Cyber Security Training Courses

Cyber Security Training Courses

Online or onsite, instructor-led live Cyber Security (also known as Cybersecurity, Internet Security or IT Security) training courses demonstrate through interactive discussion and hands-on practice how to understand, plan and implement an Cybersecurity strategy within their organization. Special focus is given to setting up the proper systems and procedures needed to detect and mitigate threats. Internet Security courses are available as interactive trainings and a number of them include a testing and certification component.

Cybersecurity training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Cyber Security trainings in the US can be carried out locally on customer premises or in NobleProg corporate training centers.

NobleProg -- Your Local Training Provider

Testimonials

★★★★★
★★★★★

Cyber Security Course Outlines

Course Name
Duration
Overview
Course Name
Duration
Overview
7 hours
Overview
This is a one day Introduction to ISO27001
21 hours
Overview
This course will give you the skills to build up information security according to ISO 27005, which is dedicated to information security risk management based on ISO 27001.
7 hours
Overview
This instructor-led, live training in the US (online or onsite) is aimed at information system analysts who wish to use MITRE ATT&CK to decrease the risk of a security compromise.

By the end of this training, participants will be able to:

- Set up the necessary development environment to start implementing MITRE ATT&CK.
- Classify how attackers interact with systems.
- Document adversary behaviors within systems.
- Track attacks, decipher patterns, and rate defense tools already in place.
21 hours
Overview
Audiance

All staff who need a working knowledge of Compliance and the Management of Risk

Format of the course

A combination of:

- Facilitated Discussions
- Slide Presentations
- Case Studies
- Examples

Course Objectives

By the end of this course, delegates will be able to:

- Understand the major facets of Compliance and the national and international efforts being made to manage the risk related to it
- Define the ways in which a company and its staff might set up a Compliance Risk Management Framework
- Detail the roles of Compliance Officer and Money Laundering Reporting Officer and how they should be integrated into a business
- Understand some other “hot spots” in Financial Crime – especially as they relate to International Business, Offshore Centres and High-Net-Worth Clients
7 hours
Overview
This instructor-led, live training in the US (online or onsite) is aimed at computer users who wish to understand malware and take appropriate measures to minimize its threat.

By the end of this training, participants will be able to:

- Understand the concept of malware.
- Identify the different types of malware.
- Take necessary steps to mitigate malware (procedural, technological, awareness, etc).
35 hours
Overview
ISO 27799 Lead Manager training enables you to acquire the necessary expertise to support an organization in implementing and managing Information Security controls based on ISO 27799 and [ISO/IEC 27002](https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27002). During this training course, you will also gain a comprehensive knowledge of the best practices of Information Security Controls and how to improve Information Security within a healthcare organization. Additionally, this training enables you to develop the necessary expertise to support healthcare organizations in establishing, implementing, managing and maintaining an Information Security Management System (ISMS). Furthermore, during this training you will learn the complex and different factors that should be taken into account when dealing with information security issues within a healthcare organization.

After mastering all the necessary concepts of Information Security Controls, you can sit for the exam and apply for a “PECB Certified ISO 27799 Lead Manager” credential. By holding a PECB Lead Manager Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead a team in implementing and managing Information Security Controls in healthcare organizations based on ISO 27799 and ISO/IEC 27002.

Who should attend?

- Managers or consultants seeking to implement an Information Security Management System (ISMS) based on ISO/IEC 27001, ISO/IEC 27002 and ISO 27799
- Project managers or consultants seeking to master the Information Security Management System implementation process in healthcare organizations
- Individuals responsible for Information Security, compliance, risk, and governance in a healthcare organization
- Information Security team members
- Expert advisors in information technology
- Information Security officers
- Information Security managers
- Privacy officers
- IT professionals
- CTOs, CIOs and CISOs

Learning objectives

- Master the implementation of Information Security controls in healthcare organizations by adhering to the framework and principles of ISO 27799 and ISO/IEC 27002
- Master the concepts, approaches, standards, methods and techniques required for the implementation and effective management of Information Security controls in healthcare organizations
- Comprehend the relationship between the components of Information Security controls, including responsibility, strategy, acquisition, performance, conformance, and human behavior
- Understand the importance of Information Security for the strategy of a healthcare organization
- Master the implementation of Information Security management processes
- Master the expertise to support a healthcare organization to effectively implement, manage and maintain Information Security Controls
- Master the formulation and implementation of Information Security requirements and objectives
- Master the development and administration of a health information security program, including: policies, procedures, risk assessment, security architectures etc.
14 hours
Overview
ISO 27799 Foundation training enables you to learn the basic elements of Information security management and Information Security Controls in healthcare organizations as specified in ISO 27799 and ISO/IEC 27002. During this training course, you will be able to understand how ISO 27799 is related to [ISO/IEC 27001](https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001) and [ISO/IEC 27002](https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27002).

