(RUB)
7445 Roper Rd NW, Edmonton, AB T6B 3K9, Canada
page-banner-shape-1
page-banner-shape-2

Archives: Shop

Sale Discount Up to 43%
Categories:

Why should you attend this training course?

The Certified Management Systems Internal Auditor training course is designed to provide the knowledge and skills needed for conducting and managing internal audits in accordance with ISO 19011 guidelines, and other best practices. In this comprehensive three-day course, you will learn the fundamental concepts and principles of internal auditing, the competence required for internal auditors, and how to effectively prepare, conduct, and follow up on internal audits. This training course will enable you to establish and continually improve an internal audit program within your organization, ensuring compliance and effectiveness.

Who should attend?

This training course is intended for:
  • Internal auditors
  • Individuals carrying out roles and responsibilities related to the management system
  • Individuals involved in the auditing and maintaining a management system
  • Individuals seeking to become internal auditors or consultants involved in internal auditing
  • Individuals responsible for ensuring conformity with management system standards

Learning objectives

By the end of this training course, you will be able to:
  • Explain the fundamental concepts and principles of internal auditing
  • Establish, implement, monitor, review, and improve an internal audit program
  • Plan, conduct, and complete an internal audit following the ISO 19011 guidelines and other best practices

Education approach

This training course provides:
  • Theories, best approaches and practices used in establishing an internal audit program and performing internal audit activities
  • Interactions between the trainers and participants through questions and discussions
  • Quizzes with stand-alone questions and scenario-based quizzes, that will help you prepare for the certification exam

Prerequisites

Basic knowledge of the common structure and requirements of management system standards (MSSs) Day 1: ISO 19011, principles of internal auditing, and competence of internal auditors Day 2: Establishing the internal audit program and preparing internal audits Day 3: Conducting and closing internal audits and undertaking follow-up activities The “PECB Certified Management Systems Internal Auditor” exam fully meets the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains: Domain 1: Fundamental internal audit concepts and principles Domain 2: Managing an internal audit program and preparing internal audits Domain 3: Planning, conducting, and closing an internal audit For specific information about exam type, languages available, and other details, please visit the List of PECB Exams – PECB Help Center and Exam Rules and Policies | PECB. You can apply for one of the credentials listed in the following table after passing the exam. You will receive a certificate once you fulfill all the requirements related to the selected credential. For more information about the PECB certification process, please refer to the Certification Rules and Policies. The requirements for PECB Certified Management Systems Internal Auditor certification are as follows:
Credential Exam Professional experience MS audit/assessment experience Other requirements
PECB Certified Management Systems Provisional Internal Auditor PECB Certified Management Systems Internal Auditor exam None None Signing the PECB Code of Ethics
PECB Certified Management Systems Internal Auditor PECB Certified Management Systems Internal Auditor exam Two years of general work experience; At least one year in the implementation, operation and/or auditing of management systems At least 200 hours Signing the PECB Code of Ethics
To be considered valid, the auditing activities should follow the best auditing practices and include activities such as:
  1. Planning a management system internal audit
  2. Managing an internal audit program
  3. Leading an internal audit team
  4. Conducting internal audit activities
  5. Generating audit findings
  6. Closing internal audit activities
  7. Conducting internal audit follow-up activities
  • Certification fees and examination fees are included in the price of the training course.
  • Participants will be provided with over 300 pages of information, practical examples, and quizzes.
  • Participants who complete the training course will obtain an attestation of course completion worth 21 CPD (Continuing Profession Development) credits.
  • Candidates who have completed the training course but failed the exam are eligible to retake the exam once for free within a 12-month period from the initial date of the exam.

Why should you attend this training course?

The Certified Management Systems Internal Auditor training course is designed to provide the knowledge and skills needed for conducting and managing internal audits in accordance with ISO 19011 guidelines, and other best practices. In this comprehensive three-day course, you will learn the fundamental concepts and principles of internal auditing, the competence required for internal auditors, and how to effectively prepare, conduct, and follow up on internal audits. This training course will enable you to establish and continually improve an internal audit program within your organization, ensuring compliance and effectiveness.

Who should attend?

This training course is intended for:
  • Internal auditors
  • Individuals carrying out roles and responsibilities related to the management system
  • Individuals involved in the auditing and maintaining a management system
  • Individuals seeking to become internal auditors or consultants involved in internal auditing
  • Individuals responsible for ensuring conformity with management system standards

Learning objectives

By the end of this training course, you will be able to:
  • Explain the fundamental concepts and principles of internal auditing
  • Establish, implement, monitor, review, and improve an internal audit program
  • Plan, conduct, and complete an internal audit following the ISO 19011 guidelines and other best practices

Education approach

This training course provides:
  • Theories, best approaches and practices used in establishing an internal audit program and performing internal audit activities
  • Interactions between the trainers and participants through questions and discussions
  • Quizzes with stand-alone questions and scenario-based quizzes, that will help you prepare for the certification exam

Prerequisites

Basic knowledge of the common structure and requirements of management system standards (MSSs) Day 1: ISO 19011, principles of internal auditing, and competence of internal auditors Day 2: Establishing the internal audit program and preparing internal audits Day 3: Conducting and closing internal audits and undertaking follow-up activities The “PECB Certified Management Systems Internal Auditor” exam fully meets the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains: Domain 1: Fundamental internal audit concepts and principles Domain 2: Managing an internal audit program and preparing internal audits Domain 3: Planning, conducting, and closing an internal audit For specific information about exam type, languages available, and other details, please visit the List of PECB Exams – PECB Help Center and Exam Rules and Policies | PECB. You can apply for one of the credentials listed in the following table after passing the exam. You will receive a certificate once you fulfill all the requirements related to the selected credential. For more information about the PECB certification process, please refer to the Certification Rules and Policies. The requirements for PECB Certified Management Systems Internal Auditor certification are as follows:
Credential Exam Professional experience MS audit/assessment experience Other requirements
PECB Certified Management Systems Provisional Internal Auditor PECB Certified Management Systems Internal Auditor exam None None Signing the PECB Code of Ethics
PECB Certified Management Systems Internal Auditor PECB Certified Management Systems Internal Auditor exam Two years of general work experience; At least one year in the implementation, operation and/or auditing of management systems At least 200 hours Signing the PECB Code of Ethics
To be considered valid, the auditing activities should follow the best auditing practices and include activities such as:
  1. Planning a management system internal audit
  2. Managing an internal audit program
  3. Leading an internal audit team
  4. Conducting internal audit activities
  5. Generating audit findings
  6. Closing internal audit activities
  7. Conducting internal audit follow-up activities
  • Certification fees and examination fees are included in the price of the training course.
  • Participants will be provided with over 300 pages of information, practical examples, and quizzes.
  • Participants who complete the training course will obtain an attestation of course completion worth 21 CPD (Continuing Profession Development) credits.
  • Candidates who have completed the training course but failed the exam are eligible to retake the exam once for free within a 12-month period from the initial date of the exam.

