• PECB

  • Certified NIST Cybersecurity Consultant

    4 Days
    This four-day course uses the NIST Cybersecurity Framework, and NIST v2 cybersecurity standards, enabling participants to strengthen organisational resilience and compliance. Learners will explore core NIST publications, including NIST SP 800-12 for security fundamentals, NIST SP 800-53 for implementing controls, NIST SP 800-171 for safeguarding Controlled Unclassified Information, and the NIST Risk Management Framework.

    Submit an Inquiry
  • CMMC Foundations

    2 Days
    The PECB CMMC Foundations training course allows you to learn more about the structure of the CMMC model including CMMC levels, domains, capabilities, processes, and practices. You will also gain basic knowledge related to the CMMC ecosystem, the CMMC assessment process and methodology, and the CMMC Code of Professional Conduct.

    Submit an Inquiry
  • ISA/IEC 62443 Lead Implementer

    4 Days
    This 3-day course provides a comprehensive introduction to the ISA/IEC 62443 standards, focusing on the management perspective for securing industrial automation and control systems (IACS). Participants will gain a solid understanding of the key concepts, structures, and applicability of the standard, and learn how to establish and implement an effective IACS security programme. Covering both foundational knowledge and practical application.

    Submit an Inquiry
  • ISO 27001 Transition

    1 Day
    The new version of ISO/IEC 27001 has been recently published and is now aligned with the new version of ISO/IEC 27002, which was published in February, 2022. The major changes between ISO/IEC 27001:2022 and ISO/IEC 27001:2013 are noticed in the information security controls of Annex A, whereas a few other minor changes are present in the clauses of the standard too. Furthermore, the title of ISO/IEC 27001:2022 differs from the title of ISO/IEC 27001:2013.

    Submit an Inquiry
  • NIS 2 Directive Foundation

    2 Days
    The NIS 2 Directive Foundation training course outlines the essential insights necessary for understanding the requirements of NIS 2 Directive regarding cybersecurity measures. It provides the core concepts required to support organizations in the initial phases of planning, implementation, and management of cybersecurity programs.

    Submit an Inquiry

Subscribe to Newsletter

Enter your email address to register to our newsletter subscription delivered on regular basis! 

CONTACT US     ABOUT     PRIVACY   BLOG

© Copyright GTP Computrain, Limited 2025