PECB ISO/IEC 27001
ISO/IEC 27001 provides requirements for organisations seeking to establish, implement, maintain and continuously improve an Information Security Management System (ISMS) …
ISO/IEC 27001 provides requirements for organisations seeking to establish, implement, maintain and continuously improve an Information Security Management System (ISMS) …
ISO/IEC 27701 defines the requirements for the Privacy Information Management System (PIMS) by extending the Information Security Management System (ISMS) …
ISO 9000 specifies the requirements for the establishment, implementation, operation, maintenance, and continual improvement of a quality management system (QMS) in an organization…
What is ISO/IEC 42001? As the world witnesses the relentless advancement of Artificial Intelligence (AI), there is an increasing need for effective standardization and regulation to ensure its responsible use. ISO/IEC 42001 has been developed to respond to urgent inquiries concerning AI’s unchecked expansion and potential threats. It specifies the requirements and offers guidance to…
Get to know the best practices of Information Security Management Systems (ISMS) based on ISO/IEC 27001
Become acquainted with the best practices of information security risk management based on ISO/IEC 27005
Become acquainted with the best practices of Privacy Information Management System (PIMS) based on ISO/IEC 27701
Become familiar with the concepts and requirements of the General Data Protection Regulation (GDPR)
ISO 22301 defines the requirements for organisations seeking to establish, implement, maintain and continually improve the Business Continuity Management System (BCMS) …
Become acquainted with the best practices of Business Continuity Management Systems (BCMS) based on ISO 22301
Become acquainted with the best practices of Business Impact Analysis (BIA) based on ISO 22317
Become acquainted with the best practices of Service Management Systems (SMS) based on ISO/IEC 20000
ISO 31000 specifies the principles, framework and process of risk management and helps organisations to develop, implement and continually manage risk into overall processes …
Become acquainted with the best practices of Anti-bribery Management Systems (ABMS) based on ISO 37001
Become acquainted with the best practices of Quality Management Systems (BCMS) based on ISO 9001
Master the implementation and management of Quality Management Systems (QMS) based on ISO 9001
What Is the NIS 2 Directive? Effective January 16, 2023, the NIS 2 Directive (otherwise known as the Directive (EU) 2022/2555) has been established to enhance the security of network and information systems across the European Union. This directive targets critical infrastructure operators and essential service providers, mandating robust cybersecurity measures and promptly reporting incidents…
Disaster Recovery includes policies and procedures designed to protect your organization from human or naturally caused disruptions of your IT infrastructure …
Master the implementation and management of information security management systems (ISMS) based on ISO/IEC 27001:2022
ISO/IEC 27002 is an international standard that gives guidelines for the best Information Security Management practices …
Obtain the necessary competencies to assist organisations in establishing, implementing, and continually improving an information security risk management process based on ISO/IEC 27005
Obtain all the competencies and knowledge necessary to lead all the processes for complying with the requirements of the GDPR in an organisation
Master the implementation and management of Privacy Information Management System (PIMS) based on ISO/IEC 27701
Master the implementation and management of Business Continuity Management Systems (BCMS) based on ISO 22301
Master the implementation and management of IT Service Management Systems (SMS) based on ISO/IEC 20000
Learn to help organisations establish a risk management framework and apply the risk management process based on ISO 31000
ISO 37001 specifies requirements for any organisation to establish, implement, maintenance, review and improve the Anti-bribery Management System (ABMS) …
Master the implementation and management of Anti-bribery Management Systems (ABMS) based on ISO 37001
Become acquainted with the best practices of Compliance Management Systems (CMS) based on ISO 37301
Become acquainted with the best practices of Asset Management Systems (AMS) based on ISO 55001
Become acquainted with the best practices of Social Responsibility Program (SRP) based on ISO 26000
Become acquainted with the best practices of Supply Chain Security Management System (SCSMS) based on ISO 28000
Become acquainted with the best practices of Information Security Incident Management based on ISO/IEC 27035
Environmental management is essential for organizations aiming to contribute to sustainability and minimize their negative impact on the environment. It involves implementing strategies, processes, and controls to identify, assess, and manage environmental risks and opportunities. By proactively addressing issues such as pollution, resource consumption, waste, and energy consumption, organizations can contribute to the preservation of…
Become familiar with the fundamental concepts and principles of environmental management, learn the best practices for the effective implementation and maintenance of the environmental management system, and obtain an overview of the requirements of ISO 14001
Become familiar with the best practices of occupational health and safety and obtain a thorough overview of the requirements of the ISO 45001 for an OH&S MS
Become acquainted with the best practices of Energy Management Systems (EnMS) based on ISO 50001
What Is Digital Operational Resilience? Digital operational resilience refers to the ability of a financial entity to build, assure, and review its operational integrity and reliability by ensuring, either directly or indirectly through the use of services provided by ICT third-party service providers, the full range of ICT-related capabilities needed to address the security of the…
