CINXE.COM
Electronic Identification Authentication and Trust Services 2.0 Trained Professional (eIDAS2.0TPro)
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1"> <!-- The above 3 meta tags *must* come first in the head; any other head content must come *after* these tags --> <title>Electronic Identification Authentication and Trust Services 2.0 Trained Professional (eIDAS2.0TPro)</title> <meta name="description" content="Online training, exam, certificate of completion - Electronic Identification Authentication and Trust Services 2.0 Trained Professional (eIDAS2.0TPro)"> <meta name="keywords" content="Electronic Identification Authentication and Trust Services 2.0 Trained Professional (eIDAS2.0TPro), eIDAS2.0TPro, Training Electronic Identification Authentication and Trust Services 2.0, Training eIDAS 2.0"> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "BreadcrumbList", "itemListElement": [ { "@type": "ListItem", "position": 1, "name": "Index", "item": "https://www.european-digital-identity-regulation.com" }, { "@type": "ListItem", "position": 2, "name": "eIDAS2.0TPro", "item": "https://www.european-digital-identity-regulation.com/Electronic_Identification_Authentication_and_Trust_Services_2.0_Trained_Professional_(eIDAS2.0TPro).html" }, { "@type": "ListItem", "position": 3, "name": "Final Text", "item": "https://www.european-digital-identity-regulation.com/European_Digital_Identity_Regulation_Articles_(Regulation_EU_2024_1183).html" }, { "@type": "ListItem", "position": 4, "name": "Links", "item": "https://www.european-digital-identity-regulation.com/Links.html" }, { "@type": "ListItem", "position": 5, "name": "Impressum", "item": "https://www.cyber-risk-gmbh.com/Impressum.html" } ] } </script> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "Organization", "name": "Cyber Risk GmbH", "url": "https://www.cyber-risk-gmbh.com", "logo": "https://www.cyber-risk-gmbh.com/Cyber_Risk_GmbH_Logo.jpg", "sameAs": [ "https://www.linkedin.com/company/71474270/admin/page-posts/published/", "https://x.com/Cyber_Risk_GmbH" ], "contactPoint": { "@type": "ContactPoint", "telephone": "+41-79-5058960", "contactType": "Customer Service", "areaServed": "Worldwide", "availableLanguage": "English" }, "founder": { "@type": "Person", "name": "George Lekatis" }, "description": "Cyber Risk GmbH is a leading provider of cyber risk and compliance training in Switzerland and worldwide.", "address": { "@type": "PostalAddress", "streetAddress": "Dammstrasse 16", "addressLocality": "Horgen", "addressRegion": "Canton of Zürich", "postalCode": "8810", "addressCountry": "CH" } } </script> <!-- Bootstrap --> <link href="css/bootstrap.min.css" rel="stylesheet"> <link href="css/style.css" rel="stylesheet"> <!--font-awesome--> <link href="https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css" rel="stylesheet"> <link href="https://fonts.googleapis.com/css2?family=Montserrat:wght@100;200;300;400;500;600;700;800;900&display=swap" rel="stylesheet"> <!-- Owl Stylesheets --> <link rel="stylesheet" href="css/owl.carousel.css"> <link rel="stylesheet" href="css/owl.theme.default.css"> <!-- javascript --> <script src="js/jquery.min.js"></script> <script src="js/owl.carousel.js"></script> <!-- HTML5 shim and Respond.js for IE8 support of HTML5 elements and media queries --> <!-- WARNING: Respond.js doesn't work if you view the page via file:// --> <!--[if lt IE 9]> <script src="https://oss.maxcdn.com/html5shiv/3.7.3/html5shiv.min.js"></script> <script src="https://oss.maxcdn.com/respond/1.4.2/respond.min.js"></script> <![endif]--> <meta name="google-site-verification" content="Wmj-U6te6SXvchh7O3UJgV3nrQ8suoZ8wU_8OwwgYlo"> <style> .wrapper-banner { background: url("500000.jpg"); background-size: cover; background-position: center; } </style> <meta name="msvalidate.01" content="3992470AA0B488CE9CF07B1CD73A76D7"> <link rel="stylesheet" href="./style2.css"> <style> body { color: black; } </style> <style> a:link { color: blue; background-color: transparent; text-decoration: none; } a:visited { color: blue; background-color: transparent; text-decoration: none; } a:hover { color: red; background-color: transparent; text-decoration: underline; } a:active { color: blue; background-color: transparent; text-decoration: underline; } </style> </head> <body> <!-- Fixed navbar --> <div class="wrapper-menu"> <nav id="header" class="navbar navbar-fixed-top"> <div id="header-container" class="container navbar-container"> <div class="navbar-header"> <button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#navbar" aria-expanded="false" aria-controls="navbar"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a id="brand" class="navbar-brand" href="https://www.disinformation.ch/"> <!--<img src="images/logo-black.png" alt="" class="shrink-logo"> --> </a> </div> <div id="navbar" class="collapse navbar-collapse"> <ul class="nav navbar-nav"> <li><a href="https://www.european-digital-identity-regulation.com" target="_blank">Index</a></li> <li><a href="https://www.european-digital-identity-regulation.com/Electronic_Identification_Authentication_and_Trust_Services_2.0_Trained_Professional_(eIDAS2.0TPro).html" target="_blank">eIDAS2.0TPro Training </a></li> <li><a href="https://www.european-digital-identity-regulation.com/European_Digital_Identity_Regulation_Articles_(Regulation_EU_2024_1183).html" target="_blank" >Final text Regulation (EU) 2024/1183</a></li> <li><a href="https://www.european-digital-identity-regulation.com/Links.html" target="_blank">Links</a></li> <li><a href="https://www.cyber-risk-gmbh.com" target="_blank">Cyber Risk GmbH</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Impressum.html" target="_blank">Impressum</a></li> </ul> </div> <!