After completing this course, you can sit for the exam and apply for the “PECB Certified ISO 27799 Foundation” credential. A PECB Foundation Certificate shows that you have understood the fundamental methodologies and management approach.

Who should attend?

- Individuals interested in Information Security Management applicable to the healthcare industry
- Individuals seeking to gain knowledge about the main processes of an Information Security Management System and Information Security Controls relevant to healthcare organizations
- Individuals interested to pursue a career in Information Security Management

Learning objectives

- Understand the implementation of Information Security Controls in accordance with ISO 27799 and ISO/IEC 27002
- Acknowledge the correlation between ISO ISO/IEC 27001, ISO 27799, ISO/IEC 27002 and other standards and regulatory frameworks
- Understand the approaches, methods and techniques used for the implementation of Information Security Controls in healthcare organizations

Educational Approach

- Lecture sessions are illustrated with practical questions and examples
- Practical exercises include examples and discussions
- Practice tests are similar to the Certification Exam

General Information

- Certification fees are included on the exam price
- Training material containing over 200 pages of information and practical examples will be distributed
- A participation certificate of 14 CPD (Continuing Professional Development) credits will be issued
- In case of exam failure, you can retake the exam within 12 months for free
35 hours
Overview
The ISO/IEC 27701 Lead Implementer training course enables you to develop the necessary expertise to assist an organization to establish, implement, maintain and continually improve a Privacy Information Management System (PIMS) based on ISO/IEC 27701 by enhancing an existing ISMS based on ISO/IEC 27001 and the guidance of ISO/IEC 27002.

Why should you attend?

This training course is designed to prepare its participants implement a Privacy Information Management System (PIMS) in compliance with the requirements and guidance of the ISO/IEC 27701. Moreover, you will gain a comprehensive understanding of the best practices of privacy information management and learn how to manage and process data while complying with various data privacy regimes.

After mastering the implementation and management of a Privacy Information Management System (PIMS), you can sit for the exam and apply for a “PECB Certified ISO/IEC 27701 Lead Implementer” credential. The internationally recognized PECB Lead Implementer Certificate proves that you have the practical knowledge and professional capabilities to implement the ISO/IEC 27701 requirements in an organization.

Who should attend?

- Managers and consultants involved in privacy and data management
- Expert advisors seeking to master the implementation of a Privacy Information Management System
- Individuals responsible and accountable for Personally Identifiable Information (PII) within organizations
- Individuals responsible for maintaining conformance with data privacy regimes requirements
- PIMS team members

Learning objectives

- Master the concepts, approaches, methods and techniques used for the implementation and effective management of a PIMS.
- Learn about the correlation between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks.
- Understand the operation of a PIMS based on ISO/IEC 27701 and its principal processes.
- Learn how to interpret the requirements of ISO/IEC 27701 in the specific context of an organization.
- Develop the expertise to support an organization in effectively planning, implementing, managing, monitoring and maintaining a PIMS.

Education approach

- This training course is based on both theory and best practices used in the implementation of PIMS.
- Lecture sessions are illustrated with examples based on case studies.
- Practical exercises are based on a case study which includes role playing and discussions.
- Practice tests are similar to the Certification Exam

General information

- Certification fees are included on the exam price.
- Training materials and practical examples will be distributed.
- A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued.
- In case of exam failure, you can retake the exam within 12 months for free.
35 hours
Overview
The ISO/IEC 27701 Lead Auditor training course enables you to develop the necessary skills to perform a Privacy Information Management System (PIMS) audit by applying widely recognized audit principles, procedures and techniques.

Why should you attend?

During this training course, you will obtain the knowledge and skills to plan and carry out audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process.

Based on practical exercises, you will be able to acquire knowledge on the protection of privacy in the context of processing personally identifiable information (PII), as well as master audit techniques and become competent to manage an audit program, audit team, establish communication with customers and resolve potential conflicts.

After completing this training course, you can sit for the exam and, if you successfully pass the exam, you can apply for the “PECB Certified ISO/IEC 27701 Lead Auditor” credential. The internationally recognized PECB Lead Auditor certificate proves that you have the capabilities and competences to audit organizations based on best practices.

