The Certified Management Systems Internal Auditor training course is designed to provide the knowledge and skills needed for conducting and managing internal audits in accordance with ISO 19011 guidelines, and other best practices. In this comprehensive three-day course, you will learn the fundamental concepts and principles of internal auditing, the competence required for internal auditors, and how to effectively prepare, conduct, and follow up on internal audits.
This training course will enable you to establish and continually improve an internal audit program within your organization, ensuring compliance and effectiveness.
Who should attend?
This training course is intended for:
Internal auditors
Individuals carrying out roles and responsibilities related to the management system
Individuals involved in the auditing and maintaining a management system
Individuals seeking to become internal auditors or consultants involved in internal auditing
Individuals responsible for ensuring conformity with management system standards
Learning objectives
By the end of this training course, you will be able to:
Explain the fundamental concepts and principles of internal auditing
Establish, implement, monitor, review, and improve an internal audit program
Plan, conduct, and complete an internal audit following the ISO 19011 guidelines and other best practices
Education approach
This training course provides:
Theories, best approaches and practices used in establishing an internal audit program and performing internal audit activities
Interactions between the trainers and participants through questions and discussions
Quizzes with stand-alone questions and scenario-based quizzes, that will help you prepare for the certification exam
Prerequisites
Basic knowledge of the common structure and requirements of management system standards (MSSs)
Day 1: ISO 19011, principles of internal auditing, and competence of internal auditors
Day 2: Establishing the internal audit program and preparing internal audits
Day 3: Conducting and closing internal audits and undertaking follow-up activities
The “PECB Certified Management Systems Internal Auditor” exam fully meets the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains:
Domain 1: Fundamental internal audit concepts and principles
Domain 2: Managing an internal audit program and preparing internal audits
Domain 3: Planning, conducting, and closing an internal audit
For specific information about exam type, languages available, and other details, please visit the List of PECB Exams – PECB Help Center and Exam Rules and Policies | PECB.
You can apply for one of the credentials listed in the following table after passing the exam. You will receive a certificate once you fulfill all the requirements related to the selected credential.
For more information about the PECB certification process, please refer to the Certification Rules and Policies.
The requirements for PECB Certified Management Systems Internal Auditor certification are as follows:
Credential
Exam
Professional experience
MS audit/assessment experience
Other requirements
PECB Certified Management Systems Provisional Internal Auditor
PECB Certified Management Systems Internal Auditor exam
None
None
Signing the PECB Code of Ethics
PECB Certified Management Systems Internal Auditor
PECB Certified Management Systems Internal Auditor exam
Two years of general work experience; At least one year in the implementation, operation and/or auditing of management systems
At least 200 hours
Signing the PECB Code of Ethics
To be considered valid, the auditing activities should follow the best auditing practices and include activities such as:
Planning a management system internal audit
Managing an internal audit program
Leading an internal audit team
Conducting internal audit activities
Generating audit findings
Closing internal audit activities
Conducting internal audit follow-up activities
Certification fees and examination fees are included in the price of the training course.
Participants will be provided with over 300 pages of information, practical examples, and quizzes.
Participants who complete the training course will obtain an attestation of course completion worth 21 CPD (Continuing Profession Development) credits.
Candidates who have completed the training course but failed the exam are eligible to retake the exam once for free within a 12-month period from the initial date of the exam.
Why should you attend this training course?
The Certified Management Systems Internal Auditor training course is designed to provide the knowledge and skills needed for conducting and managing internal audits in accordance with ISO 19011 guidelines, and other best practices. In this comprehensive three-day course, you will learn the fundamental concepts and principles of internal auditing, the competence required for internal auditors, and how to effectively prepare, conduct, and follow up on internal audits.
This training course will enable you to establish and continually improve an internal audit program within your organization, ensuring compliance and effectiveness.
Who should attend?
This training course is intended for:
Internal auditors
Individuals carrying out roles and responsibilities related to the management system
Individuals involved in the auditing and maintaining a management system
Individuals seeking to become internal auditors or consultants involved in internal auditing
Individuals responsible for ensuring conformity with management system standards
Learning objectives
By the end of this training course, you will be able to:
Explain the fundamental concepts and principles of internal auditing
Establish, implement, monitor, review, and improve an internal audit program
Plan, conduct, and complete an internal audit following the ISO 19011 guidelines and other best practices
Education approach
This training course provides:
Theories, best approaches and practices used in establishing an internal audit program and performing internal audit activities
Interactions between the trainers and participants through questions and discussions
Quizzes with stand-alone questions and scenario-based quizzes, that will help you prepare for the certification exam
Prerequisites
Basic knowledge of the common structure and requirements of management system standards (MSSs)
Day 1: ISO 19011, principles of internal auditing, and competence of internal auditors
Day 2: Establishing the internal audit program and preparing internal audits
Day 3: Conducting and closing internal audits and undertaking follow-up activities
The “PECB Certified Management Systems Internal Auditor” exam fully meets the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains:
Domain 1: Fundamental internal audit concepts and principles
Domain 2: Managing an internal audit program and preparing internal audits
Domain 3: Planning, conducting, and closing an internal audit
For specific information about exam type, languages available, and other details, please visit the List of PECB Exams – PECB Help Center and Exam Rules and Policies | PECB.
You can apply for one of the credentials listed in the following table after passing the exam. You will receive a certificate once you fulfill all the requirements related to the selected credential.
For more information about the PECB certification process, please refer to the Certification Rules and Policies.
The requirements for PECB Certified Management Systems Internal Auditor certification are as follows:
Credential
Exam
Professional experience
MS audit/assessment experience
Other requirements
PECB Certified Management Systems Provisional Internal Auditor
PECB Certified Management Systems Internal Auditor exam
None
None
Signing the PECB Code of Ethics
PECB Certified Management Systems Internal Auditor
PECB Certified Management Systems Internal Auditor exam
Two years of general work experience; At least one year in the implementation, operation and/or auditing of management systems
At least 200 hours
Signing the PECB Code of Ethics
To be considered valid, the auditing activities should follow the best auditing practices and include activities such as:
Planning a management system internal audit
Managing an internal audit program
Leading an internal audit team
Conducting internal audit activities
Generating audit findings
Closing internal audit activities
Conducting internal audit follow-up activities
Certification fees and examination fees are included in the price of the training course.
