PECB Certified Digitalization and Electronic Archiving Training Course
Master digitalization and electronic retention/archiving
Why should you attend?
This course provides all the critical knowledge required to approach, understand, manage and successfully carry out a digitalization and retention/archiving project, including security, search and risk analysis techniques and the identification of legal, regulatory, contractual and insurance issues. A set of methodological tools is included in the themes covered, to effectively digitize any process and choose the appropriate solution without getting into the details of the related technologies. Finally, the course offers some food for thought on the changes in store for digital data and the new technologies to consider for establishing true data governance.
When you are well versed in all the concepts required for digitalization project, you will be able to take the exam and apply to be a PECB Certified Lead Digitalization and Electronic Archiving Manager. By earning this certificate, you will demonstrate that you have the practical knowledge and professional capacities to support and direct a team in charge of carrying out a digitalization and electronic retention/archiving project.
General information
Certification fees are included on the exam price
Training material containing over 300 pages of information and practical examples will be distributed
A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued
In case of exam failure, you can retake the exam within 12 months for free
Course Outline
Day 1: Awareness of process digitalization and the retention/archiving of digital data
Days 2 and 3: Methodological aspects of a digitalization project
Day 4: Solutions and body of documents
Day 5: Developments and certification exam
Open Training Courses require 5+ participants.
PECB Certified Digitalization and Electronic Archiving Training Course - Booking
PECB Certified Digitalization and Electronic Archiving Training Course - Enquiry
Testimonials (3)
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
The clarity with which it was presented
John McLemore - Motorola Solutions
Course - Deep Learning for Telecom (with Python)
The varied topics
Daniel Lindh - Tele 2 Sverige AB
Course - OpenStack for Telecom
Upcoming Courses
Related Courses
AI Awareness for Telecom
14 HoursAI is a collection of technologies for building intelligent systems capable of understanding data and the activities surrounding the data to make "intelligent decisions". For Telecom providers, building applications and services that make use of AI could open the door for improved operations and servicing in areas such as maintenance and network optimization.
In this course we examine the various technologies that make up AI and the skill sets required to put them to use. Throughout the course, we examine AI's specific applications within the Telecom industry.
Audience
- Network engineers
- Network operations personnel
- Telecom technical managers
Format of the course
- Part lecture, part discussion, hands-on exercises
BSS (BUSINESS SUPPORT SYSTEM) for Telecom
21 HoursBSS Course Contents :
This course is primarily aimed at managers in Telecom operation who need to have 360
view of a) legacy BSS in eTOM b) emerging BSS in NGOSS c) Billing system including
mediation, rating and CDR in details. This course also introduces in new topics like
advanced big data based CRM, Churn management and Fraud Management.
Deep Learning for Telecom (with Python)
28 HoursIn this instructor-led, live training in Egypt, participants will learn how to implement deep learning models for telecom using Python as they step through the creation of a deep learning credit risk model.
By the end of this training, participants will be able to:
- Understand the fundamental concepts of deep learning.
- Learn the applications and uses of deep learning in telecom.
- Use Python, Keras, and TensorFlow to create deep learning models for telecom.
- Build their own deep learning customer churn prediction model using Python.
Fiber Optic Networks (Point to Point and FTTH)
21 HoursThis instructor-led, live training in Egypt (online or onsite) is aimed at intermediate-level network engineers who wish to gain the skills needed to design, install, and maintain fiber optic networks.
By the end of this training, participants will be able to:
- Understand the fundamentals of fiber optic technology.
- Apply network design principles for point-to-point and FTTH networks.
- Install and maintain fiber optic cables and connectors.
- Test and troubleshoot fiber optic networks.
PECB ISO/IEC 27001 Foundation
14 HoursWhy should you attend?
ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001. During this training course, you will be able to understand the different modules of ISMS, including ISMS policy, procedures, performance measurements, management commitment, internal audit, management review and continual improvement.
After completing this course, you can sit for the exam and apply for the “PECB Certified ISO/IEC 27001 Foundation” credential. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, requirements, framework and management approach.
Who should attend?
- Individuals involved in Information Security Management
- Individuals seeking to gain knowledge about the main processes of Information Security Management Systems (ISMS)
- Individuals interested to pursue a career in Information Security Management
Educational approach
- Lecture sessions are illustrated with practical questions and examples
- Practical exercises include examples and discussions
- Practice tests are similar to the Certification Exam
PECB ISO/IEC 27001 Lead Auditor
35 HoursISO/IEC 27001 Lead Auditor
ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
Why should you attend?