Who should attend?

- Auditors seeking to perform and lead Privacy Information Management System (PIMS) certification audits
- Managers or consultants seeking to master a PIMS audit process
- Individuals responsible for maintaining conformance with PIMS requirements
- Technical experts seeking to prepare for a PIMS audit
- Expert advisors in the protection of Personally Identifiable Information (PII)

Learning objectives

- Understand a Privacy Information Management System (PIMS) and its processes based on ISO/IEC 27701
- Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
- Acquire the competences of the auditor’s role in planning, leading, and following up on a management system audit in accordance with ISO 19011.
- Learn how to interpret the requirements of ISO/IEC 27701 in the context of a PIMS audit

Education approach

- This training is based on both theory and best practices used in PIMS audits
- Lecture sessions are illustrated with examples based on case studies
- Practical exercises are based on a case study which includes role-playing and discussions
- Practice tests are similar to the Certification Exam

General information

- Participants will be provided with the training material containing over 400 pages of explanatory information, discussion topics, examples and exercises.
- An attendance record certificate of 31 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
14 hours
Overview
The ISO/IEC 27701 Foundation training course is designed to help participants understand the basic concepts and principles of a Privacy Information Management System (PIMS) based on ISO/IEC 27701. Moreover, during this training course, students will learn more on the structure of the standard including its requirements, guidance and controls on the protection of the privacy of Personally Identifiable Information (PII) principals and the relationship of the standard with ISO/IEC 27001 and ISO/IEC 27002.

After completing this training course, you can sit for the exam and, if you successfully pass it, you can apply for the “PECB Certified ISO/IEC 27701 Foundation” credential. A PECB Foundation certificate proves that you have comprehended the fundamental methodologies, requirements, guidelines, framework and managerial approach.

Who should attend?

- Individuals involved in information security and privacy management
- Individuals seeking to gain knowledge on the main processes of a privacy information management system
- Individuals interested in pursuing a career in privacy information management
- Individuals responsible for personally identifiable information (PII) within organizations
- Information security team members

Learning objectives

- Understand the fundamental concepts and principles of a privacy information management system (PIMS) based on ISO/IEC 27701
- Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
- Understand the approaches, standards, methods, and techniques used for the implementation and management of a PIMS

Educational approach

- Lecture sessions are complemented by discussions questions and examples
- The exercises include multiple-choice quizzes and essay-type exercises
- Exercise questions and quizzes are similar to the certification exam

General Information

- Participants will be provided with the training material containing over 200 pages of explanatory information, discussion topics, examples and exercises.
- An attendance record certificate of 14 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
35 hours
Overview
ISO/IEC 27035 Lead Incident Manager training enables you to acquire the necessary expertise to support an organization in implementing an Information Security Incident Management plan based on [ISO/IEC 27035](https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27035). During this training course, you will gain a comprehensive knowledge of a process model for designing and developing an organizational incident management plan. The compatibility of this training course with ISO/IEC 27035 also supports the ISO/IEC 27001 by providing guidance for Information Security Incident Management.

After mastering all the necessary concepts of Information Security Incident Management, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27035 Lead Incident Manager” credential. By holding a PECB Lead Incident Manager Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead a team in managing Information Security Incidents.

Who should attend?

- Information Security Incident managers
- IT Managers
- IT Auditors
- Managers seeking to establish an Incident Response Team (IRT)
- Managers seeking to learn more about operating effective IRTs
- Information Security risk managers
- IT system administration professionals
- IT network administration professionals
- Members of Incident Response Teams
- Individuals responsible for Information Security within an organization

Learning objectives

- Master the concepts, approaches, methods, tools and techniques that enable an effective Information Security Incident Management according to ISO/IEC 27035
- Acknowledge the correlation between ISO/IEC 27035 and other standards and regulatory frameworks
- Acquire the expertise to support an organization to effectively implement, manage and maintain an Information Security Incident Response plan
- Acquire the competence to effectively advise organizations on the best practices of Information Security Incident Management
- Understand the importance of establishing well-structured procedures and policies for Incident Management processes
- Develop the expertise to manage an effective Incident Response Team

Educational approach

- This training is based on both theory and best practices used in the implementation of an Information Security Incident Management plan
- Lecture sessions are illustrated with examples based on case studies
- Practical exercises are based on a case study which includes role playing and discussions
- Practice tests are similar to the Certification Exam

General Information

- Certification fees are included on the exam price
- Training material containing over 450 pages of information and practical examples will be distributed
- A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued
- In case of exam failure, you can retake the exam within 12 months for free
7 hours
Overview
[ISO/IEC 27035](https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27035) Introduction training course enables you to comprehend the basic concepts of managing Information Security Incidents.

