Opleiding PECB IT Cyber Security Specialist.

Vergelijkbare documenten
Opleiding PECB ISO 9001 Quality Manager.

Opleiding PECB IT Governance.

Ervaringen met begeleiding FTA cursus Deployment of Free Software Systems

BABOK meets BiSL. Marcel Schaar, IIBA Dutch Chapter Mark Smalley, ASL BiSL Foundation Jan de Vries, ASL BiSL Foundation. Kennissessie, 19 januari 2016

OPEN TRAINING. Onderhandelingen met leveranciers voor aankopers. Zeker stellen dat je goed voorbereid aan de onderhandelingstafel komt.

Enterprisearchitectuur

Activant Prophet 21. Prophet 21 Version 12.0 Upgrade Information

Learning objectives. Course agenda

Enterprise Portfolio Management

Managen van digitale competenties (e-skills) 2017 Paul P.M. Willockx MSc. AGENDA

Innovaties in de chronische ziekenzorg 3e voorbeeld van zorginnovatie. Dr. J.J.W. (Hanneke) Molema, Prof. Dr. H.J.M.

Process Mining and audit support within financial services. KPMG IT Advisory 18 June 2014

NETWORK CHARTER. #ResourceEfficiency

General info on using shopping carts with Ingenico epayments

ISA SP-99 Manufacturing and Control Systems Security

Certified Ethical Hacker v9 (CEH v9)

SYMPOSIUM ERGOTHERAPEUTEN

EUROPEAN SCHOOLNET ACADEMY SCHOOL EDUCATION GATEAWAY TEACHER ACADEMY

Intercultural Mediation through the Internet Hans Verrept Intercultural mediation and policy support unit

Impact en disseminatie. Saskia Verhagen Franka vd Wijdeven

Enterprise Architectuur. een duur begrip, maar wat kan het betekenen voor mijn gemeente?

Besluitenlijst CCvD HACCP/ List of decisions National Board of Experts HACCP

Topic 10-5 Meeting Children s Intellectual Needs

Summary 124

E-learning maturity model. Hilde Van Laer

ISO/IEC 20000, van standaardkwaliteit naar kwaliteitsstandaard. NGI Limburg 30 mei 2007

Wat is Interaction Design?

ISO/IEC Governance of InformationTechnology. Yvette Backer ASL BiSL Foundation. 16 juni ISO Governance of Information Technoloy 1

Besluitenlijst CCvD HACCP/ List of decisions National Board of Experts HACCP

Introductie in flowcharts

STORM Groep b.v. We will get there in time

Seriously Seeking Security

Maturity van security architectuur

Opleiding business consultant.

2019 SUNEXCHANGE USER GUIDE LAST UPDATED

International Leiden Leadership Programme

Integratie van Due Diligence in bestaande risicomanagementsystemen volgens NPR 9036

Certified Ethical Hacker v9 (CEH v9)

Chapter 4 Understanding Families. In this chapter, you will learn

BiZZdesign. Bouwen van sterke en wendbare organisaties met behulp van standaarden, methode, technieken en tools. Research & Development

Fidelity of a Strengths-based method for Homeless Youth

OMSCHRIJVING. Opleiding IT PRO

Enkele klanten. Copyright 2012 IP Bank BV

Competencies atlas. Self service instrument to support jobsearch. Naam auteur

2010 Integrated reporting

Patiëntenparticipatie in

Ontwikkeling van simulationbased serious games ten behoeve van logistieke besluitvorming

Maatschappelijk Verantwoord Inkopen (MVI) ISO Karin van IJsselmuide

FOD VOLKSGEZONDHEID, VEILIGHEID VAN DE VOEDSELKETEN EN LEEFMILIEU 25/2/2016. Biocide CLOSED CIRCUIT

Modulebeschrijving voor MOD1

Disclosure belangen spreker

Windows Server 2003 EoS. GGZ Nederland

Conferentie Examinering in de bpv 31 mei 2013 Workshop : handboeken BPV en het buitenland

ROUNDER SENSE OF PURPOSE verder werken aan de leerkracht-competenties duurzaamheid

Understanding and being understood begins with speaking Dutch

Heropnamen? Aan de slag!

Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education. Published

Internationaliseren van leeruitkomsten: vier voorbeelden uit de praktijk. Jos Beelen Utrecht, 5 februari 2015

Business Architectuur vanuit de Business

Hoe start ik een test competence center of excellence? Thomas Veltman

INFORMATIEBIJEENKOMST ESFRI ROADMAP 2016 HANS CHANG (KNAW) EN LEO LE DUC (OCW)

ANGSTSTOORNISSEN EN HYPOCHONDRIE: DIAGNOSTIEK EN BEHANDELING (DUTCH EDITION) FROM BOHN STAFLEU VAN LOGHUM

Communication about Animal Welfare in Danish Agricultural Education

Certified Ethical Hacker v9 (CEH v9)

Drs. Natasha Dodonova Psycholoog, specialist in kennismanagement en lerende organisaties.

Introduction to KM. Kampala CIKM Workshop 2013 Joost Lieshout

Architecten-debat 21 juni 2006 PI GvIB Themamiddag. Renato Kuiper. Principal Consultant Information Security

ibestuur Mastercourse Architectuur: Bestuur en Architectuur ibestuur 2015 Lineke Sneller

Brochure COBIT 5.0 Foundation

Product Quality Management, onze toekomst René Tuinhout

ISO/IEC in een veranderende IT wereld

MyDHL+ Uw accountnummer(s) delen

Alcohol policy in Belgium: recent developments

CTI SUITE TSP DETAILS

ISACA NL C**** in a day Inspiratiesessie CRISC


RECEPTEERKUNDE: PRODUCTZORG EN BEREIDING VAN GENEESMIDDELEN (DUTCH EDITION) FROM BOHN STAFLEU VAN LOGHUM

25/11/2016. ISO 9001:2015 en kennis. Kennismaken met. Annelies Kleijsen Jan Kingma

Autodesk Academic Certification Program Overview. Worldwide Education Programs 1

2690,00 excl. BTW. Belangrijk: Deelnemers dienen zelf een laptop mee te brengen voor de hands-on icloud-lab-oefeningen. #120466

VALUE ENGINEERING: THE H E G A G ME! E

SAMPLE 11 = + 11 = + + Exploring Combinations of Ten + + = = + + = + = = + = = 11. Step Up. Step Ahead

How are Total Cost of Ownership and Whole Life Value methods used? For AMNL 7 th June 2017

De evaluatie van multidisciplinaire crisis(oefeningen) in de Nederlandse praktijk

ETS 4.1 Beveiliging & ETS app concept

MyDHL+ ProView activeren in MyDHL+

Creating a marketplace where expertise is made available through videoconferencing. Roland Staring Community Support Manager roland.staring@surfnet.

Support Center GIS-Flanders

Bedrijfscontinuïteit met behulp van een BCMS

5-point scale: Strongly disagree OOOOO Strongly agree O No opinion / n.a. Zeer mee oneens OOOOO Zeer mee eens O Geen mening / n.v.t.

Microsoft trainingen en certificeringen: dé bouwstenen voor uw carrière in de ICT

"Baselines: eigenwijsheid of wijsheid?"

ISO CTG Europe

3254,90 incl. BTW OMSCHRIJVING PROGRAMMA. Opleiding IT PRO

Contents. List of figures. List of tables. OGC s foreword. 4 Case study 29. Chief Examiner s foreword. 5 The examination and exam preparation 37

Innovative SUMP-Process in Northeast-Brabant

JOB OPENING OPS ENGINEER

Cursus informatie ITIL Foundation

Taco Schallenberg Acorel

Transcriptie:

Opleiding PECB IT Cyber Security Specialist www.bpmo-academy.nl

Wat doet een IT Cyber Security Specialist? De Cyber Security Specialist is verantwoordelijk voor de beveiliging van de technologische infrastructuur van een bedrijf. De Security Specialist stelt een plan op om ervoor te zorgen dat een computernetwerk of website niet geïnfiltreerd kan worden door niet-geautoriseerde personen. Ook geeft de Security Specialist advies over de beveiliging van informatiesystemen die nog gebouwd moeten worden. Als de Security Specialist bovendien in vast dienstverband werkt verzorgt hij vaak ook het onderhoud van de beveiliging en garandeert zo de voortdurende bewaking van het systeem. Naast het implementeren van (updates in) beveiligingssoftware is het natuurlijk ook belangrijk voor de Sercurity Specialist om een veiligheidsprotocol op te stellen. Het zijn niet alleen zwakke plekken in het systeem die toegang geven tot een netwerk, maar ook de gebruikers zelf. Deze moeten dus geïnstrueerd worden over hun werkgedrag en computergebruik, om zo te voorkomen dat ze per ongeluk virussen via het Internet binnenhalen of op andere manieren voor veiligheidsproblemen zorgen. Hoe lang duurt de opleiding? De opleiding tot IT Cyber Security Specialist duurt 6 maanden. Uw 10-daagse theorie training wordt aangevuld met een 5,5 maanden durende praktijkgerichte stage bij een of meerdere bedrijven. Kosten van de opleiding De opleiding kost 5000,00 exclusief 21% btw. Er bestaat de mogelijkheid dat de werkgever de opleidingskosten (deels) voor haar rekening wil nemen. Neem hierover met ons contact op. Onderdelen van het opleidingstraject - ISO 27032 Lead Cyber Security Manager (5 dagen) - Lean Pen Test Professional (5 dagen)