Participants will be provided with over 300 pages of information, practical examples, and quizzes.
Participants who complete the training course will obtain an attestation of course completion worth 21 CPD (Continuing Profession Development) credits.
Candidates who have completed the training course but failed the exam are eligible to retake the exam once for free within a 12-month period from the initial date of the exam.
.ރ12,937.50–.ރ25,312.50Price range: .ރ12,937.50 through .ރ25,312.50
The Lead SOC 2 Analyst training course equips participants with the knowledge and skills necessary to support organizations in establishing and implementing security measures based on the SOC 2 requirements. These requirements are established by the American Institute of Certified Public Accountants (AICPA), specifying how service organizations should handle sensitive customer data based on five trust security services: security, availability, integrity, confidentiality, and privacy. In addition to earning proficiency in SOC 2, participants will also learn about the role of key stakeholders and the importance of working with other organizations to ensure effective compliance management and possess the necessary competencies to manage a SOC 2 implementation team.
Why should you attend?
In current the digital age, information security is a critical concern for most industries. SOC 2 compliance is crucial for organizations handling sensitive data and outsourcing key business operations. SOC 2 compliance demonstrates a commitment to data security and privacy. This training course equips participants with the skills to manage and mitigate information security risks, align with regulatory requirements, and build trust with clients and stakeholders.
Upon passing the exam, participants can apply for the “PECB Certified Lead SOC 2 Analyst” credential, showcasing their proficiency in effectively managing SOC 2 compliance and enhancing their ability to ensure the integrity and security of their organization’s information systems.
Who should attend?
This training course is intended for:
Managers or consultants seeking to expand their knowledge of SOC 2 compliance and controls
IT professionals and information security risk managers seeking to enhance their expertise in SOC 2 requirements and best practices
Compliance officers responsible for establishing, implementing, and managing SOC 2 compliance programs within their organizations
Members of audit and compliance teams involved in SOC 2 readiness assessments and internal audits
Professionals seeking to establish and manage effective information security and compliance controls that meet SOC 2 criteria
Executives and business leaders who must comprehend SOC 2 compliance to assist their company’s risk management and compliance programs
Security analysts and incident response coordinators tasked with ensuring the security, availability, processing integrity, confidentiality, and privacy of information systems
Learning objectives
By the end of this training course, you will be able to:
Explain the fundamental concepts and principles of the SOC 2 framework
Interpret the SOC 2 requirements from an analytical perspective
Initiate and plan the implementation of security measures based on SOC 2 requirements by utilizing PECB’s methodology and other best practices
Support an organization in operating, maintaining, and continually improving security measures based on SOC 2 requirements
Prepare an organization to undergo a SOC 2 certification audit
Educational approach
This training course combines theoretical concepts with best practices for implementing the SOC 2 framework.
The training course contains essay-type exercises and multiple-choice quizzes, some of which are scenario-based.
The participants are encouraged to interact and have meaningful discussions with each other while working on quizzes and exercises, creating a collaborative learning environment.
The quiz format closely mirrors that of the certification exam, ensuring participants are well-prepared for the exam.
Prerequisites
The main requirement for participating in this training is having general knowledge of information security practices, information systems and their security controls, compliance standards, and SOC 2 principles.
Building Digital Trust with SOC 2 Compliance
The Lead SOC 2 Analyst training course plays a crucial role in enhancing digital trust by equipping professionals with the necessary skills to implement and maintain SOC 2 compliance within an organization. This certification not only proves an organization’s commitment to securing data but also builds trust with clients, stakeholders, and regulatory bodies. The training course prepares participants to assess risks, align with SOC 2 requirements, and manage compliance programs effectively, ensuring that organizations can securely handle sensitive information and protect their reputations.
Day 1: Introduction to the SOC 2 framework
Day 2: Risk management and policy development
Day 3: Implementing SOC 2 controls and incident response
Day 4: Auditing, reporting, and continual improvement
Day 5: Certification exam
The “PECB Certified Lead SOC 2 Analyst” exam meets the PECB Examination and Certification Program (ECP) requirements. It covers the following competency domains:
Domain 1: Fundamental principles and concepts of SOC 2 Framework
Domain 2: SOC 2 criteria
Domain 3: Planning of SOC 2 requirements implementation
Domain 4: Implementation of SOC 2 requirements
Domain 5: Monitoring of security measures and preparing for SOC 2 certification audit
For specific information about the exam type, languages available, and other details, please visit the List of PECB Exams and Exam Rules and Policies.
After successfully passing the exam, you can apply for one of the credentials shown on the table below. You will receive a certification once you fulfill all the requirements of the selected credential.
Credential
Exam
Professional experience
soc2MS project experience
Other requirements
PECB Certified SOC 2 Provisional Analyst
PECB Lead SOC 2 Analyst exam
None
None
Signing the PECB Code of Ethics
PECB Certified SOC 2 Analyst
PECB Lead SOC 2 Analyst exam
Two years: One year of work experience in information security
200 hours
Signing the PECB Code of Ethics
PECB Certified Lead SOC 2 Analyst
PECB Lead SOC 2 Analyst exam
Five years: Two years of work experience in information security
300 hours
Signing the PECB Code of Ethics
PECB Certified Senior Lead SOC 2 Analyst
PECB Lead SOC 2 Analyst exam
Ten years: Seven years of work experience in information security
1,000 hours
Signing the PECB Code of Ethics
The SOC 2 project experience should follow best implementation practices and include the following:
Conducting a gap analysis on a SOC 2 program
Developing an information security policy
Assessing and treating information security risks
Implementing SOC 2 controls
Measuring and reporting SOC 2 performance and metrics
For more information about SOC 2 certifications and the PECB Certification process, please refer to Certification Rules and Policies.
Certification and examination fees are included in the price of the training course.
Participants will receive training course materials containing over 450 pages of information, practical examples, exercises, and quizzes.
An attestation of course completion worth 31 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
Candidates who have completed the training course but failed the exam are eligible to retake the exam once for free within 12 months from the initial exam date.
For additional information, please contact us at support@pecb.com or visit www.pecb.com.
