Tallinn University of Technology

Aim of the course:

Upon successfully completing the training course, you will be able to:
- Explain the fundamental concepts of NIS 2 Directive and its requirements
- Obtain a thorough comprehension of the principles, strategies, methodologies, and tools necessary for implementing and
efficiently managing a cybersecurity program in compliance with NIS 2 Directive
- Learn how to interpret and implement NIS 2 Directive requirements in the specific context of an organization
- Initiate and plan the implementation of NIS 2 Directive requirements, by utilizing PECB’s methodology and other best practices
- Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and
maintaining a cybersecurity program in compliance with NIS 2 Directive

Target group:

This training course is intended for:
- Cybersecurity professional seeking to gain a thorough understanding of the requirements of NIS 2 Directive and learn
practical strategies to implement robust cybersecurity measures
- IT managers and professionals aiming to gain insights on implementing secure systems and improve the resilience of
critical systems
- Government and regulatory officials responsible for enforcing the NIS 2 Directive

Prerequisites:

This training course is intended for:
- Cybersecurity professional seeking to gain a thorough understanding of the requirements of NIS 2 Directive and learn
practical strategies to implement robust cybersecurity measures
- IT managers and professionals aiming to gain insights on implementing secure systems and improve the resilience of
critical systems
- Government and regulatory officials responsible for enforcing the NIS 2 Directive

Topics:

Day 1 Introduction to NIS 2 Directive and initiation of the NIS 2 Directive implementation
- Training course objectives and structure
- NIS 2 Directive
- Standards and regulatory frameworks
- Overview of NIS 2 Directive
- Initiation of the NIS 2 Directive implementation
- The organization and its context

Day 2 Analysis of NIS 2 Directive compliance program, asset management, and risk management
- Cybersecurity governance
- Analysis of the NIS 2 Directive compliance program
- Asset management
- Risk management

Day 3 Infrastructure and application security controls, incident and crisis management, and
business continuity
- Infrastructure and application security controls
- Incident management
- Crisis management
- Business continuity

Day 4 Communication, testing, monitoring, and continual improvement in cybersecurity
- Communication
- Awareness and training
- Testing in cybersecurity
- Measuring and reporting performance and metrics
- Continual improvement
- Closing of the training course

Day 5 Certification Exam

Study results:

Upon successfully completing the training course, you will be able to:
- Explain the fundamental concepts of NIS 2 Directive and its requirements
- Obtain a thorough comprehension of the principles, strategies, methodologies, and tools necessary for implementing and
efficiently managing a cybersecurity program in compliance with NIS 2 Directive
- Learn how to interpret and implement NIS 2 Directive requirements in the specific context of an organization
- Initiate and plan the implementation of NIS 2 Directive requirements, by utilizing PECB’s methodology and other best practices
- Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and
maintaining a cybersecurity program in compliance with NIS 2 Directive

Language:

English

Volume:

autonomous/other study: 3 academic hours

Lector:

Andro Kull, PhD

Contact:

Eda Kaljo, 5100780, eda.kaljo@taltech.ee

Price:

490 € + VAT/participant

Registration deadline:

13.02.2024 23:59

Location:

veebis

Location:

veebis

Price:

490 € + VAT/participant

Volume:

academic hoursautonomous/other study:
/3 academic hours

Contact:

Eda Kaljo, 5100780, eda.kaljo@taltech.ee