Master the implementation and management of network security based on ISO/IEC 27033 series of standards
Master the implementation and management of SOC 2 framework to ensure organizational data privacy and security compliance
Become acquainted with the best practices of artificial intelligence management system (AIMS) based on ISO/IEC 42001
What is an Artificial Intelligence Professional? An Artificial Intelligence (AI) Professional is a specialist equipped with the knowledge and skills to design, implement, and manage AI systems that drive innovation and efficiency across various industries. AI professionals combine technical expertise in areas like machine learning, deep learning, natural language processing, and computer vision with strategic insights…
Master the audit of Information Security Management Systems (ISMS) based on ISO/IEC 27001
Understand the implementation and management of Information Security Controls based on ISO/IEC 27002
ISO/IEC 27005 provides guidelines for the establishment of a systematic approach to Information Security Risk Management (ISRM) …
Obtain the necessary competencies to guide and support organisations establish their information security risk management process based on ISO/IEC 27005 and other best practices
Master the ability to implement and manage a cybersecurity program based on industry best practices
Master the audit of Privacy Information Management System (PIMS) based on ISO/IEC 27701
Master the audit of Business Continuity Management Systems (BCMS) based on ISO 22301
Obtain the necessary competencies to guide and support organizations establish a risk management framework based on ISO 31000 and other best practices and recommendations for risk management
Master the implementation of Compliance Management Systems (CMS) based on ISO 37301
Master the implementation and management of Asset Management Systems (AMS) based on ISO 55001
Obtain the necessary competence to lead project teams and deliver projects successfully in accordance with the guidance provided in ISO 21502 and other good practices of project management …
Master the implementation, promotion and management of Social Responsibility Program (SRP) based on ISO 26000
Master the implementation and management of Security Management System (SeMS) based on ISO 28000
Master the implementation and management of a cybersecurity program based on NIS 2 Directive
What is Digital Transformation? Digital transformation has helped organizations across different industries in achieving long-term growth and productivity. An effective digital transformation strategy helps avoid problems during transition and after implementation. A successful digital transformation requires appropriate technology and competent people. A digital transformation officer is crucial during the digital transformation of an organization. Certified digital transformation…
What is SOC 2? In the modern world, SOC 2, which stands for Systems and Organization Controls, has become a crucial framework for assessing data controls, security, and privacy based on established Trust Service Criteria. This framework assists organizations in managing risks, increasing confidence among customer and partners, differentiating themselves from competitors, and improving security measures…
What Is Cybersecurity? Cybersecurity refers to a set of practices established to protect critical systems, networks, devices, programs, and data. Cybersecurity involves implementing measures and techniques aiming to ensure the confidentiality, integrity, and availability of information and resources in cyberspace. It encompasses a range of strategies and practices focused on safeguarding information technology systems from cyber threats,…
ISO/TS 22317 is the only standard that provides detailed guidance on establishing, implementing and maintaining an effective Business Impact Analysis (BIA) process …
ISO/IEC 20000 defines requirements for service providers to plan, create, implement, operate, monitor, control, maintain and improve SMS …
The ISO 37301 standard and compliance management systems (CMS) provide organisations with a structured approach to meeting all compliance obligations …
Master the implementation and management of a Cloud Security based on ISO/IEC 27017 and ISO/IEC 27018
ISO 21502:2020 provides guidance that can help project managers and project-based organisations deliver projects successfully…
Obtain the necessary competencies to plan, conduct, and close an ISO 28000 audit based on the requirements of ISO/IEC 17021, the guidelines of ISO 19011, and other best practices
Master the ability to establish and monitor an information security program
What is an MS Internal Audit? An MS internal audit is a process that aims to systematically and independently evaluate the conformity and effectiveness of a management system against the relevant ISO standard within an organization. An effective internal audit reduces costs through increased productivity and better planning, enhances customer satisfaction, and minimizes barriers between departments by…
Cloud security is a set of strategies and practices used to secure cloud environments, applications, and data …
What is Information Security? Information security refers to the processes and controls intended to protect the information, whether it is electronic or physical. It determines what information needs to be protected, why it should be protected, how to protect it, and what to protect it from. Information security covers many areas, including network, application, physical,…
Imagine your organization goes through an event that causes irreparable damage and you discover that the situation could have been avoided or addressed better. Many times, organizations may prevent a crisis by managing small situations and incidents in a timely manner. They can also mitigate the effects of a crisis, even if its occurrence could not be stopped….
