ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
ISO/IEC 27001:2022 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001:2022.
The ISO/IEC 27005:2022 Lead Risk Manager training course enables participants to acquire the necessary competencies to assist organizations in establishing, managing, and improving an information security risk management (ISRM) program based on the guidelines of ISO/IEC 27005:2022. Apart from introducing the activities required for establishing an information security risk management program, the training course also elaborates on the best methods and practices related to information security risk management.
The ISO/IEC 42001 Lead Implementer training course provides the participants with the essential competencies needed to effectively plan, implement, manage, monitor, maintain, and continually improve an artificial intelligence management system (AIMS).
The CCTA training course equips participants with the necessary expertise and skills required to effectively identify, analyze, and mitigate cyber threats. Through a systematic and effective approach, attendees will acquire the ability to support an organization in developing and implementing a comprehensive threat hunting program.
The Certified Artificial Intelligence Professional course helps participants gain the knowledge and skills required to excel in AI related roles. The program includes a broad range of domains from foundational AI concepts to advanced applications like machine learning, deep learning, natural language processing, robotics, computer vision and expert systems. It also emphasizes responsible AI practices, including risk management, ethics, and compliance, ensuring participants are well-prepared to implement AI solutions in real-world scenarios.
ISO/IEC 27001 Lead Implementer training course enables participants to acquire the knowledge necessary to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an information security management system (ISMS).
The Certified Lead Ethical Hacker training course enables participants to develop the competence and knowledge required to conduct ethical hacking, mainly for information systems and network penetration tests. Apart from theoretical information, the training course also includes labs that are completed with a virtual machine.
The Lead Cloud Security Manager training course enables participants to develop the competence needed to implement and manage a cloud security program by following widely recognized best practices.
The Certified Incident Responder (CIR) training course is designed to empower security professionals with the advanced skills and methodologies required to effectively manage and mitigate security incidents in today’s ever-evolving threat landscape.
The PECB Chief Information Security Officer (CISO) training course is tailored for aspiring CISOs, providing them with the necessary knowledge, skills, and strategies to lead information security programs effectively and safeguard information and assets in today's dynamic digital environment.
The ISO/IEC 27034 Lead Application Security Implementer training course prepares professionals to implement and manage an application security program based on the ISO/IEC 27034 standard. Participants will gain the skills needed to integrate security measures within the software development life cycle in order to protect sensitive data and reduce security risks. Through practical exercises and expert guidance, this course equips individuals to lead application security initiatives, ensure compliance, and defend against cyber threats effectively.
The AI Risk Manager training course equips participants with the essential knowledge and skills to identify, assess, mitigate, and manage AI-related risks. Based on leading frameworks such as the NIST AI Risk Management Framework, the EU AI Act, and insights from the MIT AI Risk Repository, this course provides a structured approach to AI risk governance, regulatory compliance, and ethical risk management.
Provide a safe and sustainable business environment for your company! We will help you build a resilient and reliable digital world, even in the face of changing threats.
HR assessment focuses on mapping the skills and increasing the competencies of the weakest link in cyber security: the users, the employees.
Threat assessment is a tactical and technical service that allows a company to get a quick overview of external threats.
Maturity assessment helps plan IT investments and design further steps to mitigate vulnerabilities and ensure better security.