-- /.nav-collapse --> </div> <!-- /.container --> </nav> <!-- /.navbar --> </div> <div class="container-fluid wrapper-banner"> <div class="container"> <div class="top-banner"> </div> </div> </div> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> <h3>Electronic Identification Authentication and Trust Services 2.0 Trained Professional (eIDAS2.0TPro)</h3> <br> <br> <p class="text-left"> <b>Overview </b></p> <p class="text-left">eIDAS 2.0 is an important step forward in the EU’s efforts to create a secure, interoperable, and user-friendly digital environment. Enhancing electronic identification and trust services is a major challenge, but also a <b>major opportunity for experts working for the implementation of the regulation.</b></p> <p class="text-left">Implementing the eIDAS 2.0 regulation requires a multidisciplinary approach involving various professionals with expertise in technology, law, cybersecurity, project management, and more. All professionals and experts must have a very good understanding of the eIDAS 2.0 regulation.</p> <br> <p class="text-left"><b>Objectives </b></p> <p class="text-left">The program has been designed to provide with the skills needed to understand and support compliance with the European Digital Identity Regulation (Regulation (EU) 2024/1183), also known as eIDAS 2.0. </p> <p class="text-left"> It also provides with the skills needed to pass the Electronic Identification Authentication and Trust Services 2.0 Trained Professional (eIDAS2.0TPro) exam, and to receive the Certificate of Completion, that provides independent evidence to firms and organizations that you have a quantifiable understanding of the subject matter.</p> <br> <p class="text-left"><b>Target Audience</b></p> <p class="text-left">The program is highly beneficial for professionals employed by companies and organizations that must adhere to eIDAS 2.0 requirements.</p> <p class="text-left">The program is especially important to professionals and experts working in:</p> <p class="text-left">- <b>Risk and Compliance Management,</b> with skills and qualifications that ensure they can effectively manage the complexities of this regulatory framework, including risk assessments, mitigation strategies, data protection, familiarity with other relevant regulations, incident response and handling of compliance breaches or security incidents, and ability to develop and implement compliance monitoring and reporting systems. </p> <p class="text-left">- <b>Project and Program Management, </b>who coordinate multiple projects related to eIDAS 2.0 implementation, ensuring alignment with strategic goals and regulatory requirements.</p> <p class="text-left">- <b>IT Project Management, </b>necessary for the development and implementation of IT systems related to eIDAS 2.0 and other directives and regulations.</p> <p class="text-left"> - <b>Cybersecurity, </b>including <b>Security Analysts </b>who assess security risks, implement security measures, and monitor systems for vulnerabilities.</p> <p class="text-left"> - <b>Digital Identity and Trust Services,</b> including <b>Identity and Access Management (IAM) Specialists </b>who manage user identities and control access to systems, ensuring that only authorized users can access sensitive information, and <b>Trust Service Providers (TSP) Specialists </b>that oversee the provision of trust services, such as electronic signatures, electronic seals, and time-stamping.</p> <p class="text-left"> - <b>Information Technology (IT), </b>including <b>System Architects </b>that design the overall IT architecture for eID systems and trust services, ensuring scalability, security, and interoperability, <b>Software Developers </b>who create and maintain the software solutions required for electronic identification and trust services, including digital identity wallets, and <b>Database Administrators</b> who manage the databases storing eID and transaction data, ensuring data integrity and security.</p> <br> <p class="text-left"> <b> Course Synopsis.</b> </p> <br> <p class="text-left"> <b> Introduction.</b> </p> <p class="text-left">- The Electronic Identification Authentication and Trust Services 2.0 Trained Professional (eIDAS2.0TPro) exam. <br> - The certificate of completion. </p> <br> <p class="text-left"> <b> Part 1 - The European Union. How does the legislative process work?</b> </p> <p class="text-left">- Key institutions.<br> - The European Commission, the most important institution for risk and compliance professionals.<br> - How does the legislative process work?<br> - The European System of Financial Supervision (ESFS).<br> - Legal acts after the Treaty of Lisbon.<br> - Delegated acts, supplementing or amending certain non-essential elements of a basic act.<br> - Implementing acts.<br> - Regulatory technical standards (RTS)<br> - Implementing technical standards (ITS). <br> - The European Data Protection Supervisor and the European Data Protection Board.<br> - The Committee of European Auditing Oversight Bodies (CEAOB).<br> - The European External Action Service.<br> - The Common Foreign and Security Policy (CFSP).<br> - The Common Security and Defence Policy (CSDP).<br> - The European Network and Information Security Agency (ENISA).<br> - The NIS Cooperation Group.<br> - The European cyber crisis liaison organisation network (EU-CyCLONe).