72,151 141,165Price range: ₽72,151 through ₽141,165

Sale Discount Up to 43%
The Lead SOC 2 Analyst training course equips participants with the knowledge and skills necessary to support organizations in establishing and implementing security measures based on the SOC 2 requirements. These requirements are established by the American Institute of Certified Public Accountants (AICPA), specifying how service organizations should handle sensitive customer data based on five trust security services: security, availability, integrity, confidentiality, and privacy. In addition to earning proficiency in SOC 2, participants will also learn about the role of key stakeholders and the importance of working with other organizations to ensure effective compliance management and possess the necessary competencies to manage a SOC 2 implementation team.

Why should you attend?

In current the digital age, information security is a critical concern for most industries. SOC 2 compliance is crucial for organizations handling sensitive data and outsourcing key business operations. SOC 2 compliance demonstrates a commitment to data security and privacy. This training course equips participants with the skills to manage and mitigate information security risks, align with regulatory requirements, and build trust with clients and stakeholders. Upon passing the exam, participants can apply for the “PECB Certified Lead SOC 2 Analyst” credential, showcasing their proficiency in effectively managing SOC 2 compliance and enhancing their ability to ensure the integrity and security of their organization’s information systems.

Who should attend?

This training course is intended for:
  • Managers or consultants seeking to expand their knowledge of SOC 2 compliance and controls
  • IT professionals and information security risk managers seeking to enhance their expertise in SOC 2 requirements and best practices
  • Compliance officers responsible for establishing, implementing, and managing SOC 2 compliance programs within their organizations
  • Members of audit and compliance teams involved in SOC 2 readiness assessments and internal audits
  • Professionals seeking to establish and manage effective information security and compliance controls that meet SOC 2 criteria
  • Executives and business leaders who must comprehend SOC 2 compliance to assist their company’s risk management and compliance programs
  • Security analysts and incident response coordinators tasked with ensuring the security, availability, processing integrity, confidentiality, and privacy of information systems

Learning objectives

By the end of this training course, you will be able to:
  • Explain the fundamental concepts and principles of the SOC 2 framework
  • Interpret the SOC 2 requirements from an analytical perspective
  • Initiate and plan the implementation of security measures based on SOC 2 requirements by utilizing PECB’s methodology and other best practices
  • Support an organization in operating, maintaining, and continually improving security measures based on SOC 2 requirements
  • Prepare an organization to undergo a SOC 2 certification audit

Educational approach

  • This training course combines theoretical concepts with best practices for implementing the SOC 2 framework.
  • The training course contains essay-type exercises and multiple-choice quizzes, some of which are scenario-based.
  • The participants are encouraged to interact and have meaningful discussions with each other while working on quizzes and exercises, creating a collaborative learning environment.
  • The quiz format closely mirrors that of the certification exam, ensuring participants are well-prepared for the exam.

Prerequisites

The main requirement for participating in this training is having general knowledge of information security practices, information systems and their security controls, compliance standards, and SOC 2 principles.

Building Digital Trust with SOC 2 Compliance

The Lead SOC 2 Analyst training course plays a crucial role in enhancing digital trust by equipping professionals with the necessary skills to implement and maintain SOC 2 compliance within an organization. This certification not only proves an organization’s commitment to securing data but also builds trust with clients, stakeholders, and regulatory bodies. The training course prepares participants to assess risks, align with SOC 2 requirements, and manage compliance programs effectively, ensuring that organizations can securely handle sensitive information and protect their reputations. Day 1: Introduction to the SOC 2 framework Day 2: Risk management and policy development Day 3: Implementing SOC 2 controls and incident response Day 4: Auditing, reporting, and continual improvement Day 5: Certification exam The “PECB Certified Lead SOC 2 Analyst” exam meets the PECB Examination and Certification Program (ECP) requirements. It covers the following competency domains: Domain 1: Fundamental principles and concepts of SOC 2 Framework Domain 2: SOC 2 criteria Domain 3: Planning of SOC 2 requirements implementation Domain 4: Implementation of SOC 2 requirements Domain 5: Monitoring of security measures and preparing for SOC 2 certification audit For specific information about the exam type, languages available, and other details, please visit the List of PECB Exams and Exam Rules and Policies. After successfully passing the exam, you can apply for one of the credentials shown on the table below. You will receive a certification once you fulfill all the requirements of the selected credential.
Credential Exam Professional experience soc2MS project experience Other requirements
PECB Certified SOC 2 Provisional Analyst PECB Lead SOC 2 Analyst exam None None Signing the PECB Code of Ethics
PECB Certified SOC 2 Analyst PECB Lead SOC 2 Analyst exam Two years: One year of work experience in information security 200 hours Signing the PECB Code of Ethics
PECB Certified Lead SOC 2 Analyst PECB Lead SOC 2 Analyst exam Five years: Two years of work experience in information security 300 hours Signing the PECB Code of Ethics
PECB Certified Senior Lead SOC 2 Analyst PECB Lead SOC 2 Analyst exam Ten years: Seven years of work experience in information security 1,000 hours Signing the PECB Code of Ethics
The SOC 2 project experience should follow best implementation practices and include the following:
  • Conducting a gap analysis on a SOC 2 program
  • Developing an information security policy
  • Assessing and treating information security risks
  • Implementing SOC 2 controls
  • Measuring and reporting SOC 2 performance and metrics
For more information about SOC 2 certifications and the PECB Certification process, please refer to Certification Rules and Policies.
  • Certification and examination fees are included in the price of the training course.
  • Participants will receive training course materials containing over 450 pages of information, practical examples, exercises, and quizzes.
  • An attestation of course completion worth 31 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
  • Candidates who have completed the training course but failed the exam are eligible to retake the exam once for free within 12 months from the initial exam date.
For additional information, please contact us at support@pecb.com or visit www.pecb.com. The Lead SOC 2 Analyst training course equips participants with the knowledge and skills necessary to support organizations in establishing and implementing security measures based on the SOC 2 requirements. These requirements are established by the American Institute of Certified Public Accountants (AICPA), specifying how service organizations should handle sensitive customer data based on five trust security services: security, availability, integrity, confidentiality, and privacy. In addition to earning proficiency in SOC 2, participants will also learn about the role of key stakeholders and the importance of working with other organizations to ensure effective compliance management and possess the necessary competencies to manage a SOC 2 implementation team.