During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process.
Based on practical exercises, you will be able to master audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution.
After acquiring the necessary expertise to perform this audit, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Auditor” credential. By holding a PECB Lead Auditor Certificate, you will demonstrate that you have the capabilities and competencies to audit organizations based on best practices.
Who should attend?
- Auditors seeking to perform and lead Information Security Management System (ISMS) certification audits
- Managers or consultants seeking to master an Information Security Management System audit process
- Individuals responsible for maintaining conformance with Information Security Management System requirements
- Technical experts seeking to prepare for an Information Security Management System audit
- Expert advisors in Information Security Management
Learning objectives
- Understand the operations of an Information Security Management System based on ISO/IEC 27001
- Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks
- Understand an auditor’s role to: plan, lead and follow-up on a management system audit in accordance with ISO 19011
- Learn how to lead an audit and audit team
- Learn how to interpret the requirements of ISO/IEC 27001 in the context of an ISMS audit
- Acquire the competencies of an auditor to: plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011
Educational approach
- This training is based on both theory and best practices used in ISMS audits
- Lecture sessions are illustrated with examples based on case studies
- Practical exercises are based on a case study which includes role playing and discussions
- Practice tests are similar to the Certification Exam
ISO 27002 Lead Manager
35 HoursISO/IEC 27002 Lead Manager training enables you to develop the necessary expertise and knowledge to support an organization in implementing and managing Information Security controls as specified in ISO/IEC 27002.
After completing this course, you can sit for the exam and apply for the “PECB Certified ISO/IEC 27002 Lead Manager” credential. A PECB Lead Manager Certification, proves that you have mastered the principles and techniques for the implementation and management of Information Security Controls based on ISO/IEC 27002.
Who should attend?
- Managers or consultants seeking to implement an Information Security Management System (ISMS) based on ISO/IEC 27001 and ISO/IEC 27002
- Project managers or consultants seeking to master the Information Security Management System implementation process
- Individuals responsible for the information security, compliance, risk, and governance, in an organization
- Members of information security teams
- Expert advisors in information technology
- Information Security officers
- Privacy officers
- IT professionals
- CTOs, CIOs and CISOs
Learning objectives
- Master the implementation of Information Security controls by adhering to the framework and principles of ISO/IEC 27002
- Gain a comprehensive understanding of the concepts, approaches, standards, methods and techniques required for the effective implementation and management of Information Security controls
- Comprehend the relationship between the components of Information Security controls, including responsibility, strategy, acquisition, performance, conformance, and human behavior
- Understand the importance of information security for the strategy of the organization
- Master the implementation of information security management processes
- Master the formulation and implementation of security requirements and objectives
Educational approach
- This training is based on both theory and practice
- Sessions of lectures illustrated with examples based on real cases
- Practical exercises based on case studies
- Review exercises to assist the exam preparation
- Practice test similar to the certification exam
General Information
- Certification fees are included on the exam price
- Training material containing over 500 pages of information and practical examples will be distributed to the participants
- A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued to the participants
- In case of exam failure, you can retake the exam within 12 months for free
ISO/IEC 27005 Lead Risk Manager
35 HoursISO/IEC 27005 Lead Risk Manager training enables you to acquire the necessary expertise to support an organization in the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework. During this training course, you will gain a comprehensive knowledge of a process model for designing and developing an Information Security Risk Management program. The training will also contain a thorough understanding of best practices of risk assessment methods such as OCTAVE, EBIOS, MEHARI and harmonized TRA. This training course supports the implementation process of the ISMS framework presented in the ISO/IEC 27001 standard.
After mastering all the necessary concepts of Information Security Risk Management based on ISO/IEC 27005, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27005 Lead Risk Manager” credential. By holding a PECB Lead Risk Manager Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead a team in managing Information Security Risks.
Who should attend?