<br> - The High-Level Expert Group on Artificial Intelligence (AI HLEG).</p> <br> <p class="text-left"> <b> Part 2 - Before eIDAS, from eIDAS 1.0 to eIDAS 2.0.</b> </p> <p class="text-left">- eIDAS 2.0, Regulation (EU) 2024/1183, or European Digital Identity Regulation?<br> - Building trust in the online environment.<br> - Directive 1999/93/EC did not include a cross-border and cross-sector framework.<br> - European Commission, “A Digital Agenda for Europe”.<br> - European Commission, “Dismantling the obstacles to EU citizens’ rights”.<br> - Directive 2006/123/EC “on services in the internal market”.<br> - Regulation (EU) No 910/2014, the eIDAS Regulation.<br> - Did eIDAS 1.0 work?<br> - The European Digital Identity Wallet: The next major objective.<br> - European Commission, “Shaping Europe’s Digital Future” - announced the revision of eIDAS 1.0 to improve its effectiveness.<br> - European Commission, “2030 Digital Compass: the European way for the Digital Decade” (the “Digital Compass Communication”).<br> - The Digital Compass Communication, key milestones along four cardinal points.<br> - Government as a Platform.<br> - “Smart villages”.<br> - Digital Citizenship.<br> - The Digital Decade Policy Programme 2030, established by Decision (EU) 2022/2481.<br> - The “European Declaration on Digital Rights and Principles for the Digital Decade” (the “Declaration”, 2023/C 23/01).</p> <br> <p class="text-left"> <b> Part 3 - Articles, Regulation (EU) 2024/1183.</b> </p> <p class="text-left"> <b> CHAPTER I, GENERAL PROVISIONS.</b> </p> <p class="text-left">- Article 1, Amendments to Regulation (EU) No 910/2014. Subject matter.<br> - Article 2, Scope.<br> - “This Regulation is without prejudice”.<br> - Article 3, Definitions.<br> - Notes – Understanding Electronic Signatures, Advanced Electronic Signatures (AES), Qualified Electronic Signatures (QES).<br> - Annex I.<br> - Notes – Understanding Trust Services, Certification Authorities (CAs), Public Key Infrastructure (PKI), Timestamps, Timestamp Authorities (TSA), Electronic Seals, Sealing Entities, Basic Electronic Seals, Advanced Electronic Seals, Qualified Electronic Seals.<br> - Annex III.<br> - Annex IV.<br> - Notes – Understanding the European Digital Identity Wallet (EUDI Wallet) and the “once only” principle.<br> - Annex VII.<br> - Article 4, Internal market principle.<br> - Article 5, Pseudonyms in electronic transaction.</p> <br> <p class="text-left"> <b> CHAPTER II, ELECTRONIC IDENTIFICATION.</b> </p> <p class="text-left"> <b> SECTION 1, EUROPEAN DIGITAL IDENTITY WALLET.</b> </p> <p class="text-left">- Article 5a, European Digital Identity Wallets.<br> - Note: The meaning of “mutatis mutandis”.<br> - Note: The concept of national discretion in EU law.<br> - Article 5b, European Digital Identity Wallet-Relying Parties.<br> - Article 5c, Certification of European Digital Identity Wallets.<br> - Article 5d, Publication of a list of certified European Digital Identity Wallets.<br> - Article 5e, Security breach of European Digital Identity Wallets.<br> - Article 5f, Cross-border reliance on European Digital Identity Wallets.</p> <br> <p class="text-left"> <b> SECTION 2, ELECTRONIC IDENTIFICATION SCHEMES.</b> </p> <p class="text-left">- Article 6, Mutual recognition.<br> - Article 7, Eligibility for notification of electronic identification schemes.<br> - Article 8, Assurance levels of electronic identification schemes.<br> - Article 9, Notification.<br> - Article 10, Security breach of electronic identification schemes.<br> - Article 11, Liability.<br> - Article 11a, Cross-border identity matching.<br> - Article 12, Interoperability.<br> - Article 12a, Certification of electronic identification schemes.<br> - Article 12b, Access to hardware and software features.<br> - Digital Markets Act, meaning of “core platform service” and “gatekeeper”.</p> <br> <p class="text-left"> <b> CHAPTER III, TRUST SERVICES.</b> </p> <p class="text-left"> <b> SECTION 1, General provisions.</b> </p> <p class="text-left">- Article 13, Liability and burden of proof.<br> - Article 14, International aspects.<br> - Article 15, Accessibility for persons with disabilities and special needs.<br> - Article 16, Penalties.</p> <br> <p class="text-left"> <b> SECTION 2, Non-qualified trust services.</b> </p> <p class="text-left">- Articles 17 and 18 are deleted.<br> - Article 19, Security requirements applicable to trust service providers.<br> - Article 19a, Requirements for non-qualified trust service providers.</p> <br> <p class="text-left"> <b> SECTION 3, Qualified trust services.</b> </p> <p class="text-left">- Article 20, Supervision of qualified trust service providers.<br> - Note – Understandings Article 21 of the NIS 2 Directive (Cybersecurity risk-management measures).<br> - Article 21, Initiation of a qualified trust service.<br> - Article 22, Trusted lists.<br> - Article 23, EU trust mark for qualified trust services.<br> - Article 24, Requirements for qualified trust service providers.<br> <b>- Note before Article 24a: </b>Understanding Qualified Electronic Signature (QES), Qualified Electronic Signature Creation Device (QESCD), Qualified Trust Service Provider (QTSP), Qualified Validation Service for Qualified Electronic Signatures, Qualified Preservation Service (QPS), Qualified Electronic Time Stamp, Qualified Certificate for Websites, Qualified Electronic Registered Delivery Service (QERDS), Qualified Electronic Attestation of Attributes (QEAA), Qualified Electronic Archiving Service, Qualified Electronic Ledger.