Why should you attend?

In current the digital age, information security is a critical concern for most industries. SOC 2 compliance is crucial for organizations handling sensitive data and outsourcing key business operations. SOC 2 compliance demonstrates a commitment to data security and privacy. This training course equips participants with the skills to manage and mitigate information security risks, align with regulatory requirements, and build trust with clients and stakeholders. Upon passing the exam, participants can apply for the “PECB Certified Lead SOC 2 Analyst” credential, showcasing their proficiency in effectively managing SOC 2 compliance and enhancing their ability to ensure the integrity and security of their organization’s information systems.

Who should attend?

This training course is intended for:
  • Managers or consultants seeking to expand their knowledge of SOC 2 compliance and controls
  • IT professionals and information security risk managers seeking to enhance their expertise in SOC 2 requirements and best practices
  • Compliance officers responsible for establishing, implementing, and managing SOC 2 compliance programs within their organizations
  • Members of audit and compliance teams involved in SOC 2 readiness assessments and internal audits
  • Professionals seeking to establish and manage effective information security and compliance controls that meet SOC 2 criteria
  • Executives and business leaders who must comprehend SOC 2 compliance to assist their company’s risk management and compliance programs
  • Security analysts and incident response coordinators tasked with ensuring the security, availability, processing integrity, confidentiality, and privacy of information systems

Learning objectives

By the end of this training course, you will be able to:
  • Explain the fundamental concepts and principles of the SOC 2 framework
  • Interpret the SOC 2 requirements from an analytical perspective
  • Initiate and plan the implementation of security measures based on SOC 2 requirements by utilizing PECB’s methodology and other best practices
  • Support an organization in operating, maintaining, and continually improving security measures based on SOC 2 requirements
  • Prepare an organization to undergo a SOC 2 certification audit

Educational approach

  • This training course combines theoretical concepts with best practices for implementing the SOC 2 framework.
  • The training course contains essay-type exercises and multiple-choice quizzes, some of which are scenario-based.
  • The participants are encouraged to interact and have meaningful discussions with each other while working on quizzes and exercises, creating a collaborative learning environment.
  • The quiz format closely mirrors that of the certification exam, ensuring participants are well-prepared for the exam.

Prerequisites

The main requirement for participating in this training is having general knowledge of information security practices, information systems and their security controls, compliance standards, and SOC 2 principles.

Building Digital Trust with SOC 2 Compliance

The Lead SOC 2 Analyst training course plays a crucial role in enhancing digital trust by equipping professionals with the necessary skills to implement and maintain SOC 2 compliance within an organization. This certification not only proves an organization’s commitment to securing data but also builds trust with clients, stakeholders, and regulatory bodies. The training course prepares participants to assess risks, align with SOC 2 requirements, and manage compliance programs effectively, ensuring that organizations can securely handle sensitive information and protect their reputations. Day 1: Introduction to the SOC 2 framework Day 2: Risk management and policy development Day 3: Implementing SOC 2 controls and incident response Day 4: Auditing, reporting, and continual improvement Day 5: Certification exam The “PECB Certified Lead SOC 2 Analyst” exam meets the PECB Examination and Certification Program (ECP) requirements. It covers the following competency domains: Domain 1: Fundamental principles and concepts of SOC 2 Framework Domain 2: SOC 2 criteria Domain 3: Planning of SOC 2 requirements implementation Domain 4: Implementation of SOC 2 requirements Domain 5: Monitoring of security measures and preparing for SOC 2 certification audit For specific information about the exam type, languages available, and other details, please visit the List of PECB Exams and Exam Rules and Policies. After successfully passing the exam, you can apply for one of the credentials shown on the table below. You will receive a certification once you fulfill all the requirements of the selected credential.
Credential Exam Professional experience soc2MS project experience Other requirements
PECB Certified SOC 2 Provisional Analyst PECB Lead SOC 2 Analyst exam None None Signing the PECB Code of Ethics
PECB Certified SOC 2 Analyst PECB Lead SOC 2 Analyst exam Two years: One year of work experience in information security 200 hours Signing the PECB Code of Ethics
PECB Certified Lead SOC 2 Analyst PECB Lead SOC 2 Analyst exam Five years: Two years of work experience in information security 300 hours Signing the PECB Code of Ethics
PECB Certified Senior Lead SOC 2 Analyst PECB Lead SOC 2 Analyst exam Ten years: Seven years of work experience in information security 1,000 hours Signing the PECB Code of Ethics
The SOC 2 project experience should follow best implementation practices and include the following:
  • Conducting a gap analysis on a SOC 2 program
  • Developing an information security policy
  • Assessing and treating information security risks
  • Implementing SOC 2 controls
  • Measuring and reporting SOC 2 performance and metrics
For more information about SOC 2 certifications and the PECB Certification process, please refer to Certification Rules and Policies.
  • Certification and examination fees are included in the price of the training course.
  • Participants will receive training course materials containing over 450 pages of information, practical examples, exercises, and quizzes.
  • An attestation of course completion worth 31 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
  • Candidates who have completed the training course but failed the exam are eligible to retake the exam once for free within 12 months from the initial exam date.
For additional information, please contact us at support@pecb.com or visit www.pecb.com.

97,247 141,165Price range: ₽97,247 through ₽141,165

Sale Discount Up to 48%
The Cybersecurity Foundation training course offers an in-depth exploration of core cybersecurity principles and concepts aligned with industry best practices, such as ISO/IEC 27032 and NIST Cybersecurity Framework.

Why should you attend?

As cyber threats continue to increase, organizations worldwide are searching for individuals who thoroughly understand cybersecurity principles and concepts. The PECB Cybersecurity Foundation training course directly responds to this demand, equipping participants with the necessary knowledge to actively contribute to implementing and managing robust cybersecurity programs. The PECB Cybersecurity Foundation training course covers fundamental concepts related to cybersecurity program implementation, attack mechanisms, threat mitigation measures, risk management, incident response best practices, and information sharing and coordination policies and procedures. By acquiring a comprehensive understanding of these aspects, participants will gain the required competencies to participate in cybersecurity management projects effectively.

Who should attend?

