Aim of the course:
Upon successfully completing the training course, you will be able to:
- Explain the fundamental concepts of NIS 2 Directive and its requirements
- Obtain a thorough comprehension of the principles, strategies, methodologies, and tools necessary for implementing and
efficiently managing a cybersecurity program in compliance with NIS 2 Directive
- Learn how to interpret and implement NIS 2 Directive requirements in the specific context of an organization
- Initiate and plan the implementation of NIS 2 Directive requirements, by utilizing PECB’s methodology and other best practices
- Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and
maintaining a cybersecurity program in compliance with NIS 2 Directive
Target group:
This training course is intended for:
- Cybersecurity professional seeking to gain a thorough understanding of the requirements of NIS 2 Directive and learn
practical strategies to implement robust cybersecurity measures
- IT managers and professionals aiming to gain insights on implementing secure systems and improve the resilience of
critical systems
- Government and regulatory officials responsible for enforcing the NIS 2 Directive
Prerequisites:
This training course is intended for:
- Cybersecurity professional seeking to gain a thorough understanding of the requirements of NIS 2 Directive and learn
practical strategies to implement robust cybersecurity measures
- IT managers and professionals aiming to gain insights on implementing secure systems and improve the resilience of
critical systems
- Government and regulatory officials responsible for enforcing the NIS 2 Directive
Topics:
Day 1 Introduction to NIS 2 Directive and initiation of the NIS 2 Directive implementation
- Training course objectives and structure
- NIS 2 Directive
- Standards and regulatory frameworks
- Overview of NIS 2 Directive
- Initiation of the NIS 2 Directive implementation
- The organization and its context
Day 2 Analysis of NIS 2 Directive compliance program, asset management, and risk management
- Cybersecurity governance
- Analysis of the NIS 2 Directive compliance program
- Asset management
- Risk management
Day 3 Infrastructure and application security controls, incident and crisis management, and
business continuity
- Infrastructure and application security controls
- Incident management
- Crisis management
- Business continuity
Day 4 Communication, testing, monitoring, and continual improvement in cybersecurity
- Communication
- Awareness and training
- Testing in cybersecurity
- Measuring and reporting performance and metrics
- Continual improvement
- Closing of the training course
Day 5 Certification Exam
Study results:
Upon successfully completing the training course, you will be able to:
- Explain the fundamental concepts of NIS 2 Directive and its requirements
- Obtain a thorough comprehension of the principles, strategies, methodologies, and tools necessary for implementing and
efficiently managing a cybersecurity program in compliance with NIS 2 Directive
- Learn how to interpret and implement NIS 2 Directive requirements in the specific context of an organization
- Initiate and plan the implementation of NIS 2 Directive requirements, by utilizing PECB’s methodology and other best practices
- Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and
maintaining a cybersecurity program in compliance with NIS 2 Directive
Language:
English
Lector:
Andro Kull, PhD
Volume:
autonomous/other study: 3 academic hours
Curriculum group:
Computer use
Contact:
Eda Kaljo, 5100780, eda.kaljo@taltech.ee
Price:
490 € + VAT/participant
Registration deadline:
13.02.2024 23:59
Comment:
Eelnevale kursusele reg siin: https://register.taltech.ee/tois.php?id=26999&koolitus=39186
Location:
veebis
Location:
veebis
Price:
490 € + VAT/participant
Volume:
academic hoursautonomous/other study:
/3 academic hours
Curriculum group:
Computer use
Contact:
Eda Kaljo, 5100780, eda.kaljo@taltech.ee