<br> - Article 24a, Recognition of qualified trust services.</p> <br> <p class="text-left"> <b> SECTION 4, Electronic signatures.</b> </p> <p class="text-left">- Article 25, Legal effects of electronic signatures.<br> - Article 26, Requirements for advanced electronic signatures.<br> - Article 27, Electronic signatures in public services.<br> - Article 28, Qualified certificates for electronic signatures.<br> - Annex II.<br> - Article 29, Requirements for qualified electronic signature creation devices.<br> - Article 29a, Requirements for a qualified service for the management of remote qualified electronic signature creation devices.<br> - Article 30, Certification of qualified electronic signature creation devices.<br> - Article 31, Publication of a list of certified qualified electronic signature creation devices.<br> - Article 32, Requirements for the validation of qualified electronic signatures.<br> - Article 32a, Requirements for the validation of advanced electronic signatures based on qualified certificates.<br> - Article 33, Qualified validation service for qualified electronic signatures.<br> - Article 34, Qualified preservation service for qualified electronic signatures.</p> <br> <p class="text-left"> <b> SECTION 5, Electronic seals.</b> </p> <p class="text-left">- Article 35, Legal effects of electronic seals.<br> - Article 36, Requirements for advanced electronic seals.<br> - Article 37, Electronic seals in public services.<br> - Article 38, Qualified certificates for electronic seals.<br> - Article 39a, Requirements for a qualified service for the management of remote qualified electronic seal creation devices.<br> - Article 39, Qualified electronic seal creation devices.<br> - Article 40a, Requirements for the validation of advanced electronic seals based on qualified certificates.</p> <br> <p class="text-left"> <b> SECTION 6, Electronic time stamps.</b> </p> <p class="text-left">- Article 41, Legal effect of electronic time stamps.<br> - Article 42, Requirements for qualified electronic time stamps.<br> - Note: The Coordinated Universal Time (UTC).</p> <br> <p class="text-left"> <b> SECTION 7, Electronic registered delivery services.</b> </p> <p class="text-left">- Article 43, Legal effect of an electronic registered delivery service.<br> - Article 44, Requirements for qualified electronic registered delivery services.</p> <br> <p class="text-left"> <b> SECTION 8, WEBSITE AUTHENTICATION.</b> </p> <p class="text-left"> - Article 45, Requirements for qualified certificates for website authentication.<br> - Article 45a, Cybersecurity precautionary measures.</p> <br> <p class="text-left"> <b> SECTION 9, ELECTRONIC ATTESTATION OF ATTRIBUTES.</b> </p> <p class="text-left"> - Article 45b, Legal effects of electronic attestation of attributes.<br> - Article 45c, Electronic attestation of attributes in public services.<br> - Annex V.<br> - Article 45d, Requirements for qualified electronic attestation of attributes.<br> - Annex VI.<br> - Article 45e, Verification of attributes against authentic sources.<br> - Article 45f, Requirements for electronic attestation of attributes issued by or on behalf of a public sector body responsible for an authentic source.<br> - Article 45g, Issuing of electronic attestation of attributes to European Digital Identity Wallets.<br> - Article 45h, Additional rules for the provision of electronic attestation of attributes services.</p> <br> <p class="text-left"> <b> SECTION 10, ELECTRONIC ARCHIVING SERVICES.</b> </p> <p class="text-left">- Article 45i, Legal effect of electronic archiving services.<br> - Article 45j, Requirements for qualified electronic archiving services.</p> <br> <p class="text-left"> <b> SECTION 11, ELECTRONIC LEDGERS.</b> </p> <p class="text-left"> - Article 45k, Legal effects of electronic ledgers.<br> - Article 45l, Requirements for qualified electronic ledgers.</p> <br> <p class="text-left"> <b> CHAPTER IV, ELECTRONIC DOCUMENTS.</b> </p> <p class="text-left">- Article 46, Legal effects of electronic documents.</p> <br> <p class="text-left"> <b> CHAPTER IVa, GOVERNANCE FRAMEWORK.</b> </p> <p class="text-left"> - Article 46a, Supervision of the European Digital Identity Wallet Framework.<br> - Article 46b, Supervision of trust services.<br> - Article 46c, Single points of contact.<br> - Article 46d, Mutual assistance.<br> - Article 46e, The European Digital Identity Cooperation Group.</p> <br> <p class="text-left"> <b> CHAPTER V, DELEGATIONS OF POWER AND IMPLEMENTING PROVISIONS.</b> </p> <p class="text-left">- Article 47, Exercise of the delegation.<br> - Article 48, Committee procedure.<br> - Article 48a, Reporting requirements.</p> <br> <p class="text-left"> <b> CHAPTER VI, FINAL PROVISIONS.</b> </p> <p class="text-left">- Article 49, Review.<br> - Article 50, Repeal.<br> - Article 51, Transitional measures.</p> <br> <p class="text-left"> <b> Part 4 - Other EU Directives and Regulations.