Date: | 20.09.2024 |
Aim of the course: | Upon successfully completing the training course, you will be able to: - Explain the fundamental concepts of NIS 2 Directive and its requirements - Obtain a thorough comprehension of the principles, strategies, methodologies, and tools necessary for implementing and efficiently managing a cybersecurity program in compliance with NIS 2 Directive - Learn how to interpret and implement NIS 2 Directive requirements in the specific context of an organization - Initiate and plan the implementation of NIS 2 Directive requirements, by utilizing PECB’s methodology and other best practices - Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a cybersecurity program in compliance with NIS 2 Directive |
Target group: | This training course is intended for: - Cybersecurity professional seeking to gain a thorough understanding of the requirements of NIS 2 Directive and learn practical strategies to implement robust cybersecurity measures - IT managers and professionals aiming to gain insights on implementing secure systems and improve the resilience of critical systems - Government and regulatory officials responsible for enforcing the NIS 2 Directive |
Prerequisites: | This training course is intended for: - Cybersecurity professional seeking to gain a thorough understanding of the requirements of NIS 2 Directive and learn practical strategies to implement robust cybersecurity measures - IT managers and professionals aiming to gain insights on implementing secure systems and improve the resilience of critical systems - Government and regulatory officials responsible for enforcing the NIS 2 Directive |
Topics: | Day 1 Introduction to NIS 2 Directive and initiation of the NIS 2 Directive implementation - Training course objectives and structure - NIS 2 Directive - Standards and regulatory frameworks - Overview of NIS 2 Directive - Initiation of the NIS 2 Directive implementation - The organization and its context Day 2 Analysis of NIS 2 Directive compliance program, asset management, and risk management - Cybersecurity governance - Analysis of the NIS 2 Directive compliance program - Asset management - Risk management Day 3 Infrastructure and application security controls, incident and crisis management, and business continuity - Infrastructure and application security controls - Incident management - Crisis management - Business continuity Day 4 Communication, testing, monitoring, and continual improvement in cybersecurity - Communication - Awareness and training - Testing in cybersecurity - Measuring and reporting performance and metrics - Continual improvement - Closing of the training course Day 5 Certification Exam |
Study results: | Upon successfully completing the training course, you will be able to: - Explain the fundamental concepts of NIS 2 Directive and its requirements - Obtain a thorough comprehension of the principles, strategies, methodologies, and tools necessary for implementing and efficiently managing a cybersecurity program in compliance with NIS 2 Directive - Learn how to interpret and implement NIS 2 Directive requirements in the specific context of an organization - Initiate and plan the implementation of NIS 2 Directive requirements, by utilizing PECB’s methodology and other best practices - Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a cybersecurity program in compliance with NIS 2 Directive |
Comments: | Eelnevale kursusele reg: https://taltech.ee/kursus/39947 |
Learning outcomes: | Information and Communication Technologies (ICTs) |
Course language: | in English |
Volume: | internship: 3 academic hours |
Lecturer: | Andro Kull, PhD |
Contact: | Eda Kaljo, 5100780, eda.kaljo@taltech.ee |
Price: | 490 EUR + VAT / participant |
Registration deadline: | 17.09.2024 |
Place: | veebis |