- Information Security risk managers
- Information Security team members
- Individuals responsible for Information Security, compliance, and risk within an organization
- Individuals implementing ISO/IEC 27001, seeking to comply with ISO/IEC 27001 or individuals who are involved in a risk management program
- IT consultants
- IT professionals
- Information Security officers
- Privacy officers
Examination - Duration: 3 hours
The “PECB Certified ISO/IEC 27005 Lead Risk Manager” exam fully meets the requirements of the PECB Examination and Certification Programme (ECP). The exam covers the following competency domains:
- Domain 1 Fundamental principles and concepts of Information Security Risk Management
- Domain 2 Implementation of an Information Security Risk Management program
- Domain 3 Information security risk assessment
- Domain 4 Information security risk treatment
- Domain 5 Information security risk communication, monitoring and improvement
- Domain 6 Information security risk assessment methodologies
General Information
- Certification fees are included on the exam price
- Training material containing over 350 pages of information and practical examples will be distributed
- A participation certificate of 21 CPD (Continuing Professional Development) credits will be issued
- In case of exam failure, you can retake the exam within 12 months for free
PECB ISO/IEC 27001 Lead Implementer
35 HoursInformation security threats and attacks increase and improve constantly. The best form of defense against them is the proper implementation and management of information security controls and best practices. Information security is also a key expectation and requirement of customers, legislators, and other interested parties.
This training course is designed to prepare participants in implementing an information security management system (ISMS) based on ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement.
After attending the training course, you can take the exam. If you successfully pass it, you can apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which demonstrates your ability and practical knowledge to implement an ISMS based on the requirements of ISO/IEC 27001.
Who Can Attend?
- Project managers and consultants involved in and concerned with the implementation of an ISMS
- Expert advisors seeking to master the implementation of an ISMS
- Individuals responsible for ensuring conformity to information security requirements within an organization
- Members of an ISMS implementation team
General information
- Certification fees are included in the exam price
- Training material containing over 450 pages of information and practical examples will be distributed
- A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued
- In case of exam failure, you can retake the exam within 12 months free of charge
Educational approach
- This training course contains essay-type exercises, multiple-choice quizzes, examples, and best practices used in the implementation of an ISMS.
- The participants are encouraged to communicate with each other and engage in discussions when completing quizzes and exercises.
- The exercises are based on a case study.
- The structure of the quizzes is similar to that of the certification exam.
Learning objectives
This training course will help you:
- Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of an ISMS
- Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
- Understand the operation of an information security management system and its processes based on ISO/IEC 27001
- Learn how to interpret and implement the requirements of ISO/IEC 27001 in the specific context of an organization
- Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an ISMS
Certified Lead Ethical Hacker
35 HoursWhy should you attend?
The Certified Lead Ethical Hacker training course enables you to develop the necessary expertise to perform information system penetration tests by applying recognized principles, procedures and penetration testing techniques, in order to identify potential threats on a computer network. During this training course, you will gain the knowledge and skills to manage a penetration testing project or team, as well as plan and perform internal and external pentests, in accordance with various standards such as the Penetration Testing Execution Standard (PTES) and the Open Source Security Testing Methodology Manual (OSSTMM). Moreover, you will also gain a thorough understanding on how to draft reports and countermeasure proposals. Additionally, through practical exercises, you will be able to master penetration testing techniques and acquire the skills needed to manage a pentest team, as well as customer communication and conflict resolution.
The Certified Lead Ethical Hacking training course provides a technical vision of information security through ethical hacking, using common techniques such as information gathering and vulnerability detection, both inside and outside of a business network.
The training is also compatible with the NICE (The National Initiative for Cybersecurity Education) Protect and Defend framework.
After mastering the necessary knowledge and skills in ethical hacking, you can take the exam and apply for the "PECB Certified Lead Ethical Hacker" credential. By holding a PECB Lead Ethical Hacker certificate, you will be able to demonstrate that you have acquired the practical skills for performing and managing penetration tests according to best practices.
Who should attend?
- Individuals interested in IT Security, and particularly in Ethical Hacking, to either learn more about the topic or to start a process of professional reorientation.
- Information security officers and professionals seeking to master ethical hacking and penetration testing techniques.
- Managers or consultants wishing to learn how to control the penetration testing process.
- Auditors wishing to perform and conduct professional penetration tests.
- Persons responsible for maintaining the security of information systems in an organization.
- Technical experts who want to learn how to prepare a pentest.
- Cybersecurity professionals and information security team members.