</b> <br> - The NIS 2 Directive. <br> - The Digital Operational Resilience Act (DORA). <br> - The Artificial Intelligence Act. <br> - The Critical Entities Resilience Directive (CER). <br> - The European Data Act. <br> - The European Data Governance Act (DGA). <br> - The European Cyber Resilience Act (CRA). <br> - The Digital Services Act (DSA). <br> - The Digital Markets Act (DMA). <br> - The European Chips Act. <br> - The Artificial Intelligence Liability Directive. <br> - The Framework for Artificial Intelligence Cybersecurity Practices (FAICP). <br> - The EU Cyber Solidarity Act. <br> - The Digital Networks Act (DNA). <br> - The European ePrivacy Regulation. <br> - The European Media Freedom Act (EMFA). <br> - The Corporate Sustainability Due Diligence Directive (CSDDD). <br> - The Systemic Cyber Incident Coordination Framework (EU-SCICF). <br> - The European Health Data Space (EHDS). <br> - The European Financial Data Space (EFDS). <br> - The Financial Data Access (FiDA) Regulation. <br> - The Payment Services Directive 3 (PSD3), Payment Services Regulation (PSR). <br> - Internal Market Emergency and Resilience Act (IMERA). <br> - The European Space Law (EUSL). </p> <br> <p class="text-left"> - Closing remarks. </p> <br> <hr> <p class="text-left"><b>Become an Electronic Identification Authentication and Trust Services 2.0 Trained Professional (eIDAS2.0TPro) </b></p> <p class="text-left">This is a Distance Learning with Certificate of Completion program, provided by Cyber Risk GmbH. The General Terms and Conditions for all legal transactions made through the Cyber Risk GmbH websites (hereinafter “GTC”) can be found at: <a href="https://www.cyber-risk-gmbh.com/Impressum.html" target="_blank">https://www.cyber-risk-gmbh.com/Impressum.html</a></p> <p class="text-left">Each Distance Learning with Certificate of Completion program (hereinafter referred to as “distance learning program”) is provided at a fixed price, that includes VAT. There is no additional cost, now or in the future, for any reason.</p> <p class="text-left">We will send the distance learning program via email up to 24 hours after the payment (working days). Please remember to check the spam folder of your email client too, as emails with attachments are often landed in the spam folder.</p> <p class="text-left">You have the option to ask for a full refund up to 60 days after the payment. If you do not want one of our distance learning programs for any reason, all you must do is to send us an email, and we will refund the payment, no questions asked.</p> <p class="text-left">Your payment will be received by Cyber Risk GmbH (Dammstrasse 16, 8810 Horgen, Switzerland, Handelsregister des Kantons Zürich, Firmennummer: CHE-244.099.341). Cyber Risk GmbH will also send the certificates of completion to all persons that will pass the exam.</p> <p class="text-left"><b>The all-inclusive cost is 297 USD (US Dollars). There is no additional cost, now or in the future, for any reason.</b></p> <br> <p class="text-left"><b>First option: You can purchase the Electronic Identification Authentication and Trust Services 2.0 Trained Professional (eIDAS2.0TPro) program with VISA, MASTERCARD, AMEX, Apple Pay, Google Pay etc.</b></p> <a class="btn-payrexx btn-payrexx-modal" href="https://cyberriskgmbh.payrexx.com/pay?tid=91194d3c"> Purchase the eIDAS2.0TPro program here (VISA, MASTERCARD, AMEX, Apple Pay, Google Pay etc.) </a> <script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.5.1/jquery.min.js" integrity="sha512-bLT0Qm9VnAYZDflyKcBaQ2gg0hSYNQrJ8RilYldYQ1FxQYoCLtUjuuRuZo+fjqhx/qtq/1itJ0C2ejDxltZVFg==" crossorigin="anonymous"></script> <script type="text/javascript" src="https://media.payrexx.com/modal/v1/modal.min.js"></script> <script type="text/javascript"> jQuery(".btn-payrexx-modal").payrexxModal(); </script> <style type="text/css"> .btn-payrexx { display: inline-block; width: auto; padding: 6px 20px 6px 20px; font-size: 21px; font-weight: 300; white-space: inherit; background-color: #4333cc; border: 0; outline: 0; text-decoration: none; color: #ffffff; border-radius: 3px; -webkit-transition: background-color 300ms ease-out; -moz-transition: background-color 300ms ease-out; -o-transition: background-color 300ms ease-out; transition: background-color 300ms ease-out; } .btn-payrexx:focus, .btn-payrexx:hover { background-color: #758df2; color: #ffffff; } </style> <br> <br> <a href="https://cyberriskgmbh.payrexx.com/pay?tid=91194d3c"><img src="Credit_Cards.JPG" width="506" height="28" alt=""></a><br> <br> <br> <br> <p class="text-left"><b>Second option: QR code payment.</b></p> <p class="text-left">i. Open the camera app or the QR app on your phone. </p> <p class="text-left">ii. Scan the QR code and possibly wait for a few seconds. </p> <p class="text-left">iii. Click on the link that appears, open your browser, and make the payment. </p> <img src="eIDAS2.0TPro_QR_Payment.png" width="160" height="160" alt="eIDAS2.0TPro"> <br> <br> <p class="text-left"><b>Third option: You can purchase the Electronic Identification Authentication and Trust Services 2.0 Trained Professional (eIDAS2.0TPro) program with PayPal</b></p> <p class="text-left">When you click <i>"PayPal"</i> below, you will be redirected to the PayPal web site. If you prefer to pay with a card, you can click <i>"Debit or Credit Card"</i> that is also powered by PayPal. </p> <form action="https://www.paypal.com/cgi-bin/webscr" method="post" target="_top"> <input type="hidden" name="cmd" value="_s-xclick" /> <input type="hidden" name="hosted_button_id" value="Y7BRV9DEJJP9C" /> <input type="hidden" name="currency_code" value="USD" /> <input type="image" src="https://www.paypalobjects.com/en_US/i/btn/btn_buynowCC_LG.gif" border="0" name="submit" title="PayPal - The safer, easier way to pay online!" alt="Buy Now" /> </form> <br> <br> <p class="text-left"><b>What is included in the cost of the distance learning program:</b></p> <br> <p class="text-left"><b>A. The official presentations (1021 slides).