Obtain the necessary knowledge, skills and competencies of crisis management according to ISO 22361
Master the implemetation and management of artificial intelligence management systems (AIMS) based in ISO/IEC 42001
Master the audit od artificial intelligence management systems (AIMS) based on ISO/IEC 42001
Obtain the necessary competencies to establish, implement, maintain, and continually improve an environmental management system based on the requirements ISO 14001
Obtain the necessary competencies to plan, conduct, and close an ISO 14001 audit based on the requirements of ISO/IEC 17021-1, the guidelines of ISO 19011, and other best audits practices
Acquire the competencies to guide and support organizations in establishing, implementing, operating, maintaining and countinually improving an OH&S MS based on ISO 45001
Obtain the necessary competencies to audit occupational health and safety management systems against the criteria established by ISO 45001 and the guidelines and requirements for auditing management systems provided in ISO 19011 and ISO/IEC 17021-1
Master the implementation and management of Energy Management Systems (EnMS) based on ISO 50001
Master the skills to lead digital resilience in financial entities and ensure compliance with DORA
Master the implementation and management of application security controls based on ISO/IEC 27034
What is ISO 26000? ISO 26000 is an international standard developed to guide how to behave in a socially responsible way. This standard applies to all organisations aiming to contribute to society’s health and well-being, regardless of their size or industry. ISO 26000 is a guidance standard that helps organisations to enhance their operational processes and ensure…
What is Network Security? The ISO/IEC 27033 series of standards consist of six parts designed to ensure network security of devices, applications, services, and end users. It covers securing communications between networks using security gateways, virtual private networks (VPNs), and wireless IP network access. ISO/IEC 27033-1 is a mapping to the other parts. It provides an…
What is ISO/IEC 27034? ISO/IEC 27034 is an international standard that focuses on application security, designed to help organizations embed security practices throughout the application life cycle. It provides a framework that integrates security controls at each stage of development, operation, and maintenance to ensure that the information processed, stored, or transmitted by applications is adequately…
Experiencing security issues is usually not a matter of if but when. Organizations are continuously facing security risks that seriously threaten their operations. High-value products are prone to theft, confidential information is prone to hacking, and personnel are prone to injury. Such security incidents will not only cause financial and business losses, but may also lead…
What is a SCADA? SCADA – Supervisory Control and Data Acquisition is an industrial system framework that includes both hardware and software architecture to control, monitor and analyze an industrial process. SCADA is an application software that enables managers, engineers, and industry operators, to supervise and communicate effectively with the working environment. As an application software,…
The International Labour Organization (ILO) estimates that every year, around 2.3 million workers around the world die from work-related accidents. According to ILO, every year, worldwide, there are around 340 million occupational accidents and around 160 million are victims to work-related illnesses. While in the past decades, great efforts were made to improve the health and safety…
What is Computer Forensics? Computer Forensics, also known as Cyber Forensics refers to the analysis of information in the computer systems, with the objective of finding any digital evidence that can be used for civic purposes, or in most cases to prove and legally impeach cybercrime., but also to discover the cause of an incident….
What is ISO 50001? As an international standard, ISO 50001 specifies the requirements for organizations to develop, implement, and improve Energy Management Systems. This allows organizations to follow a specific framework that helps them achieve continual improvement in energy performance, efficiency, usage, and consumption. This framework specifies the measurements, documents, and reports, which enable organizations to…
What is ISO/IEC 27035? In today’s business world, information security incidents are considered to be uncertain risks which can seriously damage a business. Thus, organizations must take actions to promptly identify, evaluate and effectively manage the incidents. The ISO/IEC 27035 Information Security Incident Management is an international standard that provides best practices and guidelines for conducting…
ISO 55001 is an asset management system standard, the main objective of which is to help organizations manage the lifecycle of assets more effectively …