top of page
At the Library

TRAINING PROGRAMS

INFORMATION SECURITY

INFORMATION SECURITY

Smiling Man on Laptop

PECB Chief Information Security Officer

risk-protection-eliminating-risk-top-view.jpg

Risk Assessment

Methods

Image by Towfiqu barbhuiya

ISO/IEC 27005 Information Security Risk Management

CYBERSECURITY

standard-quality-control-collage-concept-min.jpg

Cybersecurity Management

Image by Adi Goldstein

Cloud Security

Image by rivage

Penetration Testing

Professional

Image by Mika Baumeister

Ethical Hacking

image (27).png

SCADA Security Manager

Image by Tianyi Ma

Computer Forensics

Image by Joshua Sortino

ISO/IEC 27033 Network Security

Image by fabio

Cyber Security Maturity Model Certification (CMMC)

Image by FlyD

NIS 2 Directive

CONTINUITY, RESILIENCE, AND RECOVERY

Business

ISO 22301 Business Continuity Management System

Image by Sarah Kilian

Disaster Recovery

Young Businesswoman

ISO 22317 Business Impact Analysis

Businessman Using Laptop

Digital Operational Resilience Act (DORA)

Image by Robert Stump

Crisis Management

GOVERNANCE, RISK, AND COMPLIANCE

Dangling Legs

ISO 31000 Risk Management

Image by Sarah Kilian

ISO 37001 Anti-Bribery Management System

Image by Microsoft 365

ISO 37301 Compliance Management System

Image by Taylor Vick

ISO/IEC 38500 IT Governance

Image by John Schnobrich

Operational Risk Management in Financial Institutions

Reviewing Reports at Desk

MS Internal Auditor

PRIVACY AND DATA PROTECTION

Image by Jordan Harrison

ISO/IEC 27701 Privacy Information Management System

Image by George Prentzas

General Data Protection Regulation (GDPR) - Training Courses

DIGITAL TRANSFORMATION

Image by Steve Johnson

ISO/IEC 42001 Artificial Intelligence Management System

Russian State Library

Digitalization and Electronic Archiving

Image by Krzysztof Kowalik

Digital Transformation

bottom of page