</b></p> <p class="text-left">The presentations are effective and appropriate to study online or offline. Busy professionals have full control over their own learning and are able to study at their own speed. They are able to move faster through areas of the course they feel comfortable with, but slower through those that they need a little more time on. </p> <br> <p class="text-left"><b>B. Up to 3 online exam attempts per year.</b></p> <p class="text-left">Candidates must pass only one exam. If they fail, they must study the official presentations and retake the exam. Candidates are entitled to 3 exam attempts every year.</p> <p class="text-left"> If candidates do not achieve a passing score on the exam the first time, they can retake the exam a second time.</p> <p class="text-left"> If they do not achieve a passing score the second time, they can retake the exam a third time.</p> <p class="text-left"> If candidates do not achieve a passing score the third time, they must wait at least one year before retaking the exam. There is no additional cost for additional exam attempts. To learn more, you may visit: <a href="https://www.european-digital-identity-regulation.com/Distance_Learning_Programs_Exam_Certificate_of_Completion.pdf" target="_blank">https://www.european-digital-identity-regulation.com/Distance_Learning_Programs_Exam_Certificate_of_Completion.pdf</a></p> <br> <p class="text-left"><b>C. The certificate of completion, with a scannable QR code for verification.</b></p> <p class="text-left"> You will receive your certificate via email in Adobe Acrobat format (pdf), with a scannable QR code for verification, 7 business days after you pass the exam. A business day refers to any day in which normal business operations are conducted (in our case Monday through Friday), excluding weekends and public holidays. </p> <br> <img src="CERTIFICATE eIDAS2.0TPro.png" width="491" height="347" alt="Electronic Identification Authentication and Trust Services 2.0 Trained Professional (eIDAS2.0TPro)"> <br> <br> <p class="text-left"><b>D. Cyber Risk GmbH will develop a web page dedicated to each certified professional (https://www.cyber-risk-gmbh.com/Your_Name.htm).</b></p> <p class="text-left">When third parties scan the QR code on your certificate, they will visit this web page (https://www.cyber-risk-gmbh.com/Your_Name.htm), and they will be able to verify that you are a certified professional, and your certificates are valid and legitimate.</p> <p class="text-left">In this web page we will have your name, all the certificates you have received from us, and pictures of your certificates. <p class="text-left">This is an example: <a href="https://www.cyber-risk-gmbh.com/Monika_Meier.html" target="_blank">https://www.cyber-risk-gmbh.com/Monika_Meier.html</a></p> <p class="text-left">You can print your certificate that you will receive in Adobe Acrobat format (pdf). With the scannable QR code, all third parties can verify the authenticity of each certificate in a matter of seconds. Professional certificates are some of the most frequently falsified documents. Employers and third parties need an easy, effective, and efficient way to check the authenticity of each certificate. QR code verification is a good response to this demand.</p> <hr> <br> <p class="text-left"><b>Frequently Asked Questions for the distance learning programs.</b></p> <br> <p class="text-left"><b>1. I want to know more about Cyber Risk GmbH.</b></p> <br> <p class="text-left"><b>“Cyber Risk GmbH” </b>is a company incorporated in Switzerland. <br> <b>Registered address: </b>Dammstrasse 16, 8810 Horgen, Switzerland. <br> <b>Company number: </b>CHE-244.099.341. <br> <b>Cantonal Register of Commerce: </b>Canton of Zürich. <br> <b>Swiss VAT number: </b>CHE-244.099.341 MWST. <br> <b>EU VAT number: </b>EU276036462. Cyber Risk GmbH is registered for EU VAT purposes in Germany (Bundeszentralamt für Steuern, One-Stop-Shop, Nicht EU-Regelung) for the sale of services in the EU. Cyber Risk GmbH declares and pays EU VAT in a single electronic quarterly return submitted to Germany, and the German Bundeszentralamt für Steuern forwards the EU VAT due to each member State of the EU.</p> <br> <p class="text-left">Cyber Risk GmbH was founded in Horgen, Switzerland, by George Lekatis, an acclaimed expert in risk and compliance management. The company specializes in providing advanced cybersecurity and compliance training, helping organizations navigate and implement complex European, U.S., and international cybersecurity regulations. Additionally, Cyber Risk GmbH supports professionals in completing online training programs, passing exams, and obtaining Certificates of Completion, which serve as independent verification of their expertise for firms and organizations.</p> <p class="text-left">George Lekatis serves as the General Manager of Compliance LLC, a company incorporated in Wilmington, NC, with offices in Washington, DC. Compliance LLC provides risk and compliance training in 58 countries. Several of its business units function as highly successful associations, offering a wide range of services to their members, including membership programs, regular updates (weekly or monthly), specialized training, certification, Authorized Certified Trainer (ACT) programs, advocacy, and other professional services.