<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cybertraining.uk/blogs/Training/feed" rel="self" type="application/rss+xml"/><title>ID Cyber Solutions - Blog , Training</title><description>ID Cyber Solutions - Blog , Training</description><link>https://www.cybertraining.uk/blogs/Training</link><lastBuildDate>Thu, 14 May 2026 21:05:47 +0200</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Certified SCADA Security Professional Course launched]]></title><link>https://www.cybertraining.uk/blogs/post/certified-scada-security-professional-course-launched</link><description><![CDATA[ID Cyber is proud to announce the launch of the new PECB Certified SCADA Security Professional course.&nbsp; This is aimed at Security professionals ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_nV3NoReNTJ-pLn6gF5qFgw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_YOKneNu0RXyVtEnhpHyl9A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_WRvjw95vTdeb1dAVjd71lg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_e5VWEcinQDK5YnVVPn6OQg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div>ID Cyber is proud to announce the launch of the new <a href="https://cybertraining.uk/courses/scada-security-professional/"><strong>PECB Certified SCADA Security Professional</strong></a> course.&nbsp; This is aimed at Security professionals looking to understand the unique challenges of SCADA the course provides complete guidance on building effective an effective security programme to manage the unique risks to Industrial Control Systems used in multiple industries. The course has been designed by industry experts with in-depth experience in SCADA and Industrial Control Systems Security. Unlike other certifications, this course focuses specifically on the knowledge and skills needed by a professional looking to advice on, or manage risks related to SCADA environments and systems. Given the high profile nature, and the significant impacts associated with such environments, a holistic professional approach to security is needed and that is exactly what this course is designed to provide. In addition to presenting the theoretical knowledge needed by a SCADA Security Professional, a comprehensive methodology for the implementation is presented. Thus, at the end of this course, participants will gain knowledge on how to effectively implement a security program for SCADA/ICS systems. <a href="https://cybertraining.uk/courses/scada-security-professional/">Book here</a></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 14 Dec 2015 10:49:56 +0000</pubDate></item><item><title><![CDATA[Certified Lead Privacy Implementer]]></title><link>https://www.cybertraining.uk/blogs/post/certified-lead-privacy-implementer</link><description><![CDATA[Privacy is fast diminishing on the Internet due to many public breaches that have occurred. Do you have PII (Personally Identifiable Information) that ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_cJWuIKAySQO6kSBTviHyPA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Q0O9Vci5Q8CT-O4I08ytiw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_fDxZPHuIRKC2dXzP7I7-Tw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_jarKsuSdRKWntNLdXHDbiA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div>Privacy is fast diminishing on the Internet due to many public breaches that have occurred. Do you have PII (Personally Identifiable Information) that you collect as part of your business process? If so, this course will take you through the process of managing such a project and implementing such a framework. This <strong> five-day</strong> intensive course enables participants to develop the necessary expertise to support an organisation in implementing and managing a Privacy Framework based on ISO 29100. Participants will gain a thorough understanding of how to design, build and lead organisations' privacy programs in all processes of ICT systems and services, through the use of best practices. The training provides a privacy framework which specifies a common privacy terminology, defines the actors and their roles in processing personally identifiable information (PII), describes privacy safeguarding considerations and provides references to known privacy principles for information technology.</div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 14 Dec 2015 08:47:22 +0000</pubDate></item><item><title><![CDATA[Private on site training]]></title><link>https://www.cybertraining.uk/blogs/post/private-on-site-training</link><description><![CDATA[In order to be flexible we offer private training to our customers.&nbsp; With private training we deliver the course you want at your chosen location ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_doFG8C37RMOwZd6vfh3BIw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_p6qUVRWoQiu7x4ktrfBMTw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_6MT2Vov3R0qSH7i5YD7-cA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_wcx2hpmPQqWnNpfx7XksWg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div>In order to be flexible we offer private training to our customers.&nbsp; With private training we deliver the course you want at your chosen location at a date to suit you. There are many benefits as you are not tied to a course calendar and most importantly we can offer discounts on our usual pricing. We have run successful private courses worldwide and would be happy to discuss organising training for your company.&nbsp; For a free initial discussion please <a href="http://www.idcybersolutions.com/contact">contact us</a></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 11 Dec 2015 09:36:52 +0000</pubDate></item><item><title><![CDATA[Cyber Security Training]]></title><link>https://www.cybertraining.uk/blogs/post/cyber-security-training</link><description><![CDATA[ID Cyber Solutions is an ATP (Authorised Training Partner) with several internationally recognised accreditation organisations. ID Cyber is one of Sc ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_ucXAgnyuQP-NK1vqqUw6pw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_81agJkqGQVqQ2KQBY123QQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_065OPyUAQ0eF1ey3KCauqA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_PgbKQoVYRvWs6IK5Y3YigA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div>ID Cyber Solutions is an <strong>ATP</strong> (Authorised Training Partner) with several internationally recognised accreditation organisations. ID Cyber is one of Scotland's Cyber Security training centers located in Glasgow. ID Cyber Solutions offer a variety of professional certifications which are accredited by ANSI and are internationally recognised under ISO 17024 the standard for personal certification bodies. In the UK and Europe, these certifications are becoming the standard for individuals who wish to work in information security and penetration testing. ID Cyber has successfully delivered courses in the <strong>UK, Luxembourg, Netherlands, Denmark and Italy</strong> to very well known organisations. So join us in Scotland making Scotland another <em>Country of Excellence </em>in the fight against Cyber Crime. <h3><strong>EC Council</strong></h3> EC-Council is the leading IT and e-Business certification awarding body and the creator of the world famous <em><a href="http://www.idcybersolutions.com/courses/event/certified-ethical-hacker/">Certified Ethical Hacker (CEH)</a></em>, <a href="http://www.idcybersolutions.com/certified-hacking-forensic-investigator-chfi/"><em>Computer Hacking Forensics Investigator (CHFI)</em></a> and <em> EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT)</em> programs. EC-Council has trained tens of thousands of individuals and certified more than 30,000 security professionals from such fine organizations as the US Army, the FBI, Microsoft, IBM and the United Nations, Foreign and Commonwealth offices to name but a few. <h3><strong>PECB</strong></h3> ID Cyber are also an <strong>ATP</strong> for <a href="http://www.pecb.com/">PECB</a>, <strong>P</strong>rofessional <strong>E</strong>valuation and <strong>C</strong>ertification <strong>B</strong>oard and delivering popular courses like <a href="http://www.idcybersolutions.com/isoiec-270012013-lead-implementer/">ISO 27001: Lead Implementer</a> and <a href="http://www.idcybersolutions.com/content/isoiec-270012013-lead-auditor">Lead Auditor</a>, <a href="http://www.idcybersolutions.com/certified-lead-privacy-implementer-2/">Certified Lead Privacy Implementer</a> and the newly released Scada Security Professional. <a href="http://www.idcybersolutions.com/content/contact">Please contact us for more information</a></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 11 Dec 2015 09:07:12 +0000</pubDate></item></channel></rss>