SCADA Security Manager Training Overview

SCADA – Supervisory Control and Data Acquisition is an industrial system framework that includes both hardware and software architecture to control, monitor and analyze an industrial process. SCADA is an application software that enables managers, engineers, and industry operators, to supervise and communicate effectively with the working environment.
 
As an application software, SCADA is designed to assist industry experts in maintaining and improving industrial processes. Hence, the objective of SCADA is to collect real-time data, and store, process and generate reports for the complex industrial processes.

Lead SCADA Security Manager Training

Course Description

Lead SCADA Security Manager training enables you to develop the necessary expertise to plan, design, and implement an effective program to protect SCADA systems. In addition, you will be able to understand common Industrial Control System (ICS) threats, vulnerabilities, risks related to the Industrial Control Systems (ICS) and techniques used to manage these risks. This training focuses on several aspects of security management and skills related to SCADA/ICS security.  

Lead SCADA Security Manager training course is designed by industry experts with in-depth experience in SCADA and Industrial Control Systems Security. Unlike other trainings, this training course concentrates specifically on the knowledge and skills needed by a professional seeking to advice on, or manage risks related to SCADA environments and systems. Given the high profile nature and the significant impacts associated with such environments, a holistic professional approach to security is needed and that is exactly what this course is designed to provide.

In addition, to acquire the theoretical knowledge needed by a SCADA Security Manager, a comprehensive methodology for the implementation of a SCADA Security program is presented. Thus, at the end of this course, you will gain knowledge on how to effectively implement a security program for SCADA/ICS systems.

After mastering all the necessary concepts of SCADA Security, you can sit for the exam and apply for a “PECB Certified Lead SCADA Security Manager” credential. By holding a PECB Lead SCADA Security Manager Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead a team in managing SCADA Security.

  • Understand and explain the purpose and risks to SCADA systems, Distributed Control Systems and Programmable Logic Controllers
  • Understand the risks faced by these environments and the appropriate approaches to manage such risks
  • Develop the expertise to support a pro-active SCADA Security program, including policies and vulnerability management
  • Define and design network architecture incorporating defense in advanced security controls for SCADA
  • Explain the relationship between management, operational and technical controls in a SCADA Security program
  • Improve the ability to design resilient and high availability SCADA systems
  • Learn how to manage a program of effective security testing activities

This certification is aimed at those who are:

  • Security professionals interested in acquiring  SCADA security professional skills
  • IT professionals looking to enhance their technical skills and knowledge
  • IT and Risk Managers seeking a more detailed understanding of ICS and SCADA systems
  • SCADA system developers
  • SCADA engineers and operators
  • SCADA IT professionals

ISO/IEC 27032-Cyber security Training Overview

The international standard ISO/IEC 27032 is intended to emphasize the role of different securities in the Cyberspace, regarding information security, network and internet security, and critical information infrastructure protection (CIIP). ISO/IEC 27032 as an international standard provides a policy framework to address the establishment of trustworthiness, collaboration, exchange of information, and technical guidance for system integration between stakeholders in the cyberspace.

ISO 27032 Foundation Training

Course Description

The rise of cyberspace during the digital revolution consequentially gave birth to cyber threats and cybersecurity. The ISO/IEC 27032 Foundation training course introduces the main concepts and requirements of a cybersecurity program, including stakeholders in cyberspace, attack mechanisms, and information sharing and coordination. 

The training course is followed by the certification exam. If you pass, you can apply for the “PECB Certified ISO/IEC 27032 Foundation” credential, which demonstrates your knowledge of the fundamental concepts, principles, and techniques of cybersecurity.

  • Understand the basic concepts and principles of cybersecurity 
  • Acknowledge the correlation between ISO/IEC 27032, NIST cybersecurity framework, and other standards and frameworks
  • Understand the approaches, methods, and techniques used in cybersecurity

This certification is aimed at those who are:

  • Individuals involved in cybersecurity and information security 
  • Individuals interested in the field of cybersecurity
  • Individuals interested in pursuing a career in cybersecurity

ISO/IEC 27032 Lead Cybersecurity Manager

Course Description

ISO/IEC 27032 Lead Cybersecurity Manager training enables you to acquire the expertise and competence needed to support an organization in implementing and managing a Cybersecurity program based on ISO/IEC 27032 and NIST Cybersecurity framework. During this training course, you will gain a comprehensive knowledge of Cybersecurity, the relationship between Cybersecurity and other types of IT security, and stakeholders’ role in Cybersecurity. 

After mastering all the necessary concepts of Cybersecurity, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27032 Lead Cybersecurity Manager” credential. By holding a PECB Lead Cybersecurity Manager Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead a team in managing Cybersecurity.

  • Acquire comprehensive knowledge on the elements and operations of a Cybersecurity Program in conformance with ISO/IEC 27032 and NIST Cybersecurity framework
  • Acknowledge the correlation between ISO 27032, NIST Cybersecurity framework and other standards and operating frameworks
  • Master the concepts, approaches, standards, methods and techniques used to effectively set up, implement, and  manage a Cybersecurity program within an organization 
  • Learn how to interpret the guidelines of ISO/IEC 27032 in the specific context of an organization
  • Master the necessary expertise to plan, implement, manage, control and maintain a Cybersecurity Program as specified in ISO/IEC 27032 and NIST Cybersecurity framework 
  • Acquire the necessary expertise to advise an organization on the best practices for managing Cybersecurity 

This certification is aimed at those who are:

  • Cybersecurity professionals
  • Information Security experts 
  • Professionals seeking to manage a Cybersecurity program
  • Individuals responsible to develop a Cybersecurity program
  • IT specialists
  • Information Technology expert advisors
  • IT professionals looking to enhance their technical skills and knowledge

Penetration Testing Training Overview

A penetration test is a practice of assessing the security of an IT infrastructure by securely trying to exploit vulnerabilities that may exist in operating systems, inappropriate configurations, application errors, or end-user behavior. The penetration testing is an attempt to test the efficiency of security measures and discover any potential exploits or backdoors that may be present in computer systems; which hackers and cyber criminals can gain unauthorized access or conduct malicious activities. In addition, penetration testing is an advanced tool to detect, analyze and set protective constraints to the IT infrastructure, in order to reduce remediation of financial losses against malicious activities.   