The Lead SOC 2 Analyst training course equips participants with the knowledge and skills necessary to support organizations in establishing and implementing security measures based on the SOC 2 requirements. These requirements are established by the American Institute of Certified Public Accountants (AICPA), specifying how service organizations should handle sensitive customer data based on five trust security services: security, availability, integrity, confidentiality, and privacy. In addition to earning proficiency in SOC 2, participants will also learn about the role of key stakeholders and the importance of working with other organizations to ensure effective compliance management and possess the necessary competencies to manage a SOC 2 implementation team.
Why should you attend?
In current the digital age, information security is a critical concern for most industries. SOC 2 compliance is crucial for organizations handling sensitive data and outsourcing key business operations. SOC 2 compliance demonstrates a commitment to data security and privacy. This training course equips participants with the skills to manage and mitigate information security risks, align with regulatory requirements, and build trust with clients and stakeholders.
Upon passing the exam, participants can apply for the “PECB Certified Lead SOC 2 Analyst” credential, showcasing their proficiency in effectively managing SOC 2 compliance and enhancing their ability to ensure the integrity and security of their organization’s information systems.
Who should attend?
This training course is intended for:
Managers or consultants seeking to expand their knowledge of SOC 2 compliance and controls
IT professionals and information security risk managers seeking to enhance their expertise in SOC 2 requirements and best practices
Compliance officers responsible for establishing, implementing, and managing SOC 2 compliance programs within their organizations
Members of audit and compliance teams involved in SOC 2 readiness assessments and internal audits
Professionals seeking to establish and manage effective information security and compliance controls that meet SOC 2 criteria
Executives and business leaders who must comprehend SOC 2 compliance to assist their company’s risk management and compliance programs
Security analysts and incident response coordinators tasked with ensuring the security, availability, processing integrity, confidentiality, and privacy of information systems
Learning objectives
By the end of this training course, you will be able to:
Explain the fundamental concepts and principles of the SOC 2 framework
Interpret the SOC 2 requirements from an analytical perspective
Initiate and plan the implementation of security measures based on SOC 2 requirements by utilizing PECB’s methodology and other best practices
Support an organization in operating, maintaining, and continually improving security measures based on SOC 2 requirements
Prepare an organization to undergo a SOC 2 certification audit
Educational approach
This training course combines theoretical concepts with best practices for implementing the SOC 2 framework.
The training course contains essay-type exercises and multiple-choice quizzes, some of which are scenario-based.
The participants are encouraged to interact and have meaningful discussions with each other while working on quizzes and exercises, creating a collaborative learning environment.
The quiz format closely mirrors that of the certification exam, ensuring participants are well-prepared for the exam.
Prerequisites
The main requirement for participating in this training is having general knowledge of information security practices, information systems and their security controls, compliance standards, and SOC 2 principles.
Building Digital Trust with SOC 2 Compliance
The Lead SOC 2 Analyst training course plays a crucial role in enhancing digital trust by equipping professionals with the necessary skills to implement and maintain SOC 2 compliance within an organization. This certification not only proves an organization’s commitment to securing data but also builds trust with clients, stakeholders, and regulatory bodies. The training course prepares participants to assess risks, align with SOC 2 requirements, and manage compliance programs effectively, ensuring that organizations can securely handle sensitive information and protect their reputations.
Day 1: Introduction to the SOC 2 framework
Day 2: Risk management and policy development
Day 3: Implementing SOC 2 controls and incident response
Day 4: Auditing, reporting, and continual improvement
Day 5: Certification exam
The “PECB Certified Lead SOC 2 Analyst” exam meets the PECB Examination and Certification Program (ECP) requirements. It covers the following competency domains:
Domain 1: Fundamental principles and concepts of SOC 2 Framework
Domain 2: SOC 2 criteria
Domain 3: Planning of SOC 2 requirements implementation
Domain 4: Implementation of SOC 2 requirements
Domain 5: Monitoring of security measures and preparing for SOC 2 certification audit
For specific information about the exam type, languages available, and other details, please visit the List of PECB Exams and Exam Rules and Policies.
After successfully passing the exam, you can apply for one of the credentials shown on the table below. You will receive a certification once you fulfill all the requirements of the selected credential.
Credential
Exam
Professional experience
soc2MS project experience
Other requirements
PECB Certified SOC 2 Provisional Analyst
PECB Lead SOC 2 Analyst exam
None
None
Signing the PECB Code of Ethics
PECB Certified SOC 2 Analyst
PECB Lead SOC 2 Analyst exam
Two years: One year of work experience in information security
200 hours
Signing the PECB Code of Ethics
PECB Certified Lead SOC 2 Analyst
PECB Lead SOC 2 Analyst exam
Five years: Two years of work experience in information security
300 hours
Signing the PECB Code of Ethics
PECB Certified Senior Lead SOC 2 Analyst
PECB Lead SOC 2 Analyst exam
Ten years: Seven years of work experience in information security
1,000 hours
Signing the PECB Code of Ethics
The SOC 2 project experience should follow best implementation practices and include the following:
Conducting a gap analysis on a SOC 2 program
Developing an information security policy
Assessing and treating information security risks
Implementing SOC 2 controls
Measuring and reporting SOC 2 performance and metrics
For more information about SOC 2 certifications and the PECB Certification process, please refer to Certification Rules and Policies.
Certification and examination fees are included in the price of the training course.
Participants will receive training course materials containing over 450 pages of information, practical examples, exercises, and quizzes.
An attestation of course completion worth 31 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
Candidates who have completed the training course but failed the exam are eligible to retake the exam once for free within 12 months from the initial exam date.
The Cybersecurity Foundation training course offers an in-depth exploration of core cybersecurity principles and concepts aligned with industry best practices, such as ISO/IEC 27032 and NIST Cybersecurity Framework.
Why should you attend?
As cyber threats continue to increase, organizations worldwide are searching for individuals who thoroughly understand cybersecurity principles and concepts. The PECB Cybersecurity Foundation training course directly responds to this demand, equipping participants with the necessary knowledge to actively contribute to implementing and managing robust cybersecurity programs.
