engineering Attacks: 14 mins Take the Practice Quiz Module 3 Access Controls Identification: 16 mins Authorization: 14 mins Authentication: 15 mins Accountability: 13 mins Take the Practice Quiz Module 4 Cryptography Symmetric Cryptography: 13 mins Asymmetric Cryptography: 15 mins Hybrid Systems: 13 mins Key Management: 16 mins Take the Practice Quiz Specialization · 4 modules              Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags Cybersecurity Techniques for Cybersecurity Data Protection Cybersecurity Controls Cryptography Cyber Incident Response Cybersecurity Standards About the Trainer Algis Kibirkstis Cybersecurity and Information Security Advisor Algis Kibirkstis stands out as an expert in information security, highly regarded for his proficiency as an ISO/IEC 27001, CISSP, and CISA trainer. Fluent in English and French, his communication skills reflect his international exposure and dual nationality (Canadian and Lithuanian/EU). With a career spanning over thirty years, Algis has dedicated more than two decades to information security. Algis has deep insights into ISO/IEC 27001 governance, risk management, audit, and compliance, earning recognition as a leading specialist. As a freelancer, Algis is interested in contractual opportunities, using his experience to support organizations in meeting their information security goals. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Implementing Information Security Management Systems IV

Book a Meeting Login Competency Implementing Information Security Management Systems IV This competency covers ISO/IEC 27001 Annex A Controls IV (A5.17 – A5.33). Learn authentication, access rights, supplier security, identity management, cloud security, and business continuity. 5 Trainers About Course Overview: This comprehensive course introduces participants to the implementation of key ISMS controls. It covers best practices for authentication management, secure supplier relationships, cloud security strategies, and business continuity planning to enhance ISMS compliance and cybersecurity measures. What You’ll Learn: Fundamentals of implementing Annex A controls under ISO/IEC 27001 Identity and access management best practices Secure supplier relationship management and auditing Cloud security and business continuity frameworks Compliance assurance and continuous improvement for ISMS Who Should Take This Course? This course is perfect for: IT security professionals and compliance officers ISMS implementers and auditors Business continuity and risk management specialists Information security consultants and governance specialists IT managers securing supplier relationships and cloud services What You’ll Get: A certification of completion Practical knowledge of ISMS implementation and compliance Access to a global community of security professionals Hands-on experience with access control, supplier security, and cloud security Access to course materials in multiple languages Module 1 Implementing ISO/IEC 27001, Annex A Controls 5.17 to 5.19 Implementing Control 5.17 (14 mins) Implementing Control 5.18 (14 mins) Implementing Control 5.19 (Part I) (13 mins) Implementing Control 5.19 (Part II) (13 mins) Take the Practice Quiz (8 Questions) Module 2 Implementing ISO/IEC 27001, Annex A Controls 5.16 and 5.20 to 5.22 Access Control Policies and Identity Management Secure Authentication and Multi-Factor Authentication (MFA) Supplier Security and Third-Party Risk Management Compliance with ISO/IEC 27001 Supplier Controls Module 3 Implementing ISO/IEC 27001, Annex A Controls 5.23 to 5.26 Cloud Security and Secure Data Storage Securing Remote Work Environments Business Continuity and ISMS Integration Security in Supply Chain Operations Module 4 Implementing ISO/IEC 27001, Annex A Controls 5.29 to 5.33 Information Security in Supplier Contracts Managing Information Security in Cloud Environments Continuous Monitoring and Security Incident Management Ensuring Compliance and Regular ISMS Audits Specialization · 4 modules              Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags ISO/IEC 27001 Information Security Data Protection Information Security Management Annex A Controls Information Security Implementation About the Trainer Eliza Popa Security Advisor, Managing Director, and Auditor Eliza Popa is a distinguished member of ISC2, ISACA, PECB, and CSA, bringing extensive knowledge to her role as a trainer. As the Founder and Managing Director of Cyberstrat IT Consulting in Abu Dhabi since 2019, Eliza has shown exceptional leadership in information security. She is an ISC2 Official Training Instructor for CISSP and a PECB Certified Trainer for ISO/IEC 27001, Lead Cybersecurity Manager, and CISO. As a CSA Authorized Trainer for CCSK, she excels in cloud security. Eliza’s consultancy and auditing expertise is marked by her self-motivated and results-driven approach, establishing the GRC practice across two continents. With over a decade of experience in risk assessments, ISMS gap analysis, and internal audits, her proficiency is well-established. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Implementing Information Security Management Systems III

