Education and certification for individuals inner banner

PECB Training Courses


INFORMATION SECURITY


ISO/IEC 27001
ISO/IEC 27001 Information Security

ISO/IEC 27001 provides requirements for organizations seeking to establish, implement, maintain and continually improve an information security man...

ISO/IEC 27032
ISO/IEC 27032 Cyber Security

The term ISO/IEC 27032 refers to ‘Cybersecurity’ or ‘Cyberspace security,’ which is defined as the protection of privacy, integrity, and ac...

ISO/IEC 27002
ISO 27002 - Training Courses & Certification

ISO/IEC 27002 is an international standard that gives guidelines for the best Information Security management practices. ...

ISO/IEC 27005
ISO/IEC 27005 Information Security Risk Management

ISO/IEC 27005 provides guidelines for the establishment of a systematic approach to Information Security risk management which is necessary to iden...

ISO/IEC 27035
ISO 27035 Incident Management Training Courses & Certification

Our incident management training courses found below will perfectly match your needs for an effective incident management program in your organizat...

Risk Assessment Methods
Risk Assessment Methods

Understanding how to effectively assess risk may be a challenge for many industries. ...

SCADA
SCADA Security Manager

It is critical to understand the common Industrial Control System (ICS) threats, vulnerabilities, and risks that are associated to ICS systems and ...

Penetration Testing
Penetration Testing

It is critical to be able to sucessfully test and evaluate the security of IT systems and applications in your organization....

ISO 27799
ISO 27799 Information Security Management

ISO 27799 training is essential as it will provide you with the fundamental guidelines to protect personal health information. ...

Computer Forensics
Computer Forensics

Our range of Computer Forensics training courses will assist you in learning the key concepts and processes involved in computer forensics processe...

Cybersecurity Audit
Cybersecurity Audit Trainings

A cybersecurity audit in other words is an analysis to validate whether all the existing cybersecurity measures are being followed and implemented ...

Secure Application Developer
Secure Application Developer Trainings

Secure Application Development (SAD) is the process of writing secure code without errors and vulnerabilities that expose an application to cyber t...

Communications Security
Communications Security

Communications Security as a discipline, addresses the prevention of unauthorized access to telecommunications traffic or any information that is e...

Digitalization and Electronic Archiving
Digitalization and Electronic Archiving

Digitalization and Electronic Archiving as an Information Security discipline, helps in managing personal information and records in the digital re...

Human Resources Security
Human Resources Security

The Human Resource Security discipline is designed to examine key controls applied before, during, and after the hiring of human resources. ...

Cybersecurity
Cybersecurity - Training Courses & Certification

Cybersecurity or the Cyberspace Security refers to the protection of systems, programs, networks and devices from cyber-attacks...

Ethical Hacking
Ethical Hacking - Training Courses & Certification

Ethical Hacking refers to the act of penetrating computer systems, networks or applications with the intention to exploit vulnerabilities that may ...

ISO/IEC 27701
ISO/IEC 27701 - Privacy Information Management System

ISO/IEC 27701 is essential for every organization that is responsible and accountable for Personally Identifiable Information (PII) as it provides ...