By attending the ISO/IEC 27035 Introduction course, you will understand the importance of an Information Security Incident Management and the benefits that businesses, society and governments can obtain.

Who should attend?

- Individuals interested in Information Security Incident Management
- Individuals seeking to gain knowledge about the main processes of Information Security Incident Management

Learning objectives

- Understand the concepts, approaches, methods, and techniques used to manage Information Security Incidents
- Understand the Information Security Incident Management practices

General Information

- Training material containing over 100 pages of information and practical examples will be distributed
- A participation certificate of 7 CPD (Continuing Professional Development) credits will be issued
14 hours
Overview
[ISO/IEC 27035](https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27035) Foundation training enables you to learn the basic elements to implement an Incident Management Plan and manage Information Security Incidents. During this training course, you will be able to understand Information Security Incident Management processes.

After completing this course, you can sit for the exam and apply for the “PECB Certified ISO/IEC 27035 Foundation” credential. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, requirements, and management approach.

Who should attend?

- Individuals interested in Information Security Incident Management process approaches
- Individuals seeking to gain knowledge about the main principles and concepts of Information Security Incident Management
- Individuals interested to pursue a career in Information Security Incident Management

Learning objectives

- Understand the basic concepts of Information Security Incident Management
- Acknowledge the correlation between ISO/IEC 27035 and other standards and regulatory frameworks
- Understand the process approaches used to effectively manage Information Security Incidents

Educational approach

- Lecture sessions are illustrated with practical questions and examples
- Practical exercises include examples and discussions
- Practice tests are similar to the Certification Exam

General Information

- Certification fees are included on the exam price
- Training material containing over 200 pages of information and practical examples will be distributed
- A participation certificate of 14 CPD (Continuing Professional Development) credits will be issued
- In case of exam failure, you can retake the exam within 12 months for free
35 hours
Overview
ISO/IEC 27002 Lead Manager training enables you to develop the necessary expertise and knowledge to support an organization in implementing and managing Information Security controls as specified in [ISO/IEC 27002](https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27002).

After completing this course, you can sit for the exam and apply for the “PECB Certified ISO/IEC 27002 Lead Manager” credential. A PECB Lead Manager Certification, proves that you have mastered the principles and techniques for the implementation and management of Information Security Controls based on ISO/IEC 27002.

Who should attend?

- Managers or consultants seeking to implement an Information Security Management System (ISMS) based on ISO/IEC 27001 and ISO/IEC 27002
- Project managers or consultants seeking to master the Information Security Management System implementation process
- Individuals responsible for the information security, compliance, risk, and governance, in an organization
- Members of information security teams
- Expert advisors in information technology
- Information Security officers
- Privacy officers
- IT professionals
- CTOs, CIOs and CISOs

Learning objectives

- Master the implementation of Information Security controls by adhering to the framework and principles of ISO/IEC 27002
- Gain a comprehensive understanding of the concepts, approaches, standards, methods and techniques required for the effective implementation and management of Information Security controls
- Comprehend the relationship between the components of Information Security controls, including responsibility, strategy, acquisition, performance, conformance, and human behavior
- Understand the importance of information security for the strategy of the organization
- Master the implementation of information security management processes
- Master the formulation and implementation of security requirements and objectives

Educational approach

- This training is based on both theory and practice
- Sessions of lectures illustrated with examples based on real cases
- Practical exercises based on case studies
- Review exercises to assist the exam preparation
- Practice test similar to the certification exam

General Information

- Certification fees are included on the exam price
- Training material containing over 500 pages of information and practical examples will be distributed to the participants
- A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued to the participants
- In case of exam failure, you can retake the exam within 12 months for free
7 hours
Overview
In this instructor-led, live training in the US, participants will learn about the various aspects of NB-IoT (also known as LTE Cat NB1) as they develop and deploy a sample NB-IoT based application.

By the end of this training, participants will be able to:

- Identify the different components of NB-IoT and how to fit together to form an ecosystem.
- Understand and explain the security features built into NB-IoT devices.
- Develop a simple application to track NB-IoT devices.
14 hours
Overview
In this instructor-led, live training in the US, participants will understand Internet of Things (IoT) architectures and learn the different IoT security solutions applicable to their organization.

