PECB training courses are provided worldwide through authorized partners, we are one of them.
INFORMATION SECURITY
ISO/IEC 27001 Information Security Management System
Understand and implement an information security management system based on ISO/IEC 27001 standards.
ISO/IEC 27002 Information Security Controls
Learn about the best practices for information security controls as outlined in ISO/IEC 27002.
PECB Chief Information Security Officer (CISO)
Designed for individuals aiming to become Chief Information Security Officers, focusing on leadership and management skills in information security.
ISO/IEC 27035 Information Security Incident Management
Learn how to manage and respond to information security incidents effectively.
ISO/IEC 27005 Information Security Risk Management:
Gain knowledge on managing information security risks based on ISO/IEC 27005 standards.
CYBERSECURITY MANAGEMENT
Cybersecurity Management
Explore Course
Cloud Security
Explore Course
Penetration Testing Professional
Explore Course
Ethical Hacking
Explore Course
SCADA Security Manager
Explore Course
Computer Forensics
Explore Course
ISO/IEC 27033 Network Security
Explore Course
Certified Cyber Threat Analyst (CCTA)
Explore Course
TECHNICAL CYBERSECURITY
Ethical Hacking refers to the act of penetrating computer systems, networks or applications with the intention to exploit vulnerabilities that may lead to potential threats and risks. The main aim of Ethical Hacking is the improvement of the overall security of organizations by fixing the gaps and vulnerabilities found during penetration tests. Ethical hackers are allowed to use the same hacking techniques as malicious hackers with the permission of the organization which is to be tested.
A threat analyst is a cybersecurity professional specializing in the detection, analysis, and mitigation of cyber threats. This role is critical in safeguarding an organization’s digital infrastructure and sensitive information. Key activities of a threat analyst include threat analysis and threat hunting. Threat analysis involves the systematic examination of potential threats to identify their nature, origin, and potential impact. Threat hunters utilize sophisticated tools and techniques to uncover and minimize hidden threats before they cause significant damage.
CONTINUITY, RESILIENCE, AND RECOVERY
ISO 22301 Business Continuity Management Systems
Programme Details
BUY COURSE
Disaster Recovery
Programme Details
BUY COURSE
ISO 22317 Business Impact Analysis
Programme Details
BUY COURSE
Digital Operational Resilience Act (DORA)
Programme Details
BUY COURSE
Operational Resilience Management
Programme Details
BUY COURSE
Crisis Management - Training Course
Programme Details
BUY COURSE
CONTINUITY, RESILIENCE, AND RECOVERY
In an ever-evolving world characterized by the relentless progress of technology, the influence and importance of artificial intelligence have reached new heights. AI is set apart by its remarkable ability to transcend industry boundaries. It is not limited to a particular sector; instead, it possesses the capacity to trigger transformation across a wide range of industries.
The majority of industries have already started digital transformation, as it offers agility, flexibility, and easy growth. The fast adoption to digital transformation demands the role of a digital transformation officer. By becoming a certified digital transformation officer, you will introduce yourself to the digital transformation roadmap and acquire comprehensible knowledge on emerging technologies that help meet the changing business needs and expand the digital innovation landscape.
GOVERNANCE, RISK, AND COMPLIANCE
ISO 31000 Risk Management
ISO 37001 Anti-Bribery Management System
ISO 37301 Compliance Management System
ISO/IEC 38500 IT Governance
Operational Risk Management in Financial Institutions
Management Systems Internal Auditor