The PECB Cybersecurity Foundation training course covers fundamental concepts related to cybersecurity program implementation, attack mechanisms, threat mitigation measures, risk management, incident response best practices, and information sharing and coordination policies and procedures. By acquiring a comprehensive understanding of these aspects, participants will gain the required competencies to participate in cybersecurity management projects effectively.
Who should attend?
This training course is intended for:
Managers and consultants seeking to expand their cybersecurity knowledge
Professionals aiming to familiarize themselves with best practices in cybersecurity management
Individuals responsible for carrying out cybersecurity activities within their organization
Individuals interested in pursuing a career in cybersecurity
Learning objectives
Upon successfully completing the training course, participants will be able to:
Explain the fundamental cybersecurity concepts and principles
Identify the main standards and frameworks for cybersecurity, such as ISO/IEC 27032 and NIST Cybersecurity Framework
Explain approaches, methods, and techniques for ensuring cybersecurity
Educational approach
The training course includes diverse educational content, including practical exercises, multiple-choice quizzes, and illustrative demonstrations of cybersecurity best practices.
Participants are strongly encouraged to interact with one another, exchange ideas, and actively participate in discussions.
The quiz structure within the course closely mirrors that of the certificate exam, ensuring participants are well-prepared for the exam.
Prerequisites
There are no prerequisites to participate in this training course.
Day 1: Introduction to fundamental concepts of cybersecurity
Day 2: Cybersecurity program approaches and certificate exam
The “PECB Cybersecurity Foundation” exam fully meets all the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains:
Domain 1: Fundamental cybersecurity principles and concepts
Domain 2: Cybersecurity program
For specific information about exam type, languages available, and other details, please visit the List of PECB Exams and the Examination Rules and Policies.
After passing the exam, you can apply for the credential shown on the table below. The certificate requirements for Cybersecurity Foundation are:
Designation
Exam
Professional experience
MS audit/assessment experience
CSYMS project experience
Other requirements
PECB Certificate Holder in Cybersecurity Foundation
PECB the Cybersecurity Foundation Exam or equivalent
None
None
None
Signing the PECB Code of Ethics
Certificate and examination fees are included in the price of the training course.
Participants will receive comprehensive training materials, compromising more than 200 pages of content, including practical examples, exercises, and quizzes.
An attestation of course completion worth 14 CPD (Continuing Professional Development) credits will be issued to participants who have attended the training course.
Candidates who complete the training but do not pass the exam can retake the exam at no additional cost within a 12-month period from the initial exam date.
The Cybersecurity Foundation training course offers an in-depth exploration of core cybersecurity principles and concepts aligned with industry best practices, such as ISO/IEC 27032 and NIST Cybersecurity Framework.
Why should you attend?
As cyber threats continue to increase, organizations worldwide are searching for individuals who thoroughly understand cybersecurity principles and concepts. The PECB Cybersecurity Foundation training course directly responds to this demand, equipping participants with the necessary knowledge to actively contribute to implementing and managing robust cybersecurity programs.
The PECB Cybersecurity Foundation training course covers fundamental concepts related to cybersecurity program implementation, attack mechanisms, threat mitigation measures, risk management, incident response best practices, and information sharing and coordination policies and procedures. By acquiring a comprehensive understanding of these aspects, participants will gain the required competencies to participate in cybersecurity management projects effectively.
Who should attend?
This training course is intended for:
Managers and consultants seeking to expand their cybersecurity knowledge
Professionals aiming to familiarize themselves with best practices in cybersecurity management
Individuals responsible for carrying out cybersecurity activities within their organization
Individuals interested in pursuing a career in cybersecurity
Learning objectives
Upon successfully completing the training course, participants will be able to:
Explain the fundamental cybersecurity concepts and principles
Identify the main standards and frameworks for cybersecurity, such as ISO/IEC 27032 and NIST Cybersecurity Framework
Explain approaches, methods, and techniques for ensuring cybersecurity
Educational approach
The training course includes diverse educational content, including practical exercises, multiple-choice quizzes, and illustrative demonstrations of cybersecurity best practices.
Participants are strongly encouraged to interact with one another, exchange ideas, and actively participate in discussions.
The quiz structure within the course closely mirrors that of the certificate exam, ensuring participants are well-prepared for the exam.
Prerequisites
There are no prerequisites to participate in this training course.
Day 1: Introduction to fundamental concepts of cybersecurity
Day 2: Cybersecurity program approaches and certificate exam
The “PECB Cybersecurity Foundation” exam fully meets all the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains:
Domain 1: Fundamental cybersecurity principles and concepts
Domain 2: Cybersecurity program
For specific information about exam type, languages available, and other details, please visit the List of PECB Exams and the Examination Rules and Policies.
After passing the exam, you can apply for the credential shown on the table below. The certificate requirements for Cybersecurity Foundation are:
Designation
Exam
Professional experience
MS audit/assessment experience
CSYMS project experience
Other requirements
PECB Certificate Holder in Cybersecurity Foundation
PECB the Cybersecurity Foundation Exam or equivalent
None
None
None
Signing the PECB Code of Ethics
Certificate and examination fees are included in the price of the training course.
Participants will receive comprehensive training materials, compromising more than 200 pages of content, including practical examples, exercises, and quizzes.
An attestation of course completion worth 14 CPD (Continuing Professional Development) credits will be issued to participants who have attended the training course.
Candidates who complete the training but do not pass the exam can retake the exam at no additional cost within a 12-month period from the initial exam date.
The Certified NIS 2 Directive Lead Implementer training course enables participants to gain the necessary competencies to support organizations in effectively planning, implementing, managing, monitoring, and maintaining a cybersecurity program that meets the requirements of the NIS 2 Directive.
Why Should You Attend?
The importance of robust cybersecurity measures cannot be overstated, as organizations are increasingly facing all types of cyberattacks. The NIS 2 Directive is a legislation that has been designed to strengthen the cybersecurity posture of critical infrastructure sectors, including energy, transport, healthcare, and digital services.
By attending the NIS 2 Directive Lead Implementer training course, you gain in-depth knowledge of the directive’s requirements, implementation strategies, and best practices that protect critical infrastructure from cyber threats. Through interactive sessions and practical exercises, you will learn how to assess organization’s cybersecurity risks, develop robust incident response plans, and implement effective security measures to meet the requirements of NIS 2 Directive. Moreover, you will gain insights into industry standards and best practices that will enable you to stay up to date with the evolving threat landscape and implement cutting-edge cybersecurity solutions. After successfully completing this training course, you will become a trusted cybersecurity professional that possesses the expertise to navigate the complex landscape of critical cybersecurity infrastructure and contribute to the resilience of your organization and society as a whole.