By the end of this training, participants will be able to:

- Understand IoT architectures.
- Understand emerging IoT security threats and solutions.
- Implement technologies for IoT security in their organization.
21 hours
Overview
This instructor-led, live training in the US (online or onsite) is aimed at engineers who wish to learn the methods and tools needed to protect their organization's information systems against attack.

By the end of this training, participants will be able to:

- Understand information security at both the computer level, as well as the communications level.
- Prevent physical and digital access to private information systems.
- Prevent the modification of information that is stored, being processed, or being transmitted.
- Protect against denial of service to authorized users.
- Take the necessary measures to detect, document, and counter security threats.
- Ensure that organizational information is kept confidential.
14 hours
Overview
Interactive Application Security Testing (IAST) is a form of application security testing that combines Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) or Runtime Application Self-protection (RASP) techniques. IAST is able to report the specific lines of code responsible for a security exploit and replay the behaviors leading to and following such an exploit.

In this instructor-led, live training, participants will learn how to secure an application by instrumenting runtime agents and attack inducers to simulate application behavior during an attack.

By the end of this training, participants will be able to:

- Simulate attacks against applications and validate their detection and protection capabilities
- Use RASP and DAST to gain code-level visibility into the data path taken by an application under different runtime scenarios
- Quickly and accurately fix the application code responsible for detected vulnerabilities
- Prioritize the vulnerability findings from dynamic scans
- Use RASP real-time alerts to protect applications in production against attacks.
- Reduce application vulnerability risks while maintaining production schedule targets
- Devise an integrated strategy for overall vulnerability detection and protection

Audience

- DevOps engineers
- Security engineers
- Developers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
7 hours
Overview
HIPAA (Health Insurance Portability and Accountability Act of 1996) is a legislation in the United States that provides provisions for data privacy and security for handling and storing medical information. These guidelines are a good standard to follow in developing health applications, regardless of territory. HIPAA compliant applications are recognized and more trusted globally.

In this instructor-led, live training (remote), participants will learn the fundamentals of HIPAA as they step through a series of hands-on live-lab exercises.

By the end of this training, participants will be able to:

- Understand the basics of HIPAA
- Develop health applications that are compliant with HIPAA
- Use developer tools for HIPAA compliance

Audience

- Developers
- Product Managers
- Data Privacy Officers

Format of the Course

- Part lecture, part discussion, exercises and heavy hands-on practice.

Note

- To request a customized training for this course, please contact us to arrange.
21 hours
Overview
Course goal:

To ensure that an individual has the core understanding of GRC processes and capabilities, and the skills to integrate governance, performance management, risk management, internal control, and compliance activities.

Overview:

- GRC Basic terms and definitions
- Principles of GRC
- Core components, practices and activities
- Relationship of GRC to other disciplines
7 hours
Overview
This course provides leaders and managers an overview of issues and activities associated with cybersecurity.

Leaders will receive information in various topics that will build their knowledge and hone executive decision-making in regard to the cybersecurity threat.
35 hours
Overview
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

The purpose of the Ethical Hacking Training is to:

- Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
- Inform the public that credentialed individuals meet or exceed the minimum standards.
- Reinforce ethical hacking as a unique and self-regulating profession.

Audience:

The Course is ideal for those working in positions such as, but not limited to:

- Security Engineers
- Security Consultants
- Security Managers
- IT Director/Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers
14 hours
Overview
This course is designed to show delegates how easy it can be for others to obtain data about ourselves through various means, but also how much of this can be stopped with a few tweaks to our machines and our online behavior.
21 hours
Overview
This instructor-led, live training in the US introduces the system architectures, operating systems, networking, storage, and cryptographic issues that should be considered when designing secure embedded systems.

By the end of this course, participants will have a solid understanding of security principles, concerns, and technologies. More importantly, participants will be equipped with the techniques needed for developing safe and secure embedded software.
35 hours
Overview
Description:

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how Intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Target Audience:

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
14 hours
Overview
This two days course s designed for those with some data protection responsibilities in an
organization or who, for other reasons, wish to achieve and demonstrate a broad
understanding of the law, including the EU General Data Protection Regulation (GDPR) and
the UK Data Protection Bill and their practical application. It is recognized that those with
overall responsibility for data protection within an organization will need to develop a detailed
understanding of the law"
7 hours
Overview
This course was put together focusing on what today’s Mobile Forensics practitioner requires, Basics of Android and iOS areas this course will be cover & the analysis using reverse engineering understanding how the popular Mobile OSs are hardened to defend against common attacks and exploits.
7 hours
Overview
NetNORAD is a system built by Facebook to troubleshoot network problems via end-to-end probing, independent of device polling.