Lead Pen Test Professional

Course Description

Lead Pen Test Professional training enables you to develop the necessary expertise to lead a professional penetration test by using a mix of practical techniques and management skills. 

This course is designed by industry experts with in-depth experience in the Penetration Testing field. Unlike other trainings, this training course is focused specifically on the knowledge and skills needed by professionals looking to lead or take part in a penetration test. It drills down into the latest technical knowledge, tools and techniques in key areas including infrastructure, Web Application security, Mobile security and Social Engineering. In addition, this course concentrates on how to practically apply what is learned on current day-to-day penetration testing and does not expand on unrelated, dated or unnecessary theoretical concepts. 

Along with the in-depth hands-on practical skills, this training course equips you with the management skills you need to lead a penetration test, taking into account business risks and key business issues. The individuals who complete the course have the right blend of the real business and technical competencies needed to be a respected, understood and professional penetration tester. On the last day of the training course, you will get to use the skills learned in a comprehensive capture and flag penetration testing exercises. 

  • Learn how to interpret and illustrate the main Penetration Testing concepts and principles
  • Understand the core technical knowledge needed to organize and carry out an effective set of Pen Tests
  • Learn how to effectively plan a Penetration Test and identify a scope which is suitable and appropriate based on risk
  • Acquire hands-on practical skills and knowledge on relevant tools and techniques used to efficiently conduct a Penetration Testing
  • Learn how to effectively manage the time and resources needed to scale a specific Penetration Test

This certification is aimed at those who are:

  • IT professionals looking to enhance their technical skills and knowledge
  • Auditors looking to understand the Penetration Testing processes
  • IT and Risk managers seeking a more detailed understanding of the appropriate and beneficial use of Penetration Tests
  • Incident handlers and Business Continuity professionals looking to use testing as part of their testing regimes
  • Penetration testers
  • Ethical hackers
  • Cybersecurity professionals

Computer Forensics Training Overview

Computer Forensics, also known as Cyber Forensics refers to the analysis of information in the computer systems, with the objective of finding any digital evidence that can be used for legal proceedings, but also to discover the cause of an incident. Computer forensics is the process of extracting data and information from computer systems to function as digital evidence for civic purposes, or in most cases to prove and legally impeach cybercrime.

The purpose of computer forensics is to provide forensic practices, legal processes, and ethical principles to assure reliable and detailed digital evidence that can be used for the courtroom needs. The objective of computer forensics is to guarantee a well-structured investigation and a follow-up of processes in order to resolve incidents and malfunctions in an organization. 

Computer Forensics Foundation

Course Description

Computer Forensics Foundation training enables you to learn the basic elements to implement Computer Forensics processes. During this training course, you will be able to understand computer forensics tools that are used to implement the forensics evidence recovery and analytical processes.
 
After completing this course, you can sit for the exam and apply for the “PECB Certified Computer Forensics Foundation” credential. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, processes and management approach. 
  • Understand the basic concepts of Computer Forensics 
  • Understand the basic processes of Computer Forensics
  • Understand the approaches, methods and techniques used to effectively manage Computer Forensics Processes

This certification is aimed at those who are:

  • Individuals interested in Computer Forensics Processes
  • Individuals seeking to gain knowledge about the main processes of Computer Forensics
  • Individuals interested to pursue a career in Computer Forensics

Lead Forensics Examiner

Course Description

Lead Computer Forensics Examiner training enables you to acquire the necessary expertise to perform Computer Forensics processes in order to obtain complete and reliable digital evidence. During this training course, you will also gain a thorough understanding of Computer Forensics fundamentals, based on the best practices used to perform forensics evidence recovery and analytical techniques. This training course is focused on core skills required to collect and analyze data from Windows, Mac OS X, and Linux operating systems, and also from mobile devices.

After mastering all the necessary concepts of Computer Forensics processes, you can sit for the exam and apply for a “PECB Certified Lead Computer Forensics Examiner” credential. By holding a PECB Lead Computer Forensics Examiner Certificate, you will be able to prove that you have the expertise to lead advanced forensic investigations and conduct forensics analysis, reporting, and evidence acquisition. 

  • Understand the roles and responsibilities of the Lead Computer Forensics examiner during digital forensic investigation 
  • Understand the purpose of electronic media examination and its correlation with common standards and methodologies 
  • Comprehend the correct sequence of steps of a computer incident investigation and digital forensic operation 
  • Understand the common commercial and open source tools that may be used during incident investigation and digital forensic operations 
  • Acquire the necessary competencies to plan and execute a computer forensics operation and also implement and maintain a safety network to protect evidence

This certification is aimed at those who are:

  • Computer Forensics specialists
  • Computer Forensics consultants
  • Cybersecurity professionals
  • Cyber intelligence analysts
  • Electronic data analysts
  • Specialists in computer evidence recovery
  • Professionals working or interested in law enforcement
  • Professionals seeking to advance their knowledge in Computer Forensics analysis
  • Information Security team members
  • Information technology expert advisors
  • Individuals responsible for examining media to extract and disclose data
  • IT Specialists