After passing the exam, you can apply for the “PECB Certified NIS 2 Directive Lead Implementer” credential.
Who Should Attend?
This training course is intended for:
Cybersecurity professional seeking to gain a thorough understanding of the requirements of NIS 2 Directive and learn practical strategies to implement robust cybersecurity measures
IT managers and professionals aiming to gain insights on implementing secure systems and improve the resilience of critical systems
Government and regulatory officials responsible for enforcing the NIS 2 Directive
Learning Objectives
Upon successfully completing the training course, you will be able to:
Explain the fundamental concepts of NIS 2 Directive and its requirements
Obtain a thorough comprehension of the principles, strategies, methodologies, and tools necessary for implementing and efficiently managing a cybersecurity program in compliance with NIS 2 Directive
Learn how to interpret and implement NIS 2 Directive requirements in the specific context of an organization
Initiate and plan the implementation of NIS 2 Directive requirements, by utilizing PECB’s methodology and other best practices
Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a cybersecurity program in compliance with NIS 2 Directive
Educational Approach
The training course provides both theoretical concepts and practical examples regarding NIS 2 Directive requirements that will help you support organizations to meet the requirements of the directive.
The training course contains essay-type exercises and multiple-choice quizzes, some of which are scenario-based.
The participants are encouraged to interact with one another and engage in meaningful discussions when completing the quizzes and exercises.
The structure of quizzes is similar to that of the certification exam.
Prerequisites
The main requirements for participating in this training course are having a fundamental understanding of cybersecurity.
Building Digital Trust through the NIS 2 Directive Implementation
The NIS 2 Directive Lead Implementer training course is vital for building and maintaining digital trust in critical infrastructure sectors. By helping organizations strengthen their cybersecurity measures and comply with NIS 2 Directive requirements, this training course ensures that essential services like energy, healthcare, transport, and digital services remain resilient against cyber-attacks. Attaining the PECB Certified NIS 2 Directive Lead Implementer credential demonstrates expertise in managing the security of vital systems.
Day 1: Introduction to NIS 2 Directive and initiation of the NIS 2 Directive implementation
Day 2: Analysis of NIS 2 Directive compliance program, asset management, and risk management
Day 3: Cybersecurity controls, incident management, and crisis management
Day 4: Communication, testing, monitoring, and continual improvement in cybersecurity
Day 5: Certification exam
The “PECB Certified NIS 2 Directive Lead Implementer” exam meets all the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains:
Domain 1: Fundamental concepts and definitions of NIS 2 Directive
Domain 2: Planning of NIS 2 Directive requirements implementation
Domain 3: Cybersecurity roles and responsibilities and risk management
Domain 4: Cybersecurity controls, incident management, and crisis management
Domain 5: Communication and awareness
Domain 6: Testing and monitoring of a cybersecurity program
For specific information about the exam type, languages available, and other details, please visit the List of PECB Exams and Exam Rules and Policies.
After successfully completing the exam, you can apply for one of the credentials shown in the table below. You will receive a certificate once you fulfill all the requirements of the selected credential.
PECB Certified NIS 2 Directive Lead Implementer exam or equivalent
None
None
Signing the PECB Code of Ethics
PECB Certified NIS 2 Directive Implementer
PECB Certified NIS 2 Directive Lead Implementer exam or equivalent
Two years: One year in cybersecurity management
Project activities: at least 200 hours
Signing the PECB Code of Ethics
PECB Certified NIS 2 Directive Lead Implementer
PECB Certified NIS 2 Directive Lead Implementer exam or equivalent
Five years: Two years in cybersecurity management
Project activities: at least 300 hours
Signing the PECB Code of Ethics
PECB Certified NIS 2 Directive Senior Lead Implementer
PECB Certified NIS 2 Directive Lead Implementer exam or equivalent
Ten years: Seven years in cybersecurity management
Project activities: at least 1000 hours
Signing the PECB Code of Ethics
The cybersecurity management experience activities should follow best cybersecurity management practices and include the following:
Conducting comprehensive risk assessments specific to critical infrastructure systems
Managing incident response plans tailored to the requirements of the NIS 2 Directive
Implementing appropriate security measures and controls
Implementing metrics and performance indicators
Managing and responding to cybersecurity incidents
Conducting management reviews
Managing a cybersecurity team
For more information about NIS 2 Directive certifications and the PECB Certification process, please refer to Certification Rules and Policies.
Certification and examination fees are included in the price of the training course.
Participants will be provided with training course materials containing over 400 pages of information, practical examples, exercises, and quizzes.
An attestation of course completion worth 31 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
Candidates who have completed the training course but failed the exam are eligible to retake the exam once for free within a 12-month period from the initial date of the exam.
The Certified NIS 2 Directive Lead Implementer training course enables participants to gain the necessary competencies to support organizations in effectively planning, implementing, managing, monitoring, and maintaining a cybersecurity program that meets the requirements of the NIS 2 Directive.
Why Should You Attend?
The importance of robust cybersecurity measures cannot be overstated, as organizations are increasingly facing all types of cyberattacks. The NIS 2 Directive is a legislation that has been designed to strengthen the cybersecurity posture of critical infrastructure sectors, including energy, transport, healthcare, and digital services.
By attending the NIS 2 Directive Lead Implementer training course, you gain in-depth knowledge of the directive’s requirements, implementation strategies, and best practices that protect critical infrastructure from cyber threats. Through interactive sessions and practical exercises, you will learn how to assess organization’s cybersecurity risks, develop robust incident response plans, and implement effective security measures to meet the requirements of NIS 2 Directive. Moreover, you will gain insights into industry standards and best practices that will enable you to stay up to date with the evolving threat landscape and implement cutting-edge cybersecurity solutions. After successfully completing this training course, you will become a trusted cybersecurity professional that possesses the expertise to navigate the complex landscape of critical cybersecurity infrastructure and contribute to the resilience of your organization and society as a whole.