This training course is intended for:
  • Managers and consultants seeking to expand their cybersecurity knowledge
  • Professionals aiming to familiarize themselves with best practices in cybersecurity management
  • Individuals responsible for carrying out cybersecurity activities within their organization
  • Individuals interested in pursuing a career in cybersecurity

Learning objectives

Upon successfully completing the training course, participants will be able to:
  • Explain the fundamental cybersecurity concepts and principles
  • Identify the main standards and frameworks for cybersecurity, such as ISO/IEC 27032 and NIST Cybersecurity Framework
  • Explain approaches, methods, and techniques for ensuring cybersecurity

Educational approach

  • The training course includes diverse educational content, including practical exercises, multiple-choice quizzes, and illustrative demonstrations of cybersecurity best practices.
  • Participants are strongly encouraged to interact with one another, exchange ideas, and actively participate in discussions.
  • The quiz structure within the course closely mirrors that of the certificate exam, ensuring participants are well-prepared for the exam.

Prerequisites

There are no prerequisites to participate in this training course. Day 1: Introduction to fundamental concepts of cybersecurity Day 2: Cybersecurity program approaches and certificate exam The “PECB Cybersecurity Foundation” exam fully meets all the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains: Domain 1: Fundamental cybersecurity principles and concepts Domain 2: Cybersecurity program For specific information about exam type, languages available, and other details, please visit the List of PECB Exams and the Examination Rules and Policies. After passing the exam, you can apply for the credential shown on the table below. The certificate requirements for Cybersecurity Foundation are:
Designation Exam Professional experience MS audit/assessment experience CSYMS project experience Other requirements
PECB Certificate Holder in Cybersecurity Foundation PECB the Cybersecurity Foundation Exam or equivalent None None None Signing the PECB Code of Ethics
    • Certificate and examination fees are included in the price of the training course.
    • Participants will receive comprehensive training materials, compromising more than 200 pages of content, including practical examples, exercises, and quizzes.
    • An attestation of course completion worth 14 CPD (Continuing Professional Development) credits will be issued to participants who have attended the training course.
    • Candidates who complete the training but do not pass the exam can retake the exam at no additional cost within a 12-month period from the initial exam date.
    For more information, please contact us at support@pecb.com or visit www.pecb.com.
The Cybersecurity Foundation training course offers an in-depth exploration of core cybersecurity principles and concepts aligned with industry best practices, such as ISO/IEC 27032 and NIST Cybersecurity Framework.

Why should you attend?

As cyber threats continue to increase, organizations worldwide are searching for individuals who thoroughly understand cybersecurity principles and concepts. The PECB Cybersecurity Foundation training course directly responds to this demand, equipping participants with the necessary knowledge to actively contribute to implementing and managing robust cybersecurity programs. The PECB Cybersecurity Foundation training course covers fundamental concepts related to cybersecurity program implementation, attack mechanisms, threat mitigation measures, risk management, incident response best practices, and information sharing and coordination policies and procedures. By acquiring a comprehensive understanding of these aspects, participants will gain the required competencies to participate in cybersecurity management projects effectively.

Who should attend?

This training course is intended for:
  • Managers and consultants seeking to expand their cybersecurity knowledge
  • Professionals aiming to familiarize themselves with best practices in cybersecurity management
  • Individuals responsible for carrying out cybersecurity activities within their organization
  • Individuals interested in pursuing a career in cybersecurity

Learning objectives

Upon successfully completing the training course, participants will be able to:
  • Explain the fundamental cybersecurity concepts and principles
  • Identify the main standards and frameworks for cybersecurity, such as ISO/IEC 27032 and NIST Cybersecurity Framework
  • Explain approaches, methods, and techniques for ensuring cybersecurity

Educational approach

  • The training course includes diverse educational content, including practical exercises, multiple-choice quizzes, and illustrative demonstrations of cybersecurity best practices.
  • Participants are strongly encouraged to interact with one another, exchange ideas, and actively participate in discussions.
  • The quiz structure within the course closely mirrors that of the certificate exam, ensuring participants are well-prepared for the exam.

Prerequisites

There are no prerequisites to participate in this training course. Day 1: Introduction to fundamental concepts of cybersecurity Day 2: Cybersecurity program approaches and certificate exam The “PECB Cybersecurity Foundation” exam fully meets all the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains: Domain 1: Fundamental cybersecurity principles and concepts Domain 2: Cybersecurity program For specific information about exam type, languages available, and other details, please visit the List of PECB Exams and the Examination Rules and Policies. After passing the exam, you can apply for the credential shown on the table below. The certificate requirements for Cybersecurity Foundation are:
Designation Exam Professional experience MS audit/assessment experience CSYMS project experience Other requirements
PECB Certificate Holder in Cybersecurity Foundation PECB the Cybersecurity Foundation Exam or equivalent None None None Signing the PECB Code of Ethics
    • Certificate and examination fees are included in the price of the training course.
    • Participants will receive comprehensive training materials, compromising more than 200 pages of content, including practical examples, exercises, and quizzes.
    • An attestation of course completion worth 14 CPD (Continuing Professional Development) credits will be issued to participants who have attended the training course.
    • Candidates who complete the training but do not pass the exam can retake the exam at no additional cost within a 12-month period from the initial exam date.
    For more information, please contact us at support@pecb.com or visit www.pecb.com.

47,055 97,247Price range: ₽47,055 through ₽97,247

Sale Discount Up to 43%
Categories:
The Certified NIS 2 Directive Lead Implementer training course enables participants to gain the necessary competencies to support organizations in effectively planning, implementing, managing, monitoring, and maintaining a cybersecurity program that meets the requirements of the NIS 2 Directive.

Why Should You Attend?

The importance of robust cybersecurity measures cannot be overstated, as organizations are increasingly facing all types of cyberattacks. The NIS 2 Directive is a legislation that has been designed to strengthen the cybersecurity posture of critical infrastructure sectors, including energy, transport, healthcare, and digital services. By attending the NIS 2 Directive Lead Implementer training course, you gain in-depth knowledge of the directive’s requirements, implementation strategies, and best practices that protect critical infrastructure from cyber threats. Through interactive sessions and practical exercises, you will learn how to assess organization’s cybersecurity risks, develop robust incident response plans, and implement effective security measures to meet the requirements of NIS 2 Directive. Moreover, you will gain insights into industry standards and best practices that will enable you to stay up to date with the evolving threat landscape and implement cutting-edge cybersecurity solutions. After successfully completing this training course, you will become a trusted cybersecurity professional that possesses the expertise to navigate the complex landscape of critical cybersecurity infrastructure and contribute to the resilience of your organization and society as a whole. After passing the exam, you can apply for the “PECB Certified NIS 2 Directive Lead Implementer” credential.

