In partnership with PECB, we offer certified training courses based on the latest practices and covering all requirements of ISO standards and guidelines related to information security and cybersecurity management.
These training programs help professionals succeed in their respective fields and distinguish themselves through worldwide recognition.
Below you will find the various training courses we offer regarding information security management and cybersecurity:
ISO/IEC 27701 was published in August 2019 and is the first international standard addressing privacy information management. The standard will help organizations establish, maintain, and continually improve a Privacy Information Management System (PIMS) by enhancing the existing ISMS, in accordance with the requirements of ISO/IEC 27001 and the guidance of ISO/IEC 27002. It can be used by all types of organizations, regardless of their size, complexity, or country of operation.
The GDPR is the General Data Protection Regulation, a European regulation aimed at strengthening the data protection regime for organizations operating in the European Union (EU) and processing the personal data of European residents.
The GDPR therefore consists of protecting the personal data of employees, customers, and others. Furthermore, it introduces a notification obligation for organizations involved in processing personal data. In the event of non-compliance with this regulation, these organizations will be liable for heavy fines and a compromised reputation. Considering that personal data represents critical and sensitive information that all organizations must protect, such regulation will assist in implementing appropriate procedures and controls to prevent information security breaches. By May 2018, all organizations operating in the EU must comply with this regulation.
Below are the different certification training options we offer on these topics according to the desired level of proficiency:
Program:
This level does not lead to certification
Program:
Program:
During this training, you will acquire the knowledge and skills necessary to plan and conduct internal and external audits in accordance with ISO 19011 certification processes and
ISO/IEC 17021-1 certification processes.
Based on practical exercises, you will master audit techniques and the management of an audit program, an audit team, communication with clients, and conflict resolution.
After acquiring the necessary expertise to perform this audit, you can take the exam and apply for the title of “PECB Certified Lead Auditor.” By holding a PECB certified auditor certificate, you will be able to demonstrate that you have the necessary capabilities and skills to audit organizations in accordance with best practices.
Program:
Refer to the linked brochure in the program section.
=> Click here to access the training brochure – Introduction
=> Click here to access the brochure for this training – Foundation
=> Click here to access the training brochure – Implementation Manager
Click here to access the training brochure – Introduction
Click here to access the training – Foundation
=> Click here to access the training brochure – Lead Implementer
=> Click here to access the training brochure – Lead Auditor
Click here to access the training brochure – Introduction
Click here to access the training – Foundation
Click here to access the training – Manager
Click here to access the training – Lead Manager
Click here to access the training – Introduction
Click here to access the training – Foundation
Click here to access the training – Risk Manager
Click here to access the Risk Assessment Method – Cebios
Click here to access the Risk Assessment Method – Mehari
Click here to access the training brochure – Introduction
Click here to access the training brochure – Foundation
Click here to access the training – Lead Incident Manager
Click here to access the training – Lead Cybersecurity Manager
A penetration test consists of evaluating the security of an IT infrastructure by safely attempting to exploit vulnerabilities that may exist in operating systems, inappropriate configurations, application errors, or end-user behavior.
Click here to access the penetration testing training brochure
Register