After passing the exam, you can apply for the “PECB Certified NIS 2 Directive Lead Implementer” credential.
Who Should Attend?
This training course is intended for:
Cybersecurity professional seeking to gain a thorough understanding of the requirements of NIS 2 Directive and learn practical strategies to implement robust cybersecurity measures
IT managers and professionals aiming to gain insights on implementing secure systems and improve the resilience of critical systems
Government and regulatory officials responsible for enforcing the NIS 2 Directive
Learning Objectives
Upon successfully completing the training course, you will be able to:
Explain the fundamental concepts of NIS 2 Directive and its requirements
Obtain a thorough comprehension of the principles, strategies, methodologies, and tools necessary for implementing and efficiently managing a cybersecurity program in compliance with NIS 2 Directive
Learn how to interpret and implement NIS 2 Directive requirements in the specific context of an organization
Initiate and plan the implementation of NIS 2 Directive requirements, by utilizing PECB’s methodology and other best practices
Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a cybersecurity program in compliance with NIS 2 Directive
Educational Approach
The training course provides both theoretical concepts and practical examples regarding NIS 2 Directive requirements that will help you support organizations to meet the requirements of the directive.
The training course contains essay-type exercises and multiple-choice quizzes, some of which are scenario-based.
The participants are encouraged to interact with one another and engage in meaningful discussions when completing the quizzes and exercises.
The structure of quizzes is similar to that of the certification exam.
Prerequisites
The main requirements for participating in this training course are having a fundamental understanding of cybersecurity.
Building Digital Trust through the NIS 2 Directive Implementation
The NIS 2 Directive Lead Implementer training course is vital for building and maintaining digital trust in critical infrastructure sectors. By helping organizations strengthen their cybersecurity measures and comply with NIS 2 Directive requirements, this training course ensures that essential services like energy, healthcare, transport, and digital services remain resilient against cyber-attacks. Attaining the PECB Certified NIS 2 Directive Lead Implementer credential demonstrates expertise in managing the security of vital systems.
Day 1: Introduction to NIS 2 Directive and initiation of the NIS 2 Directive implementation
Day 2: Analysis of NIS 2 Directive compliance program, asset management, and risk management
Day 3: Cybersecurity controls, incident management, and crisis management
Day 4: Communication, testing, monitoring, and continual improvement in cybersecurity
Day 5: Certification exam
The “PECB Certified NIS 2 Directive Lead Implementer” exam meets all the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains:
Domain 1: Fundamental concepts and definitions of NIS 2 Directive
Domain 2: Planning of NIS 2 Directive requirements implementation
Domain 3: Cybersecurity roles and responsibilities and risk management
Domain 4: Cybersecurity controls, incident management, and crisis management
Domain 5: Communication and awareness
Domain 6: Testing and monitoring of a cybersecurity program
For specific information about the exam type, languages available, and other details, please visit the List of PECB Exams and Exam Rules and Policies.
After successfully completing the exam, you can apply for one of the credentials shown in the table below. You will receive a certificate once you fulfill all the requirements of the selected credential.
PECB Certified NIS 2 Directive Lead Implementer exam or equivalent
None
None
Signing the PECB Code of Ethics
PECB Certified NIS 2 Directive Implementer
PECB Certified NIS 2 Directive Lead Implementer exam or equivalent
Two years: One year in cybersecurity management
Project activities: at least 200 hours
Signing the PECB Code of Ethics
PECB Certified NIS 2 Directive Lead Implementer
PECB Certified NIS 2 Directive Lead Implementer exam or equivalent
Five years: Two years in cybersecurity management
Project activities: at least 300 hours
Signing the PECB Code of Ethics
PECB Certified NIS 2 Directive Senior Lead Implementer
PECB Certified NIS 2 Directive Lead Implementer exam or equivalent
Ten years: Seven years in cybersecurity management
Project activities: at least 1000 hours
Signing the PECB Code of Ethics
The cybersecurity management experience activities should follow best cybersecurity management practices and include the following:
Conducting comprehensive risk assessments specific to critical infrastructure systems
Managing incident response plans tailored to the requirements of the NIS 2 Directive
Implementing appropriate security measures and controls
Implementing metrics and performance indicators
Managing and responding to cybersecurity incidents
Conducting management reviews
Managing a cybersecurity team
For more information about NIS 2 Directive certifications and the PECB Certification process, please refer to Certification Rules and Policies.
Certification and examination fees are included in the price of the training course.
Participants will be provided with training course materials containing over 400 pages of information, practical examples, exercises, and quizzes.
An attestation of course completion worth 31 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
Candidates who have completed the training course but failed the exam are eligible to retake the exam once for free within a 12-month period from the initial date of the exam.
The NIS 2 Directive Foundation training course outlines the essential insights necessary for understanding the requirements of NIS 2 Directive regarding cybersecurity measures. It provides the core concepts required to support organizations in the initial phases of planning, implementation, and management of cybersecurity programs.
Why Should You Attend?
The NIS 2 Directive Foundation training course provides an introduction to the NIS 2 Directive aiming to help organizations enhance their cybersecurity in the face of ever-emerging cyber threats. This legislation serves as a central role in strengthening cybersecurity within critical infrastructure sectors such as energy, transport, healthcare, and digital services. The PECB NIS 2 Directive Foundation training course covers the fundamental concepts related to the Directive’s requirements. It provides information that will help you understand the best practices for protecting critical infrastructure from cyber threats.
After attending the training course, you can take the exam, and if you successfully pass it, you can apply for a “PECB Certificate Holder in NIS 2 Directive Foundation” credential.
Who Can Attend?
Cybersecurity professional seeking to gain a fundamental understanding of the requirements of the NIS 2 Directive and learn practical strategies to implement robust cybersecurity measure
IT managers and professionals aiming to gain fundamental insights into implementing secure systems and improving the resilience of critical systems
Government and regulatory officials responsible for enforcing the NIS 2 Directive
Learning Objectives
This training course will help you:
Explain the fundamental concepts and definitions of NIS 2 Directive
Interpret the main requirements of the NIS 2 Directive for a cybersecurity program
Identify the approaches and techniques used for the implementation of NIS 2 requirements
Educational Approach
This training course includes diverse educational content, including practical exercises, multiple-choice quizzes, and illustrative demonstrations of NIS 2 Directive requirements.