Microwave Point to Point & Point to MultiPoint
21 HoursThis instructor-led, live training in Egypt (online or onsite) is aimed at intermediate-level network engineers who wish to use, maintain, and troubleshoot microwave networks effectively.
By the end of this training, participants will be able to:
- Understand the principles and operation of microwave communication systems.
- Design and implement point-to-point and point-to-multipoint microwave links.
- Perform link budget analysis and network planning.
- Operate, maintain, and troubleshoot microwave networks effectively.
OpenStack for Telecom
14 HoursThis instructor-led, live training in Egypt (online or onsite) is aimed at engineers, architects and managers who wish to deploy an OpenStack cloud to manage their Telecom infrastructure.
By the end of this training, participants will be able to:
- Plan, deploy, and administer OpenStack as a private cloud.
- Understand IaaS architecture and its implementation under OpenStack.
- Replace physical routers and servers with virtual machines running in a private cloud.
- Reduce infrastructure and maintenance costs through virtualization and cloud computing.
- Expedite the rollout of new services to customers.
OSS ( Operation Support System ) for Telecom
21 HoursIntroduction:
OSS/BSS is at the heart of operation of any Telecom operator. Given growth of Big Data in recent time,
area of OSS/BSS has undergone disruptive changes specially with virtualization of the OSS/BSS and given
the fact, many of the new OTT ( Over the top) services are newly developed web/mobile based services
that do not fit into legacy OSS. In this current course, which consists of 4 days, first 3 days are spent
extensively to develop background in legacy OSS/BSS, while last 5 modules, are dedicated to explain
emerging Big Data analytics application in OSS/BSS layer
Target Audience:
- Telecom/Cellular Operation People
- Telecom Sales professionals
- Telecom Operation vendors/contractors
- CXO, VP, Director level managers in TELECOM
PECB GDPR - Certified Data Protection Officer
35 HoursThe PECB Certified Data Protection Officer training course enables you to acquire the necessary knowledge and skills, and develop the competence to perform the role of the data protection officer in a GDPR compliance program implementation.
Why should you attend?
As data protection is becoming more and more valuable, the need for organizations to protect these data is also constantly increasing. Besides violating the fundamental rights and freedoms of persons, not complying with the data protection regulations can lead to risky situations that could harm an organization’s credibility, reputation, and financial status. This is where your skills as a data protection officers come to place.
The PECB Certified Data Protection Officer training course will help you acquire the knowledge and skills to serve as a Data Protection Officer (DPO) so as to help organizations ensure compliance with the General Data Protection Regulation (GDPR) requirements.
Based on practical exercises, you will be able to master the role of the DPO and become competent to inform, advise, and monitor compliance with the GDPR and cooperate with the supervisory authority.
After attending the training course, you can sit for the exam, and if you successfully pass the exam, you can apply for the “PECB Certified Data Protection Officer” credential. The internationally recognized “PECB Certified Data Protection Officer” certificate will prove that you have the professional capabilities and practical knowledge to advise the controller and the processor on how to meet their obligations regarding the GDPR compliance.
Who should attend?
- Managers or consultants seeking to prepare and support an organization in planning, implementing, and maintaining a compliance program based on the GDPR
- DPOs and individuals responsible for maintaining conformance with the GDPR requirements
- Members of information security, incident management, and business continuity teams
- Technical and compliance experts seeking to prepare for a data protection officer role
- Expert advisors involved in the security of personal data
Learning objectives
- Understand the concepts of the GDPR and interpret its requirements
- Understand the content and the correlation between the General Data Protection Regulation and other regulatory frameworks and applicable standards, such as ISO/IEC 27701 and ISO/IEC 29134
- Acquire the competence to perform the role and daily tasks of the data protection officer in an organization
- Develop the ability to inform, advise, and monitor compliance with the GDPR and cooperate with the supervisory authority
Certified Telecommunication Network & Link Integration
28 HoursThis instructor-led, live training in Egypt (online or onsite) is aimed at intermediate-level telecommunications engineers who wish to gain the knowledge and skills necessary to design, implement, and maintain telecommunication networks with a focus on link integration, ensuring seamless communication and data transfer across networks.
By the end of this training, participants will be able to:
- Understand the fundamentals of telecommunication networks.
- Design and implement telecommunication networks.
- Apply advanced link integration strategies.
- Troubleshoot and resolve integration issues.