</p> <p class="text-left">George is the president of the International Association of Risk and Compliance Professionals (IARCP, <a href="http://www.risk-compliance-association.com" target="_blank"> https://www.risk-compliance-association.com</a>). He leads the team responsible for developing and maintaining the Certified Risk and Compliance Management Professional (CRCMP) program. The CRCMP certification is widely regarded as a preferred credential by companies and organizations. For more information on the demand for CRCMPs, you may visit: <a href="https://www.risk-compliance-association.com/CRCMP_Jobs_Careers.pdf" target="_blank">https://www.risk-compliance-association.com/CRCMP_Jobs_Careers.pdf</a></p> <br> <a href="https://www.risk-compliance-association.com/CRCMP_Jobs_Careers.pdf"><img src="CRCMP_101.JPG" width="575" height="373" alt="CRCMP careers" class="responsive img-responsive"></a> <br> <br> <p class="text-left">George has acquired over 20,000 hours of experience as a seminar leader, providing training and executive coaching in information security and risk management to leading global organizations across 36 countries. He holds a Master of Laws (LL.M.) in International Business Law from the University of London (Queen Mary and UCL). Beginning his career as a mathematician, George has since earned 60 professional certifications in information security, risk management, and IT. His credentials include the Certified Information Systems Security Professional (CISSP) lead instructor, Steganography Investigator, and certifications from the Internet Security Systems (ISS) in Internet Scanner, Database Scanner, and System Scanner. He is also a Checkpoint Certified Security Administrator (CCSA), Microsoft Certified Systems Engineer (MCSE), and Microsoft Certified Trainer (MCT). As an expert witness and litigation consultant, he is qualified to investigate and provide testimony on compliance with European, U.S., and international regulations.</p> <p class="text-left">George Lekatis is a highly sought-after expert on Basel III, with deep expertise in helping international firms and financial conglomerates develop controls and systems to meet complex regulatory requirements. He serves as the President of the Basel III Compliance Professionals Association (BiiiCPA, <a href="https://www.basel-iii-association.com" target="_blank"> https://www.basel-iii-association.com</a>), the world’s largest association of Basel III professionals, dedicated to supporting compliance across the global financial sector. </p> <p class="text-left">George also serves as the President of the Sarbanes-Oxley Compliance Professionals Association (SOXCPA, <a href="https://www.sarbanes-oxley-association.com" target="_blank">https://www.sarbanes-oxley-association.com</a>), the world’s largest association of Sarbanes-Oxley professionals. </p> <p class="text-left">Our instructors are professionals with extensive, real-world experience in their respective fields. They are equipped to deliver full-time, part-time, or short-form programs, all customized to suit your specific requirements. Beyond teaching, our instructors provide hands-on guidance, offering real-world insights that help bridge the gap between theory and practice. You will always be informed ahead of time about the instructor leading your program. </p> <br> <br> <p class="text-left"><b>“Cyber Risk GmbH Training Programs” </b>are training programs developed, updated and provided by Cyber Risk GmbH, and include: <br> a) In-House Instructor-Led Training programs, <br> b) Online Live Training programs, <br> c) Video-Recorded Training programs, <br> d) Distance Learning with Certificate of Completion programs.</p> <br> <p class="text-left"><b>“Cyber Risk GmbH websites” </b>are all websites that belong to Cyber Risk GmbH, and include the following:</p> <br> <p class="text-left"><b>a. Sectors and Industries.</b></p> <p class="text-left">1. <a href="https://www.cyber-risk-gmbh.com/" target="_blank">Cyber Risk GmbH</a></p> <p class="text-left">2. <a href="https://www.social-engineering-training.ch" target="_blank">Social Engineering Training </a></p> <p class="text-left">3. <a href="https://www.healthcare-cybersecurity.ch" target="_blank">Healthcare Cybersecurity</a></p> <p class="text-left">4. <a href="https://www.airline-cybersecurity.ch" target="_blank">Airline Cybersecurity</a></p> <p class="text-left">5. <a href="https://www.railway-cybersecurity.com/" target="_blank"> Railway Cybersecurity</a></p> <p class="text-left">6. <a href="https://www.maritime-cybersecurity.com" target="_blank">Maritime Cybersecurity</a></p> <p class="text-left">7. <a href="https://www.oil-cybersecurity.com" target="_blank">Oil Cybersecurity</a></p> <p class="text-left">8. <a href="https://www.electricity-cybersecurity.com" target="_blank">Electricity Cybersecurity</a></p> <p class="text-left">9. <a href="https://www.gas-cybersecurity.com" target="_blank">Gas Cybersecurity</a></p> <p class="text-left">10. <a href="https://www.hydrogen-cybersecurity.com" target="_blank">Hydrogen Cybersecurity</a></p> <p class="text-left">11. <a href="https://www.transport-cybersecurity.com" target="_blank">Transport Cybersecurity</a></p> <p class="text-left">12. <a href="https://www.transport-cybersecurity-toolkit.com" target="_blank">Transport Cybersecurity Toolkit </a></p> <p class="text-left">13. <a href="https://www.hotel-cybersecurity.ch" target="_blank">Hotel Cybersecurity</a></p> <p class="text-left">14. <a href="https://www.sanctions-risk.com" target="_blank">Sanctions Risk</a></p> <p class="text-left">15. <a href="https://www.american-privacy-rights-act.com" target="_blank">American Privacy Rights Act of 2024 (APRA)</a></p> <p class="text-left">16. <a href="https://www.travel-security.ch" target="_blank">Travel Security</a></p> <br> <p class="text-left"><b>b. Understanding Cybersecurity.