Participants are strongly encouraged to interact with one other, share ideas, and actively participate in discussions.
The quiz structure within the course closely mirrors that of the certificate exam, ensuring participants are well-prepared for the exam.
Prerequisites
There are no prerequisites to participate in this training course.
Day 1: Introduction to fundamental concepts and definitions of NIS 2 Directive
Day 2: NIS 2 Directive requirements for the implementation of a cybersecurity program
The “PECB NIS 2 Directive Foundation” exam meets the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains:
Domain 1: Fundamental concepts and definitions of NIS 2 Directive
Domain 2: NIS 2 Directive requirements
Examination Rules and Policies.
After successfully passing the exam, you can apply for the credentials shown below. You will receive the certificate after passing the exam. For more information about NIS 2 Directive Foundation certifications and the PECB certification process, please refer to the Certification Rules and Policies.
The requirements for NIS 2 Directive Foundation certificate are as follows:
Designation
Exam
Professional experience
MS audit/assessment experience
NIS2MS project experience
Other requirements
PECB Certificate Holder in NIS 2 Directive Foundation
NIS 2 Directive Foundation exam
None
None
None
Signing the PECB Code of Ethics
Certification fees are included in the exam price.
Participants will receive the training course material containing over 200 pages of explanatory information, examples, best practices, exercises, and quizzes.
An attendance record worth 14 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
Candidates who complete the training but do not pass the exam can retake the exam at no additional cost within a 12-month period from the initial exam date.
The NIS 2 Directive Foundation training course outlines the essential insights necessary for understanding the requirements of NIS 2 Directive regarding cybersecurity measures. It provides the core concepts required to support organizations in the initial phases of planning, implementation, and management of cybersecurity programs.
Why Should You Attend?
The NIS 2 Directive Foundation training course provides an introduction to the NIS 2 Directive aiming to help organizations enhance their cybersecurity in the face of ever-emerging cyber threats. This legislation serves as a central role in strengthening cybersecurity within critical infrastructure sectors such as energy, transport, healthcare, and digital services. The PECB NIS 2 Directive Foundation training course covers the fundamental concepts related to the Directive’s requirements. It provides information that will help you understand the best practices for protecting critical infrastructure from cyber threats.
After attending the training course, you can take the exam, and if you successfully pass it, you can apply for a “PECB Certificate Holder in NIS 2 Directive Foundation” credential.
Who Can Attend?
Cybersecurity professional seeking to gain a fundamental understanding of the requirements of the NIS 2 Directive and learn practical strategies to implement robust cybersecurity measure
IT managers and professionals aiming to gain fundamental insights into implementing secure systems and improving the resilience of critical systems
Government and regulatory officials responsible for enforcing the NIS 2 Directive
Learning Objectives
This training course will help you:
Explain the fundamental concepts and definitions of NIS 2 Directive
Interpret the main requirements of the NIS 2 Directive for a cybersecurity program
Identify the approaches and techniques used for the implementation of NIS 2 requirements
Educational Approach
This training course includes diverse educational content, including practical exercises, multiple-choice quizzes, and illustrative demonstrations of NIS 2 Directive requirements.
Participants are strongly encouraged to interact with one other, share ideas, and actively participate in discussions.
The quiz structure within the course closely mirrors that of the certificate exam, ensuring participants are well-prepared for the exam.
Prerequisites
There are no prerequisites to participate in this training course.
Day 1: Introduction to fundamental concepts and definitions of NIS 2 Directive
Day 2: NIS 2 Directive requirements for the implementation of a cybersecurity program
The “PECB NIS 2 Directive Foundation” exam meets the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains:
Domain 1: Fundamental concepts and definitions of NIS 2 Directive
Domain 2: NIS 2 Directive requirements
Examination Rules and Policies.
After successfully passing the exam, you can apply for the credentials shown below. You will receive the certificate after passing the exam. For more information about NIS 2 Directive Foundation certifications and the PECB certification process, please refer to the Certification Rules and Policies.
The requirements for NIS 2 Directive Foundation certificate are as follows:
Designation
Exam
Professional experience
MS audit/assessment experience
NIS2MS project experience
Other requirements
PECB Certificate Holder in NIS 2 Directive Foundation
NIS 2 Directive Foundation exam
None
None
None
Signing the PECB Code of Ethics
Certification fees are included in the exam price.
Participants will receive the training course material containing over 200 pages of explanatory information, examples, best practices, exercises, and quizzes.
An attendance record worth 14 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
Candidates who complete the training but do not pass the exam can retake the exam at no additional cost within a 12-month period from the initial exam date.
EBIOS Risk Manager training course enables you to gain the necessary knowledge and develop the necessary competence to master risk management concepts and components related to all assets of relevance for Information Security based on the EBIOS method.
Based on practical exercises and case studies, you will have the opportunity to acquire the necessary skills to perform an optimal Information Security risk assessment and timely risk management by being familiar with its life cycle. This training fits perfectly in the framework of the ISO/IEC 27001 standard implementation process.
After mastering all the necessary concepts of risk assessment using the EBIOS method, you can sit for the exam and apply for a “PECB Certificate Holder in EBIOS Risk Manager” certificate. By holding a PECB Risk Manager Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support an organization in performing risk assessment based on the EBIOS method.
Who should attend?
Individuals seeking to learn and understand the basic concepts of Risk Management
Individuals participating in risk assessment activities using the EBIOS method
Managers seeking to understand the techniques for performing risk assessment based on the EBIOS method
Managers seeking to master the techniques for analyzing and communicating the results of a risk assessment based on the EBIOS method
Learning objectives
Understand the concepts and basic principles of risk management associated with the use of the EBIOS method
Understand the activities of the EBIOS method in order to follow the completion of studies (pilot, control, reframe) as a work master
Understand and explain the findings of an EBIOS study and its key deliverables
Acquire the necessary skills to carry out an EBIOS study
Acquire the necessary skills to manage security risks of an organization’s information systems
Develop the necessary skills to analyze and communicate the results of an EBIOS study
Educational approach
This training is based on both theory and best practices of risk assessment using the EBIOS method
Lecture sessions are illustrated with examples based on case studies
Practical exercises are based on case studies which include role playing and discussions
Practical exercises and examples are similar to the Certificate Exam
Prerequisites
A fundamental knowledge of risk management.
