Eesmärk:
Upon successfully completing the training course, you will be able to:
- Explain the fundamental concepts of NIS 2 Directive and its requirements
- Obtain a thorough comprehension of the principles, strategies, methodologies, and tools necessary for implementing and
efficiently managing a cybersecurity program in compliance with NIS 2 Directive
- Learn how to interpret and implement NIS 2 Directive requirements in the specific context of an organization
- Initiate and plan the implementation of NIS 2 Directive requirements, by utilizing PECB’s methodology and other best practices
- Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and
maintaining a cybersecurity program in compliance with NIS 2 Directive
Sihtgrupp:
This training course is intended for:
- Cybersecurity professional seeking to gain a thorough understanding of the requirements of NIS 2 Directive and learn
practical strategies to implement robust cybersecurity measures
- IT managers and professionals aiming to gain insights on implementing secure systems and improve the resilience of
critical systems
- Government and regulatory officials responsible for enforcing the NIS 2 Directive
Eeldused:
This training course is intended for:
- Cybersecurity professional seeking to gain a thorough understanding of the requirements of NIS 2 Directive and learn
practical strategies to implement robust cybersecurity measures
- IT managers and professionals aiming to gain insights on implementing secure systems and improve the resilience of
critical systems
- Government and regulatory officials responsible for enforcing the NIS 2 Directive
Teemad:
Day 1 Introduction to NIS 2 Directive and initiation of the NIS 2 Directive implementation
- Training course objectives and structure
- NIS 2 Directive
- Standards and regulatory frameworks
- Overview of NIS 2 Directive
- Initiation of the NIS 2 Directive implementation
- The organization and its context
Day 2 Analysis of NIS 2 Directive compliance program, asset management, and risk management
- Cybersecurity governance
- Analysis of the NIS 2 Directive compliance program
- Asset management
- Risk management
Day 3 Infrastructure and application security controls, incident and crisis management, and
business continuity
- Infrastructure and application security controls
- Incident management
- Crisis management
- Business continuity
Day 4 Communication, testing, monitoring, and continual improvement in cybersecurity
- Communication
- Awareness and training
- Testing in cybersecurity
- Measuring and reporting performance and metrics
- Continual improvement
- Closing of the training course
Day 5 Certification Exam
Õpiväljund:
Upon successfully completing the training course, you will be able to:
- Explain the fundamental concepts of NIS 2 Directive and its requirements
- Obtain a thorough comprehension of the principles, strategies, methodologies, and tools necessary for implementing and
efficiently managing a cybersecurity program in compliance with NIS 2 Directive
- Learn how to interpret and implement NIS 2 Directive requirements in the specific context of an organization
- Initiate and plan the implementation of NIS 2 Directive requirements, by utilizing PECB’s methodology and other best practices
- Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and
maintaining a cybersecurity program in compliance with NIS 2 Directive
Keel:
Inglise
Maht:
iseseisev/muu õppetöö: 3 akadeemilist õppetundi
Lektor:
Andro Kull, PhD
Kontakt:
Eda Kaljo, 5100780, eda.kaljo@taltech.ee
Hind:
490 € + KM/osaleja
Registreerumise tähtaeg:
17.09.2024 23:59
Kommentaar:
Eelnevale kursusele reg: https://taltech.ee/kursus/39947
Asukoht:
veebis
Asukoht:
veebis
Hind:
490 € + KM/osaleja
Maht:
akadeemilist õppetundiiseseisev/muu õppetöö:
/3 akadeemilist õppetundi
Kontakt:
Eda Kaljo, 5100780, eda.kaljo@taltech.ee