Book a Meeting Login Competency Implementing Information Security Management Systems IV This competency covers ISO/IEC 27001 Annex A Controls IV (A5.17 – A5.33). Learn authentication, access rights, supplier security, identity management, cloud security, and business continuity. 5 Trainers About Course Overview: This comprehensive course introduces participants to the implementation of key ISMS controls. It covers best practices for authentication management, secure supplier relationships, cloud security strategies, and business continuity planning to enhance ISMS compliance and cybersecurity measures. What You’ll Learn: Fundamentals of implementing Annex A controls under ISO/IEC 27001 Identity and access management best practices Secure supplier relationship management and auditing Cloud security and business continuity frameworks Compliance assurance and continuous improvement for ISMS Who Should Take This Course? This course is perfect for: IT security professionals and compliance officers ISMS implementers and auditors Business continuity and risk management specialists Information security consultants and governance specialists IT managers securing supplier relationships and cloud services What You’ll Get: A certification of completion Practical knowledge of ISMS implementation and compliance Access to a global community of security professionals Hands-on experience with access control, supplier security, and cloud security Access to course materials in multiple languages Module 1 Implementing ISO/IEC 27001, Annex A Controls 5.17 to 5.19 Implementing Control 5.17 (14 mins) Implementing Control 5.18 (14 mins) Implementing Control 5.19 (Part I) (13 mins) Implementing Control 5.19 (Part II) (13 mins) Take the Practice Quiz (8 Questions) Module 2 Implementing ISO/IEC 27001, Annex A Controls 5.16 and 5.20 to 5.22 Access Control Policies and Identity Management Secure Authentication and Multi-Factor Authentication (MFA) Supplier Security and Third-Party Risk Management Compliance with ISO/IEC 27001 Supplier Controls Module 3 Implementing ISO/IEC 27001, Annex A Controls 5.23 to 5.26 Cloud Security and Secure Data Storage Securing Remote Work Environments Business Continuity and ISMS Integration Security in Supply Chain Operations Module 4 Implementing ISO/IEC 27001, Annex A Controls 5.29 to 5.33 Information Security in Supplier Contracts Managing Information Security in Cloud Environments Continuous Monitoring and Security Incident Management Ensuring Compliance and Regular ISMS Audits Specialization · 4 modules              Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags ISO/IEC 27001 Information Security Data Protection Information Security Management Annex A Controls Information Security Implementation About the Trainer Eliza Popa Security Advisor, Managing Director, and Auditor Eliza Popa is a distinguished member of ISC2, ISACA, PECB, and CSA, bringing extensive knowledge to her role as a trainer. As the Founder and Managing Director of Cyberstrat IT Consulting in Abu Dhabi since 2019, Eliza has shown exceptional leadership in information security. She is an ISC2 Official Training Instructor for CISSP and a PECB Certified Trainer for ISO/IEC 27001, Lead Cybersecurity Manager, and CISO. As a CSA Authorized Trainer for CCSK, she excels in cloud security. Eliza’s consultancy and auditing expertise is marked by her self-motivated and results-driven approach, establishing the GRC practice across two continents. With over a decade of experience in risk assessments, ISMS gap analysis, and internal audits, her proficiency is well-established. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Implementing Information Security Management Systems I

Book a Meeting Login Competency Implementing Information Security Management Systems I This competency provides a comprehensive understanding of ISO/IEC 27001, focusing on Annex A controls to establish an effective Information Security Management System (ISMS). Participants will learn to develop security policies, define roles, ensure threat intelligence, integrate security into projects, and implement key security controls. 5 Trainers About Course Overview: This comprehensive course guides participants in understanding and applying ISO/IEC 27001 controls to implement an ISMS. The course includes real-world case studies and practical examples for applying ISO/IEC 27001’s Annex A controls in various organizational settings. What You’ll Learn: Fundamentals of ISO/IEC 27001 and its Annex A controls How to implement ISO/IEC 27001 controls 5.1 to 5.15 and 8.1 Developing information security policies and procedures Defining roles and responsibilities in an ISMS Ensuring ongoing monitoring and compliance with security controls Who Should Take This Course? This course is perfect for: Cybersecurity professionals and IT security managers Compliance officers and auditors Risk management specialists Security consultants and business leaders What You’ll Get: A certification of completion Practical knowledge of ISO/IEC 27001 and its security controls Access to course materials in multiple languages Hands-on experience with the implementation of Annex A controls Module 1 Implementing ISO/IEC 27001, Annex A Controls 5.1 to 5.4 Implementing Control 5.1: 15 mins Implementing Control 5.2: 14 mins Implementing Control 5.3: 15 mins Implementing Control 5.4: 13 mins Take the Practice Quiz Module 2 Implementing ISO/IEC 27001, Annex A Controls 5.5 to 5.8 Implementing Controls 5.5 and 5.6: 15 mins Implementing Control 5.7 (Part I): 14 mins Implementing Control 5.7 (Part II): 15 mins Implementing Control 5.8: 17 mins Take the Practice Quiz Module 3 Implementing ISO/IEC 27001, Annex A Controls 5.9 to 5.12 Implementing Control 5.9: 15 mins Implementing Control 5.10: 15 mins Implementing Control 5.11: 14 mins Implementing Control 5.12: 16 mins Take the Practice Quiz Module 4 Implementing ISO/IEC 27001, Annex A Controls 5.13 to 5.15 and 8.1 Implementing Control 5.13: 13 mins Implementing Control 5.14: 15 mins Implementing Control 5.15: 15 mins Implementing Control 8.1: 14 mins Take the Practice Quiz Specialization · 4 modules              Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags ISO/IEC 27001 Information Security Data Protection Information Security Management Annex A Controls Auditing About the Trainer Graeme Parker Cybersecurity and Information Security Expert Meet Graeme Parker, a Security, Technology, Risk, and Compliance professional with vast experience in high-profile private and public sector roles. Graeme excels in implementing information risk management solutions and developing security architectures and programs. He has led projects for standards like ISO/IEC 27001, PCI-DSS, and HMG Accreditation. Graeme is also a certified trainer with PECB, delivering global courses on ISO/IEC 27001, ISO 22301, ISO/IEC 42001, CISSP, CISM, and CISA exam prep. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Book a Meeting

Skills - Book a demo

登録ありがとうございます!

Thank you for subscribing!