Day 1
Training course objectives and structure
Introduction to EBIOS RM method
Workshop 1 Scope and security baseline
Workshop 2 Risk origins
Day 2
Workshop 3 Strategic scenarios
Workshop 4 Operational scenarios
Workshop 5 Risk treatment
Closing of the training course
Day 3
Certificate exam
The “PECB EBIOS Risk Manager” exam fully meets the requirements of the PECB Examination and Certification Programme (ECP). The exam covers the following competency domains:
Domain 1: Fundamental principles and concepts of Information Security risk management process based on the EBIOS method
Domain 2: Information Security risk management framework based on the EBIOS method
Domain 3: Information Security risk assessment using the EBIOS method
For specific information about exam type, languages available, and other details, please visit the List of PECB Exams and the Examination Rules and Policies.
After successfully completing the exam, you can apply for the credential shown on the table below.
The certificate requirements for the EBIOS Risk Manager are:
Credential
Exam
Risk Management experience
Other requirements
PECB Certified EBIOS Provisional Risk Manager
PECB Certified EBIOS Risk Manager exam or equivalent
None
Signing the PECB Code of Ethics
PECB Certified EBIOS Risk Manager Confirmed
PECB Certified EBIOS Risk Manager exam or equivalent
• Follow an EBIOS Risk Manager training or have relevant professional experience of at least 2 years; and • Have followed a significant part of the EBIOS method in real conditions at least one in the three years preceding the certification request
Signing the PECB Code of Ethics
To be considered valid, these risk assessment activities should follow best implementation practices and include the following:
Defining a risk management approach
Designing and implementing an overall risk management process for an organization
Defining risk evaluation criteria
Performing risk assessment
Identifying assets, threats, existing controls, vulnerabilities and consequences (impacts)
Assessing consequences and incident likelihood
Evaluating risk treatment options
Performing a risk management review
Certificate and examination fees are included in the price of the training course
Training material containing over 200 pages of information and practical examples will be distributed
An attestation of course completion worth 21 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
In case of exam failure, you can retake the exam within 12 months for free
Why should you attend?
EBIOS Risk Manager training course enables you to gain the necessary knowledge and develop the necessary competence to master risk management concepts and components related to all assets of relevance for Information Security based on the EBIOS method.
Based on practical exercises and case studies, you will have the opportunity to acquire the necessary skills to perform an optimal Information Security risk assessment and timely risk management by being familiar with its life cycle. This training fits perfectly in the framework of the ISO/IEC 27001 standard implementation process.
After mastering all the necessary concepts of risk assessment using the EBIOS method, you can sit for the exam and apply for a “PECB Certificate Holder in EBIOS Risk Manager” certificate. By holding a PECB Risk Manager Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support an organization in performing risk assessment based on the EBIOS method.
Who should attend?
Individuals seeking to learn and understand the basic concepts of Risk Management
Individuals participating in risk assessment activities using the EBIOS method
Managers seeking to understand the techniques for performing risk assessment based on the EBIOS method
Managers seeking to master the techniques for analyzing and communicating the results of a risk assessment based on the EBIOS method
Learning objectives
Understand the concepts and basic principles of risk management associated with the use of the EBIOS method
Understand the activities of the EBIOS method in order to follow the completion of studies (pilot, control, reframe) as a work master
Understand and explain the findings of an EBIOS study and its key deliverables
Acquire the necessary skills to carry out an EBIOS study
Acquire the necessary skills to manage security risks of an organization’s information systems
Develop the necessary skills to analyze and communicate the results of an EBIOS study
Educational approach
This training is based on both theory and best practices of risk assessment using the EBIOS method
Lecture sessions are illustrated with examples based on case studies
Practical exercises are based on case studies which include role playing and discussions
Practical exercises and examples are similar to the Certificate Exam
Prerequisites
A fundamental knowledge of risk management.
Day 1
Training course objectives and structure
Introduction to EBIOS RM method
Workshop 1 Scope and security baseline
Workshop 2 Risk origins
Day 2
Workshop 3 Strategic scenarios
Workshop 4 Operational scenarios
Workshop 5 Risk treatment
Closing of the training course
Day 3
Certificate exam
The “PECB EBIOS Risk Manager” exam fully meets the requirements of the PECB Examination and Certification Programme (ECP). The exam covers the following competency domains:
Domain 1: Fundamental principles and concepts of Information Security risk management process based on the EBIOS method
Domain 2: Information Security risk management framework based on the EBIOS method
Domain 3: Information Security risk assessment using the EBIOS method
For specific information about exam type, languages available, and other details, please visit the List of PECB Exams and the Examination Rules and Policies.
After successfully completing the exam, you can apply for the credential shown on the table below.
The certificate requirements for the EBIOS Risk Manager are:
Credential
Exam
Risk Management experience
Other requirements
PECB Certified EBIOS Provisional Risk Manager
PECB Certified EBIOS Risk Manager exam or equivalent
None
Signing the PECB Code of Ethics
PECB Certified EBIOS Risk Manager Confirmed
PECB Certified EBIOS Risk Manager exam or equivalent
• Follow an EBIOS Risk Manager training or have relevant professional experience of at least 2 years; and • Have followed a significant part of the EBIOS method in real conditions at least one in the three years preceding the certification request
Signing the PECB Code of Ethics
To be considered valid, these risk assessment activities should follow best implementation practices and include the following:
Defining a risk management approach
Designing and implementing an overall risk management process for an organization
Defining risk evaluation criteria
Performing risk assessment
Identifying assets, threats, existing controls, vulnerabilities and consequences (impacts)
Assessing consequences and incident likelihood
Evaluating risk treatment options
Performing a risk management review
Certificate and examination fees are included in the price of the training course
Training material containing over 200 pages of information and practical examples will be distributed
An attestation of course completion worth 21 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
In case of exam failure, you can retake the exam within 12 months for free
.ރ11,812.50–.ރ20,812.50Price range: .ރ11,812.50 through .ރ20,812.50