| Date: | 23.02.2024 |
| Aim of the course: | Upon successfully completing the training course, you will be able to: - Explain the fundamental concepts of NIS 2 Directive and its requirements - Obtain a thorough comprehension of the principles, strategies, methodologies, and tools necessary for implementing and efficiently managing a cybersecurity program in compliance with NIS 2 Directive - Learn how to interpret and implement NIS 2 Directive requirements in the specific context of an organization - Initiate and plan the implementation of NIS 2 Directive requirements, by utilizing PECB’s methodology and other best practices - Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a cybersecurity program in compliance with NIS 2 Directive |
| Target group: | This training course is intended for: - Cybersecurity professional seeking to gain a thorough understanding of the requirements of NIS 2 Directive and learn practical strategies to implement robust cybersecurity measures - IT managers and professionals aiming to gain insights on implementing secure systems and improve the resilience of critical systems - Government and regulatory officials responsible for enforcing the NIS 2 Directive |
| Prerequisites: | This training course is intended for: - Cybersecurity professional seeking to gain a thorough understanding of the requirements of NIS 2 Directive and learn practical strategies to implement robust cybersecurity measures - IT managers and professionals aiming to gain insights on implementing secure systems and improve the resilience of critical systems - Government and regulatory officials responsible for enforcing the NIS 2 Directive |
| Topics: | Day 1 Introduction to NIS 2 Directive and initiation of the NIS 2 Directive implementation - Training course objectives and structure - NIS 2 Directive - Standards and regulatory frameworks - Overview of NIS 2 Directive - Initiation of the NIS 2 Directive implementation - The organization and its context Day 2 Analysis of NIS 2 Directive compliance program, asset management, and risk management - Cybersecurity governance - Analysis of the NIS 2 Directive compliance program - Asset management - Risk management Day 3 Infrastructure and application security controls, incident and crisis management, and business continuity - Infrastructure and application security controls - Incident management - Crisis management - Business continuity Day 4 Communication, testing, monitoring, and continual improvement in cybersecurity - Communication - Awareness and training - Testing in cybersecurity - Measuring and reporting performance and metrics - Continual improvement - Closing of the training course Day 5 Certification Exam |
| Study results: | Upon successfully completing the training course, you will be able to: - Explain the fundamental concepts of NIS 2 Directive and its requirements - Obtain a thorough comprehension of the principles, strategies, methodologies, and tools necessary for implementing and efficiently managing a cybersecurity program in compliance with NIS 2 Directive - Learn how to interpret and implement NIS 2 Directive requirements in the specific context of an organization - Initiate and plan the implementation of NIS 2 Directive requirements, by utilizing PECB’s methodology and other best practices - Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a cybersecurity program in compliance with NIS 2 Directive |
| Comments: | Eelnevale kursusele reg siin: https://register.taltech.ee/tois.php?id=26999&koolitus=39186 |
| Learning outcomes: | Information and Communication Technologies (ICTs) |
| Course language: | in English |
| Volume: | internship: 3 academic hours |
| Lecturer: | Andro Kull, PhD |
| Contact: | Eda Kaljo, 5100780, eda.kaljo@taltech.ee |
| Price: | 482.1 EUR + VAT / participant |
| Registration deadline: | 13.02.2024 |
| Place: | veebis |