A remote lab environment that enables hands on practice in actual software applications using only a browser and internet connection Scenarios aligned with CompTIA exam objectives License valid for 12 months
Student Guide for Instructor-led Training – eBook (CAS-003) Comprehensive study material with 100% coverage of the exam objectives Includes videos and practice questions Once redeemed, eBook access will be valid for 12 months
A remote lab environment that enables hands on practice in actual software applications using only a browser and internet connection Scenarios aligned with CompTIA exam objectives License valid for 12 months
Student Guide for Instructor-led Training – eBook (CS0-002) Comprehensive study material with 100% coverage of the exam objectives Includes videos and practice questions Once redeemed, eBook access will be valid for 12 months
A remote lab environment that enables hands on practice in actual software applications using only a browser and internet connection Scenarios aligned with CompTIA exam objectives License valid for 12 months
Student Guide for Instructor-led Training – eBook (PT0-001) Comprehensive study material with 100% coverage of the exam objectives Includes videos and practice questions Once redeemed, eBook access will be valid for 12 months
A remote lab environment that enables hands on practice in actual software applications using only a browser and internet connection Gradable hands-on assessments provide an accurate picture of your ability to correctly and efficiently perform job tasks Browser-based labs require only a reliable internet connection and modern browser, with no special equipment License valid for 12 months
Student Guide for Instructor-led Training – eBook (SY0-601) Comprehensive study material with 100% coverage of the exam objectives Includes videos and practice questions Once redeemed, eBook access will be valid for 12 months
Given the increasing number of disruptions and the unpredictability of disasters of any kind (natural, occupational, information security), organizations nowadays are aiming at getting certified against ISO 22301 in order to show commitment toward business continuity and ensure that disruptive incidents are detected and properly addressed, thus the management system is continually improved. By becoming a PECB certified auditor, you will achieve a formal and independent recognition of your personal competences, and you qualify yourself to conduct BCMS audits for a certification body.
No two disasters in the world cause equal damage. Between the unpredictability of natural disasters, information security breaches, and incidents of different nature, preparedness can make you stand out in the crowd and predict the future of your business. In light of this, proper planning is essential to mitigating risks, avoiding consequences, coping with the negative effects of disasters and incidents, but at the same time, continuing your daily operations so that customer needs do not remain unfulfilled.
EBIOS Risk Manager training enables you to gain the necessary knowledge and develop the necessary competence to master risk management concepts and components related to all assets of relevance for Information Security based on the EBIOS method.
This training course is designed to help participants understand the fundamental concepts and principles of a business continuity management system (BCMS) based on ISO 22301. By attending this training course, participants will learn more about the structure and requirements of the standard including the BCMS policy, the top management’s commitment, internal audit, management review, and continual improvement process.
ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
ISO/IEC 27001 Lead Implementer training course enables participants to acquire the knowledge necessary to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an information security management system (ISMS).
ISO/IEC 27002 Introduction training course enables you to comprehend the Information Security Management Systems and Information Security Controls as specified in ISO/IEC 27002.
ISO/IEC 27002 Lead Manager training enables you to develop the necessary expertise and knowledge to support an organization in implementing and managing Information Security controls as specified in ISO/IEC 27002.
ISO/IEC 27002 Manager training enables you to acquire the necessary knowledge to support an organization in implementing and managing Information Security Controls based on ISO/IEC 27002. During this training course, you will also gain a thorough understanding of best practices of Information Security Controls.
ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001. During this training course, you will be able to understand the different modules of ISMS, including ISMS policy, procedures, performance measurements, management commitment, internal audit, management review and continual improvement.
ISO/IEC 27002 Foundation training enables you to learn the basic elements to implement Information Security Controls as specified in ISO/IEC 27002. During this training course, you will be able to understand how ISO/IEC 27001 and ISO/IEC 27002 are related to ISO/IEC 27003 (Guidelines for the implementation of ISMS), ISO/IEC 27004 (Measurement of Information Security) and ISO/IEC 27005 (Risk Management in Information Security).
ISO/IEC 27005 Foundation training course enables the participants understand the fundamental concepts and principles of information security risk management based on ISO/IEC 27005.
ISO/IEC 27005 training course enables you to comprehend the basic concepts of Information Security Risk Management by using the standard ISO/IEC 27005 as a reference framework.
ISO/IEC 27005 Lead Risk Manager training enables you to acquire the necessary expertise to support an organization in the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework. During this training course, you will gain a comprehensive knowledge of a process model for designing and developing an Information Security Risk Management program. The training will also contain a thorough understanding of best practices of risk assessment methods such as OCTAVE, EBIOS, MEHARI and harmonized TRA. This training course supports the implementation process of the ISMS framework presented in the ISO/IEC…
ISO/IEC 27005 Risk Manager training enables you to develop the competence to master the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework. During this training course, you will also gain a thorough understanding of best practices of risk assessment methods such as OCTAVE, EBIOS, MEHARI and harmonized TRA. This training course corresponds with the implementation process of the ISMS framework presented in the ISO/IEC 27001 standard.
The ISO/IEC 27032 Foundation training course presents the fundamental cybersecurity concepts and principles based on ISO/IEC 27032 and NIST cybersecurity framework.
ISO/IEC 27032 Lead Cybersecurity Manager training enables you to acquire the expertise and competence needed to support an organization in implementing and managing a Cybersecurity program based on ISO/IEC 27032 and NIST Cybersecurity framework. During this training course, you will gain a comprehensive knowledge of Cybersecurity, the relationship between Cybersecurity and other types of IT security, and stakeholders’ role in Cybersecurity.
The Lead Cloud Security Manager training course enables participants to develop the competence needed to implement and manage a cloud security program by following widely recognized best practices.
MEHARI Risk Manager training enables you to gain the necessary knowledge and expertise to analyze the information security risks appropriate to the different stages of the security lifecycle in an organization. During this training course, you will have the opportunity to acquire the necessary skills to review the security services, detect critical risks and analyze risk scenarios based on the MEHARI risk analysis method.