ISO 27032 Lead Cybersecurity Manager Why should you attend? ISO/IEC 27032 Lead Cybersecurity Manager training enables you to acquire the expertise and competence needed to support an organization in implementing and managing a Cybersecurity program based on ISO/IEC 27032 and NIST Cybersecurity framework. During this training course, you will gain a comprehensive knowledge of Cybersecurity, the relationship between Cybersecurity and other types of IT security, and stakeholders role in Cybersecurity. After mastering all the necessary concepts of Cybersecurity, you can sit for the exam and apply for a PECB Certified ISO/IEC 27032 Lead Cybersecurity Manager credential. By holding a PECB Lead Cybersecurity Manager Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead a team in managing Cybersecurity. Who should attend? Cybersecurity professionals Information Security experts Professionals seeking to manage a Cybersecurity program Individuals responsible to develop a Cybersecurity program IT specialists Information Technology expert advisors IT professionals looking to enhance their technical skills and knowledge Learning objectives Acquire comprehensive knowledge on the elements and operations of a Cybersecurity Program in conformance with ISO/IEC 27032 and NIST Cybersecurity framework Acknowledge the correlation between ISO 27032, NIST Cybersecurity framework and other standards and operating frameworks Master the concepts, approaches, standards, methods and techniques used to effectively set up, implement, and manage a Cybersecurity program within an organization Learn how to interpret the guidelines of ISO/IEC 27032 in the specific context of an organization Master the necessary expertise to plan, implement, manage, control and maintain a Cybersecurity Program as specified in ISO/IEC 27032 and NIST Cybersecurity framework Acquire the necessary expertise to advise an organization on the best practices for managing Cybersecurity

Educational approach This training is based on both theory and best practices used in the implementation and management of a Cybersecurity Program Lecture sessions are illustrated with examples based on case studies Practical exercises are based on a case study which includes role playing and discussions Practical tests are similar to the Certification Exam Prerequisites A fundamental understanding of ISO/IEC 27032 and comprehensive knowledge of Cybersecurity.

Lead Pen Test Professional Why should you attend? Lead Pen Test Professional training enables you to develop the necessary expertise to lead a professional penetration test by using a mix of practical techniques and management skills. This course is designed by industry experts with in-depth experience in the Penetration Testing field. Unlike other trainings, this training course is focused specifically on the knowledge and skills needed by professionals looking to lead or take part in a penetration test. It drills down into the latest technical knowledge, tools and techniques in key areas including infrastructure, Web Application security, Mobile security and Social Engineering. In addition, this course concentrates on how to practically apply what is learned on current day-to-day penetration testing and does not expand on unrelated, dated or unnecessary theoretical concepts. Along with the in-depth hands-on practical skills, this training course equips you with the management skills you need to lead a penetration test, taking into account business risks and key business issues. The individuals who complete the course have the right blend of the real business and technical competencies needed to be a respected, understood and professional penetration tester. On the last day of the training course, you will get to use the skills learned in a comprehensive capture and flag penetration testing exercises. Who should attend IT professionals looking to enhance their technical skills and knowledge Auditors looking to understand the Penetration Testing processes IT and Risk managers seeking a more detailed understanding of the appropriate and beneficial use of Penetration Tests Incident handlers and Business Continuity professionals looking to use testing as part of their testing regimes Penetration testers Ethical hackers Cybersecurity professionals Learning objectives Learn how to interpret and illustrate the main Penetration Testing concepts and principles Understand the core technical knowledge needed to organize and carry out an effective set of Pen Tests Learn how to effectively plan a Penetration Test and identify a scope which is suitable and appropriate based on risk Acquire hands-on practical skills and knowledge on relevant tools and techniques used to efficiently conduct a Penetration Testing

Learn how to effectively manage the time and resources needed to scale a specific Penetration Test Educational approach This training is based on both theory and best practices used in Pen Testing Lecture sessions are illustrated with examples based on case studies Practical exercises are based on a case study which includes role playing and discussions Practical tests are similar to the Certification Exam Prerequisites A fundamental understanding of Penetration Testing and comprehensive knowledge of Cybersecurity.