Who Should Attend?

This training course is intended for:
  • Cybersecurity professional seeking to gain a thorough understanding of the requirements of NIS 2 Directive and learn practical strategies to implement robust cybersecurity measures
  • IT managers and professionals aiming to gain insights on implementing secure systems and improve the resilience of critical systems
  • Government and regulatory officials responsible for enforcing the NIS 2 Directive

Learning Objectives

Upon successfully completing the training course, you will be able to:
  • Explain the fundamental concepts of NIS 2 Directive and its requirements
  • Obtain a thorough comprehension of the principles, strategies, methodologies, and tools necessary for implementing and efficiently managing a cybersecurity program in compliance with NIS 2 Directive
  • Learn how to interpret and implement NIS 2 Directive requirements in the specific context of an organization
  • Initiate and plan the implementation of NIS 2 Directive requirements, by utilizing PECB’s methodology and other best practices
  • Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a cybersecurity program in compliance with NIS 2 Directive

Educational Approach

  • The training course provides both theoretical concepts and practical examples regarding NIS 2 Directive requirements that will help you support organizations to meet the requirements of the directive.
  • The training course contains essay-type exercises and multiple-choice quizzes, some of which are scenario-based.
  • The participants are encouraged to interact with one another and engage in meaningful discussions when completing the quizzes and exercises.
  • The structure of quizzes is similar to that of the certification exam.

Prerequisites

The main requirements for participating in this training course are having a fundamental understanding of cybersecurity.

Building Digital Trust through the NIS 2 Directive Implementation

The NIS 2 Directive Lead Implementer training course is vital for building and maintaining digital trust in critical infrastructure sectors. By helping organizations strengthen their cybersecurity measures and comply with NIS 2 Directive requirements, this training course ensures that essential services like energy, healthcare, transport, and digital services remain resilient against cyber-attacks. Attaining the PECB Certified NIS 2 Directive Lead Implementer credential demonstrates expertise in managing the security of vital systems. Day 1: Introduction to NIS 2 Directive and initiation of the NIS 2 Directive implementation Day 2: Analysis of NIS 2 Directive compliance program, asset management, and risk management Day 3: Cybersecurity controls, incident management, and crisis management Day 4: Communication, testing, monitoring, and continual improvement in cybersecurity Day 5: Certification exam The “PECB Certified NIS 2 Directive Lead Implementer” exam meets all the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains: Domain 1: Fundamental concepts and definitions of NIS 2 Directive Domain 2: Planning of NIS 2 Directive requirements implementation Domain 3: Cybersecurity roles and responsibilities and risk management Domain 4: Cybersecurity controls, incident management, and crisis management Domain 5: Communication and awareness Domain 6: Testing and monitoring of a cybersecurity program For specific information about the exam type, languages available, and other details, please visit the List of PECB Exams and Exam Rules and Policies. After successfully completing the exam, you can apply for one of the credentials shown in the table below. You will receive a certificate once you fulfill all the requirements of the selected credential.
Credential Exam Professional experience NIS2MS project experience Other requirements
PECB Certified NIS 2 Directive Provisional Implementer PECB Certified NIS 2 Directive Lead Implementer exam or equivalent None None Signing the PECB Code of Ethics
PECB Certified NIS 2 Directive Implementer PECB Certified NIS 2 Directive Lead Implementer exam or equivalent Two years: One year in cybersecurity management Project activities: at least 200 hours Signing the PECB Code of Ethics
PECB Certified NIS 2 Directive Lead Implementer PECB Certified NIS 2 Directive Lead Implementer exam or equivalent Five years: Two years in cybersecurity management Project activities: at least 300 hours Signing the PECB Code of Ethics
PECB Certified NIS 2 Directive Senior Lead Implementer PECB Certified NIS 2 Directive Lead Implementer exam or equivalent Ten years: Seven years in cybersecurity management Project activities: at least 1000 hours Signing the PECB Code of Ethics
The cybersecurity management experience activities should follow best cybersecurity management practices and include the following:
  1. Conducting comprehensive risk assessments specific to critical infrastructure systems
  2. Managing incident response plans tailored to the requirements of the NIS 2 Directive
  3. Implementing appropriate security measures and controls
  4. Implementing metrics and performance indicators
  5. Managing and responding to cybersecurity incidents
  6. Conducting management reviews
  7. Managing a cybersecurity team
For more information about NIS 2 Directive certifications and the PECB Certification process, please refer to Certification Rules and Policies.
    • Certification and examination fees are included in the price of the training course.
    • Participants will be provided with training course materials containing over 400 pages of information, practical examples, exercises, and quizzes.
    • An attestation of course completion worth 31 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
    • Candidates who have completed the training course but failed the exam are eligible to retake the exam once for free within a 12-month period from the initial date of the exam.
    For additional information, please contact us at support@pecb.com, or visit www.pecb.com.
The Certified NIS 2 Directive Lead Implementer training course enables participants to gain the necessary competencies to support organizations in effectively planning, implementing, managing, monitoring, and maintaining a cybersecurity program that meets the requirements of the NIS 2 Directive.

Why Should You Attend?

The importance of robust cybersecurity measures cannot be overstated, as organizations are increasingly facing all types of cyberattacks. The NIS 2 Directive is a legislation that has been designed to strengthen the cybersecurity posture of critical infrastructure sectors, including energy, transport, healthcare, and digital services. By attending the NIS 2 Directive Lead Implementer training course, you gain in-depth knowledge of the directive’s requirements, implementation strategies, and best practices that protect critical infrastructure from cyber threats. Through interactive sessions and practical exercises, you will learn how to assess organization’s cybersecurity risks, develop robust incident response plans, and implement effective security measures to meet the requirements of NIS 2 Directive. Moreover, you will gain insights into industry standards and best practices that will enable you to stay up to date with the evolving threat landscape and implement cutting-edge cybersecurity solutions. After successfully completing this training course, you will become a trusted cybersecurity professional that possesses the expertise to navigate the complex landscape of critical cybersecurity infrastructure and contribute to the resilience of your organization and society as a whole. After passing the exam, you can apply for the “PECB Certified NIS 2 Directive Lead Implementer” credential.

Who Should Attend?