In this instructor-led, live training, participants will learn how NetNORAD and active path testing can help them improve their network troubleshooting methods.

By the end of this training, participants will be able to:

- Understand how NetNORAD works
- Learn the design principles behind NetNORAD
- Use open-source NetNORAD tools with their own code to implement a fault detection system

Audience

- Network engineers
- Developers
- System engineers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
21 hours
Overview
This instructor-led, live training in the US is aimed at engineers in telecommunication companies who wish to set up an end-to-end digital identity management system.

By the end of this training, participants will be able to:

- Understand, evaluate and adopt different approaches to managing usernames and passwords.
- Setup a single login system that works across all applications used in a telecom environment.
- Use identity technology to get a clear understanding of their customers and their needs.
- Implement an authentication system that works across different platforms (laptop, mobile, etc.).
35 hours
Overview
Lead SCADA Security Manager training enables you to develop the necessary expertise to plan, design, and implement an effective program to protect SCADA systems. In addition, you will be able to understand common Industrial Control System (ICS) threats, vulnerabilities, risks related to the Industrial Control Systems (ICS) and techniques used to manage these risks. This training focuses on several aspects of security management and skills related to SCADA/ICS security.

Lead SCADA Security Manager training course is designed by industry experts with in-depth experience in SCADA and Industrial Control Systems Security. Unlike other trainings, this training course concentrates specifically on the knowledge and skills needed by a professional seeking to advice on, or manage risks related to SCADA environments and systems. Given the high profile nature and the significant impacts associated with such environments, a holistic professional approach to security is needed and that is exactly what this course is designed to provide.

In addition, to acquire the theoretical knowledge needed by a SCADA Security Manager, a comprehensive methodology for the implementation of a SCADA Security program is presented. Thus, at the end of this course, you will gain knowledge on how to effectively implement a security program for SCADA/ICS systems.

After mastering all the necessary concepts of SCADA Security, you can sit for the exam and apply for a “PECB Certified Lead SCADA Security Manager” credential. By holding a PECB Lead SCADA Security Manager Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead a team in managing SCADA Security.

Who should attend?

- Security professionals interested in acquiring SCADA security professional skills
- IT professionals looking to enhance their technical skills and knowledge
- IT and Risk Managers seeking a more detailed understanding of ICS and SCADA systems
- SCADA system developers
- SCADA engineers and operators
- SCADA IT professionals

Learning objectives

- Understand and explain the purpose and risks to SCADA systems, Distributed Control Systems and Programmable Logic Controllers
- Understand the risks faced by these environments and the appropriate approaches to manage such risks
- Develop the expertise to support a pro-active SCADA Security program, including policies and vulnerability management
- Define and design network architecture incorporating defense in advanced security controls for SCADA
- Explain the relationship between management, operational and technical controls in a SCADA Security program
- Improve the ability to design resilient and high availability SCADA systems
- Learn how to manage a program of effective security testing activities

Educational approach

- This training is based on both theory and best practices used in SCADA Security
- Lecture sessions are illustrated with examples based on case studies
- Practical exercises are based on a case study which includes role playing and discussions
- Practical tests are similar to the Certification Exam

General Information

- Certification fees are included on the exam price
- Training material containing over 450 pages of information and practical examples will be distributed
- A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued
- In case of exam failure , you can retake the exam within 12 months for free
Online Cybersecurity courses, Weekend Cyber Security courses, Evening Cyber Security training, Cybersecurity boot camp, Cybersecurity instructor-led, Weekend Cyber Security training, Evening Cyber Security courses, Cybersecurity coaching, Cybersecurity instructor, Cybersecurity trainer, Cybersecurity training courses, Cybersecurity classes, Cybersecurity on-site, Cyber Security private courses, Cyber Security one on one training

Course Discounts

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

is growing fast!

We are looking to expand our presence in the US!

As a Business Development Manager you will:

  • expand business in the US
  • recruit local talent (sales, agents, trainers, consultants)
  • recruit local trainers and consultants

We offer:

  • Artificial Intelligence and Big Data systems to support your local operation
  • high-tech automation
  • continuously upgraded course catalogue and content
  • good fun in international team

If you are interested in running a high-tech, high-quality training and consulting business.

Apply now!

This site in other countries/regions