This training course is intended for:
  • Cybersecurity professional seeking to gain a thorough understanding of the requirements of NIS 2 Directive and learn practical strategies to implement robust cybersecurity measures
  • IT managers and professionals aiming to gain insights on implementing secure systems and improve the resilience of critical systems
  • Government and regulatory officials responsible for enforcing the NIS 2 Directive

Learning Objectives

Upon successfully completing the training course, you will be able to:
  • Explain the fundamental concepts of NIS 2 Directive and its requirements
  • Obtain a thorough comprehension of the principles, strategies, methodologies, and tools necessary for implementing and efficiently managing a cybersecurity program in compliance with NIS 2 Directive
  • Learn how to interpret and implement NIS 2 Directive requirements in the specific context of an organization
  • Initiate and plan the implementation of NIS 2 Directive requirements, by utilizing PECB’s methodology and other best practices
  • Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a cybersecurity program in compliance with NIS 2 Directive

Educational Approach

  • The training course provides both theoretical concepts and practical examples regarding NIS 2 Directive requirements that will help you support organizations to meet the requirements of the directive.
  • The training course contains essay-type exercises and multiple-choice quizzes, some of which are scenario-based.
  • The participants are encouraged to interact with one another and engage in meaningful discussions when completing the quizzes and exercises.
  • The structure of quizzes is similar to that of the certification exam.

Prerequisites

The main requirements for participating in this training course are having a fundamental understanding of cybersecurity.

Building Digital Trust through the NIS 2 Directive Implementation

The NIS 2 Directive Lead Implementer training course is vital for building and maintaining digital trust in critical infrastructure sectors. By helping organizations strengthen their cybersecurity measures and comply with NIS 2 Directive requirements, this training course ensures that essential services like energy, healthcare, transport, and digital services remain resilient against cyber-attacks. Attaining the PECB Certified NIS 2 Directive Lead Implementer credential demonstrates expertise in managing the security of vital systems. Day 1: Introduction to NIS 2 Directive and initiation of the NIS 2 Directive implementation Day 2: Analysis of NIS 2 Directive compliance program, asset management, and risk management Day 3: Cybersecurity controls, incident management, and crisis management Day 4: Communication, testing, monitoring, and continual improvement in cybersecurity Day 5: Certification exam The “PECB Certified NIS 2 Directive Lead Implementer” exam meets all the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains: Domain 1: Fundamental concepts and definitions of NIS 2 Directive Domain 2: Planning of NIS 2 Directive requirements implementation Domain 3: Cybersecurity roles and responsibilities and risk management Domain 4: Cybersecurity controls, incident management, and crisis management Domain 5: Communication and awareness Domain 6: Testing and monitoring of a cybersecurity program For specific information about the exam type, languages available, and other details, please visit the List of PECB Exams and Exam Rules and Policies. After successfully completing the exam, you can apply for one of the credentials shown in the table below. You will receive a certificate once you fulfill all the requirements of the selected credential.
Credential Exam Professional experience NIS2MS project experience Other requirements
PECB Certified NIS 2 Directive Provisional Implementer PECB Certified NIS 2 Directive Lead Implementer exam or equivalent None None Signing the PECB Code of Ethics
PECB Certified NIS 2 Directive Implementer PECB Certified NIS 2 Directive Lead Implementer exam or equivalent Two years: One year in cybersecurity management Project activities: at least 200 hours Signing the PECB Code of Ethics
PECB Certified NIS 2 Directive Lead Implementer PECB Certified NIS 2 Directive Lead Implementer exam or equivalent Five years: Two years in cybersecurity management Project activities: at least 300 hours Signing the PECB Code of Ethics
PECB Certified NIS 2 Directive Senior Lead Implementer PECB Certified NIS 2 Directive Lead Implementer exam or equivalent Ten years: Seven years in cybersecurity management Project activities: at least 1000 hours Signing the PECB Code of Ethics
The cybersecurity management experience activities should follow best cybersecurity management practices and include the following:
  1. Conducting comprehensive risk assessments specific to critical infrastructure systems
  2. Managing incident response plans tailored to the requirements of the NIS 2 Directive
  3. Implementing appropriate security measures and controls
  4. Implementing metrics and performance indicators
  5. Managing and responding to cybersecurity incidents
  6. Conducting management reviews
  7. Managing a cybersecurity team
For more information about NIS 2 Directive certifications and the PECB Certification process, please refer to Certification Rules and Policies.
    • Certification and examination fees are included in the price of the training course.
    • Participants will be provided with training course materials containing over 400 pages of information, practical examples, exercises, and quizzes.
    • An attestation of course completion worth 31 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
    • Candidates who have completed the training course but failed the exam are eligible to retake the exam once for free within a 12-month period from the initial date of the exam.
    For additional information, please contact us at support@pecb.com, or visit www.pecb.com.

72,088.26 141,165Price range: ₽72,088.26 through ₽141,165

Sale Discount Up to 39%
Categories:
The NIS 2 Directive Foundation training course outlines the essential insights necessary for understanding the requirements of NIS 2 Directive regarding cybersecurity measures. It provides the core concepts required to support organizations in the initial phases of planning, implementation, and management of cybersecurity programs.

Why Should You Attend?

The NIS 2 Directive Foundation training course provides an introduction to the NIS 2 Directive aiming to help organizations enhance their cybersecurity in the face of ever-emerging cyber threats. This legislation serves as a central role in strengthening cybersecurity within critical infrastructure sectors such as energy, transport, healthcare, and digital services. The PECB NIS 2 Directive Foundation training course covers the fundamental concepts related to the Directive’s requirements. It provides information that will help you understand the best practices for protecting critical infrastructure from cyber threats. After attending the training course, you can take the exam, and if you successfully pass it, you can apply for a “PECB Certificate Holder in NIS 2 Directive Foundation” credential.

Who Can Attend?

  • Cybersecurity professional seeking to gain a fundamental understanding of the requirements of the NIS 2 Directive and learn practical strategies to implement robust cybersecurity measure
  • IT managers and professionals aiming to gain fundamental insights into implementing secure systems and improving the resilience of critical systems
  • Government and regulatory officials responsible for enforcing the NIS 2 Directive

Learning Objectives

This training course will help you:
  • Explain the fundamental concepts and definitions of NIS 2 Directive
  • Interpret the main requirements of the NIS 2 Directive for a cybersecurity program
  • Identify the approaches and techniques used for the implementation of NIS 2 requirements

Educational Approach

  • This training course includes diverse educational content, including practical exercises, multiple-choice quizzes, and illustrative demonstrations of NIS 2 Directive requirements.
  • Participants are strongly encouraged to interact with one other, share ideas, and actively participate in discussions.
  • The quiz structure within the course closely mirrors that of the certificate exam, ensuring participants are well-prepared for the exam.

Prerequisites

There are no prerequisites to participate in this training course. Day 1: Introduction to fundamental concepts and definitions of NIS 2 Directive Day 2: NIS 2 Directive requirements for the implementation of a cybersecurity program The “PECB NIS 2 Directive Foundation” exam meets the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains: Domain 1: Fundamental concepts and definitions of NIS 2 Directive Domain 2: NIS 2 Directive requirements Examination Rules and Policies. After successfully passing the exam, you can apply for the credentials shown below. You will receive the certificate after passing the exam. For more information about NIS 2 Directive Foundation certifications and the PECB certification process, please refer to the Certification Rules and Policies. The requirements for NIS 2 Directive Foundation certificate are as follows:
Designation Exam Professional experience MS audit/assessment experience NIS2MS project experience Other requirements
PECB Certificate Holder in NIS 2 Directive Foundation NIS 2 Directive Foundation exam None None None Signing the PECB Code of Ethics
    • Certification fees are included in the exam price.
    • Participants will receive the training course material containing over 200 pages of explanatory information, examples, best practices, exercises, and quizzes.
    • An attendance record worth 14 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
    • Candidates who complete the training but do not pass the exam can retake the exam at no additional cost within a 12-month period from the initial exam date.
    For additional information, please contact us at support@pecb.com, or visit www.pecb.com
The NIS 2 Directive Foundation training course outlines the essential insights necessary for understanding the requirements of NIS 2 Directive regarding cybersecurity measures. It provides the core concepts required to support organizations in the initial phases of planning, implementation, and management of cybersecurity programs.

Why Should You Attend?

The NIS 2 Directive Foundation training course provides an introduction to the NIS 2 Directive aiming to help organizations enhance their cybersecurity in the face of ever-emerging cyber threats. This legislation serves as a central role in strengthening cybersecurity within critical infrastructure sectors such as energy, transport, healthcare, and digital services. The PECB NIS 2 Directive Foundation training course covers the fundamental concepts related to the Directive’s requirements. It provides information that will help you understand the best practices for protecting critical infrastructure from cyber threats. After attending the training course, you can take the exam, and if you successfully pass it, you can apply for a “PECB Certificate Holder in NIS 2 Directive Foundation” credential.

Who Can Attend?

  • Cybersecurity professional seeking to gain a fundamental understanding of the requirements of the NIS 2 Directive and learn practical strategies to implement robust cybersecurity measure
  • IT managers and professionals aiming to gain fundamental insights into implementing secure systems and improving the resilience of critical systems
  • Government and regulatory officials responsible for enforcing the NIS 2 Directive

Learning Objectives

This training course will help you:
  • Explain the fundamental concepts and definitions of NIS 2 Directive
  • Interpret the main requirements of the NIS 2 Directive for a cybersecurity program
  • Identify the approaches and techniques used for the implementation of NIS 2 requirements

Educational Approach

  • This training course includes diverse educational content, including practical exercises, multiple-choice quizzes, and illustrative demonstrations of NIS 2 Directive requirements.
  • Participants are strongly encouraged to interact with one other, share ideas, and actively participate in discussions.
  • The quiz structure within the course closely mirrors that of the certificate exam, ensuring participants are well-prepared for the exam.

Prerequisites

There are no prerequisites to participate in this training course. Day 1: Introduction to fundamental concepts and definitions of NIS 2 Directive Day 2: NIS 2 Directive requirements for the implementation of a cybersecurity program The “PECB NIS 2 Directive Foundation” exam meets the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains: Domain 1: Fundamental concepts and definitions of NIS 2 Directive Domain 2: NIS 2 Directive requirements Examination Rules and Policies. After successfully passing the exam, you can apply for the credentials shown below. You will receive the certificate after passing the exam. For more information about NIS 2 Directive Foundation certifications and the PECB certification process, please refer to the Certification Rules and Policies. The requirements for NIS 2 Directive Foundation certificate are as follows:
Designation Exam Professional experience MS audit/assessment experience NIS2MS project experience Other requirements
PECB Certificate Holder in NIS 2 Directive Foundation NIS 2 Directive Foundation exam None None None Signing the PECB Code of Ethics
    • Certification fees are included in the exam price.
    • Participants will receive the training course material containing over 200 pages of explanatory information, examples, best practices, exercises, and quizzes.
    • An attendance record worth 14 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
    • Candidates who complete the training but do not pass the exam can retake the exam at no additional cost within a 12-month period from the initial exam date.
    For additional information, please contact us at support@pecb.com, or visit www.pecb.com

47,055 97,247Price range: ₽47,055 through ₽97,247

Sale Discount Up to 42%
Categories:

Why should you attend?

EBIOS Risk Manager training course enables you to gain the necessary knowledge and develop the necessary competence to master risk management concepts and components related to all assets of relevance for Information Security based on the EBIOS method. Based on practical exercises and case studies, you will have the opportunity to acquire the necessary skills to perform an optimal Information Security risk assessment and timely risk management by being familiar with its life cycle. This training fits perfectly in the framework of the ISO/IEC 27001 standard implementation process. After mastering all the necessary concepts of risk assessment using the EBIOS method, you can sit for the exam and apply for a “PECB Certificate Holder in EBIOS Risk Manager” certificate. By holding a PECB Risk Manager Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support an organization in performing risk assessment based on the EBIOS method.

Who should attend?

  • Individuals seeking to learn and understand the basic concepts of Risk Management
  • Individuals participating in risk assessment activities using the EBIOS method
  • Managers seeking to understand the techniques for performing risk assessment based on the EBIOS method
  • Managers seeking to master the techniques for analyzing and communicating the results of a risk assessment based on the EBIOS method

Learning objectives

  • Understand the concepts and basic principles of risk management associated with the use of the EBIOS method
  • Understand the activities of the EBIOS method in order to follow the completion of studies (pilot, control, reframe) as a work master
  • Understand and explain the findings of an EBIOS study and its key deliverables
  • Acquire the necessary skills to carry out an EBIOS study
  • Acquire the necessary skills to manage security risks of an organization’s information systems
  • Develop the necessary skills to analyze and communicate the results of an EBIOS study

Educational approach

  • This training is based on both theory and best practices of risk assessment using the EBIOS method
  • Lecture sessions are illustrated with examples based on case studies
  • Practical exercises are based on case studies which include role playing and discussions
  • Practical exercises and examples are similar to the Certificate Exam

Prerequisites

A fundamental knowledge of risk management. Day 1
  • Training course objectives and structure
  • Introduction to EBIOS RM method
  • Workshop 1 Scope and security baseline
  • Workshop 2 Risk origins
Day 2
  • Workshop 3 Strategic scenarios
  • Workshop 4 Operational scenarios
  • Workshop 5 Risk treatment
  • Closing of the training course
Day 3
  • Certificate exam
The “PECB EBIOS Risk Manager” exam fully meets the requirements of the PECB Examination and Certification Programme (ECP). The exam covers the following competency domains: Domain 1: Fundamental principles and concepts of Information Security risk management process based on the EBIOS method Domain 2: Information Security risk management framework based on the EBIOS method Domain 3: Information Security risk assessment using the EBIOS method For specific information about exam type, languages available, and other details, please visit the List of PECB Exams and the Examination Rules and Policies. After successfully completing the exam, you can apply for the credential shown on the table below. The certificate requirements for the EBIOS Risk Manager are:
Credential Exam Risk Management experience Other requirements
PECB Certified EBIOS Provisional Risk Manager PECB Certified EBIOS Risk Manager exam or equivalent None Signing the PECB Code of Ethics
PECB Certified EBIOS Risk Manager Confirmed PECB Certified EBIOS Risk Manager exam or equivalent • Follow an EBIOS Risk Manager training or have relevant professional experience of at least 2 years; and • Have followed a significant part of the EBIOS method in real conditions at least one in the three years preceding the certification request Signing the PECB Code of Ethics
To be considered valid, these risk assessment activities should follow best implementation practices and include the following:
  1. Defining a risk management approach
  2. Designing and implementing an overall risk management process for an organization
  3. Defining risk evaluation criteria
  4. Performing risk assessment
  5. Identifying assets, threats, existing controls, vulnerabilities and consequences (impacts)
  6. Assessing consequences and incident likelihood
  7. Evaluating risk treatment options
  8. Performing a risk management review
  • Certificate and examination fees are included in the price of the training course
  • Training material containing over 200 pages of information and practical examples will be distributed
  • An attestation of course completion worth 21 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
  • In case of exam failure, you can retake the exam within 12 months for free

Why should you attend?

EBIOS Risk Manager training course enables you to gain the necessary knowledge and develop the necessary competence to master risk management concepts and components related to all assets of relevance for Information Security based on the EBIOS method. Based on practical exercises and case studies, you will have the opportunity to acquire the necessary skills to perform an optimal Information Security risk assessment and timely risk management by being familiar with its life cycle. This training fits perfectly in the framework of the ISO/IEC 27001 standard implementation process. After mastering all the necessary concepts of risk assessment using the EBIOS method, you can sit for the exam and apply for a “PECB Certificate Holder in EBIOS Risk Manager” certificate. By holding a PECB Risk Manager Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support an organization in performing risk assessment based on the EBIOS method.

Who should attend?

  • Individuals seeking to learn and understand the basic concepts of Risk Management
  • Individuals participating in risk assessment activities using the EBIOS method
  • Managers seeking to understand the techniques for performing risk assessment based on the EBIOS method
  • Managers seeking to master the techniques for analyzing and communicating the results of a risk assessment based on the EBIOS method

Learning objectives

  • Understand the concepts and basic principles of risk management associated with the use of the EBIOS method
  • Understand the activities of the EBIOS method in order to follow the completion of studies (pilot, control, reframe) as a work master
  • Understand and explain the findings of an EBIOS study and its key deliverables
  • Acquire the necessary skills to carry out an EBIOS study
  • Acquire the necessary skills to manage security risks of an organization’s information systems
  • Develop the necessary skills to analyze and communicate the results of an EBIOS study

Educational approach

  • This training is based on both theory and best practices of risk assessment using the EBIOS method
  • Lecture sessions are illustrated with examples based on case studies
  • Practical exercises are based on case studies which include role playing and discussions
  • Practical exercises and examples are similar to the Certificate Exam

Prerequisites

A fundamental knowledge of risk management. Day 1
  • Training course objectives and structure
  • Introduction to EBIOS RM method
  • Workshop 1 Scope and security baseline
  • Workshop 2 Risk origins
Day 2
  • Workshop 3 Strategic scenarios
  • Workshop 4 Operational scenarios
  • Workshop 5 Risk treatment
  • Closing of the training course
Day 3
  • Certificate exam
The “PECB EBIOS Risk Manager” exam fully meets the requirements of the PECB Examination and Certification Programme (ECP). The exam covers the following competency domains: Domain 1: Fundamental principles and concepts of Information Security risk management process based on the EBIOS method Domain 2: Information Security risk management framework based on the EBIOS method Domain 3: Information Security risk assessment using the EBIOS method For specific information about exam type, languages available, and other details, please visit the List of PECB Exams and the Examination Rules and Policies. After successfully completing the exam, you can apply for the credential shown on the table below. The certificate requirements for the EBIOS Risk Manager are:
Credential Exam Risk Management experience Other requirements
PECB Certified EBIOS Provisional Risk Manager PECB Certified EBIOS Risk Manager exam or equivalent None Signing the PECB Code of Ethics
PECB Certified EBIOS Risk Manager Confirmed PECB Certified EBIOS Risk Manager exam or equivalent • Follow an EBIOS Risk Manager training or have relevant professional experience of at least 2 years; and • Have followed a significant part of the EBIOS method in real conditions at least one in the three years preceding the certification request Signing the PECB Code of Ethics
To be considered valid, these risk assessment activities should follow best implementation practices and include the following:
  1. Defining a risk management approach
  2. Designing and implementing an overall risk management process for an organization
  3. Defining risk evaluation criteria
  4. Performing risk assessment
  5. Identifying assets, threats, existing controls, vulnerabilities and consequences (impacts)
  6. Assessing consequences and incident likelihood
  7. Evaluating risk treatment options
  8. Performing a risk management review
  • Certificate and examination fees are included in the price of the training course
  • Training material containing over 200 pages of information and practical examples will be distributed
  • An attestation of course completion worth 21 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
  • In case of exam failure, you can retake the exam within 12 months for free

65,877 116,069Price range: ₽65,877 through ₽116,069

Save 50% Today! Enroll in "ISO/IEC 27002 Lead Manager – Training Courses" now and take advantage of our special offer.