</b></p> <p class="text-left">1. <a href="https://www.disinformation.ch" target="_blank">What is Disinformation?</a></p> <p class="text-left">2. <a href="https://www.steganography.ch" target="_blank">What is Steganography?</a></p> <p class="text-left">3. <a href="https://www.cyberbiosecurity.ch" target="_blank">What is Cyberbiosecurity?</a></p> <p class="text-left">4. <a href="https://www.synthetic-identity-fraud.com" target="_blank">What is Synthetic Identity Fraud?</a></p> <p class="text-left">5. <a href="https://www.romance-scams.ch" target="_blank">What is a Romance Scam?</a></p> <p class="text-left">6. <a href="https://www.cyber-espionage.ch" target="_blank">What is Cyber Espionage?</a></p> <p class="text-left">7. <a href="https://www.sexspionage.ch" target="_blank" >What is Sexspionage?</a></p> <p class="text-left">8. <a href="https://www.restrict-act.com" target="_blank">What is the RESTRICT Act?</a></p> <br> <p class="text-left"><b>c. Understanding Cybersecurity in the European Union.</b></p> <p class="text-left">1. <a href="https://www.nis-2-directive.com" target="_blank">The NIS 2 Directive</a></p> <p class="text-left">2. <a href="https://www.digital-operational-resilience-act.com" target="_blank">The Digital Operational Resilience Act (DORA)</a></p> <p class="text-left">3. <a href="https://www.critical-entities-resilience-directive.com" target="_blank">The Critical Entities Resilience Directive (CER)</a></p> <p class="text-left">4. <a href="https://www.eu-data-act.com" target="_blank">The European Data Act </a></p> <p class="text-left">5. <a href="https://www.european-data-governance-act.com" target="_blank">The European Data Governance Act (DGA) </a></p> <p class="text-left">6. <a href="https://www.european-cyber-resilience-act.com" target="_blank">The European Cyber Resilience Act (CRA) </a></p> <p class="text-left">7. <a href="https://www.eu-digital-services-act.com" target="_blank">The Digital Services Act (DSA)</a></p> <p class="text-left">8. <a href="https://www.eu-digital-markets-act.com" target="_blank">The Digital Markets Act (DMA)</a></p> <p class="text-left">9. <a href="https://www.european-chips-act.com" target="_blank">The European Chips Act </a></p> <p class="text-left">10. <a href="https://www.artificial-intelligence-act.com" target="_blank">The Artificial Intelligence Act </a></p> <p class="text-left">11. <a href="https://www.ai-liability-directive.com" target="_blank">The Artificial Intelligence Liability Directive </a></p> <p class="text-left">12. <a href="https://www.faicp-framework.com" target="_blank">The Framework for Artificial Intelligence Cybersecurity Practices (FAICP) </a></p> <p class="text-left">13. <a href="https://www.eu-cyber-solidarity-act.com" target="_blank">The EU Cyber Solidarity Act</a></p> <p class="text-left">14. <a href="https://www.digital-networks-act.com" target="_blank">The Digital Networks Act (DNA)</a></p> <p class="text-left">15. <a href="https://www.european-eprivacy-regulation.com" target="_blank">The European ePrivacy Regulation </a></p> <p class="text-left">16. <a href="https://www.european-digital-identity-regulation.com" target="_blank">The European Digital Identity Regulation </a></p> <p class="text-left">17. <a href="https://www.media-freedom-act.com" target="_blank">The European Media Freedom Act (EMFA) </a></p> <p class="text-left">18. <a href="https://www.corporate-sustainability-due-diligence-directive.com/" target="_blank">The Corporate Sustainability Due Diligence Directive (CSDDD) </a></p> <p class="text-left">19. <a href="https://www.eu-scicf.com" target="_blank">The Systemic Cyber Incident Coordination Framework (EU-SCICF)</a></p> <p class="text-left">20. <a href="https://www.european-health-data-space.com" target="_blank">The European Health Data Space (EHDS)</a></p> <p class="text-left">21. <a href="https://www.european-financial-data-space.com/" target="_blank">The European Financial Data Space (EFDS)</a></p> <p class="text-left">22. <a href="https://www.financial-data-access.com" target="_blank">The Financial Data Access (FiDA) Regulation</a></p> <p class="text-left">23. <a href="https://www.payment-services-directive-3.com" target="_blank">The Payment Services Directive 3 (PSD3), Payment Services Regulation (PSR)</a></p> <p class="text-left">24. <a href="https://www.internal-market-emergency-resilience-act.com" target="_blank">Internal Market Emergency and Resilience Act (IMERA)</a></p> <p class="text-left">25. <a href="https://www.european-cyber-defence-policy.com" target="_blank">The European Cyber Defence Policy</a></p> <p class="text-left">26. <a href="https://www.strategic-compass-european-union.com" target="_blank">The Strategic Compass of the European Union</a></p> <p class="text-left">27. <a href="https://www.european-space-law.com" target="_blank">The European Space Law (EUSL) </a></p> <p class="text-left">28. <a href="https://www.data-privacy-framework.com" target="_blank">The EU-US Data Privacy Framework </a></p> <p class="text-left">29. <a href="https://www.cyber-diplomacy-toolbox.com" target="_blank">The EU Cyber Diplomacy Toolbox </a></p> <br> <br> <p class="text-left"><b>2. Is there any discount available for the distance learning programs?</b></p> <p class="text-left">We do not offer a discount for your first program. You have a $100 discount for your second and each additional program.</p> <p class="text-left">After you purchase the Electronic Identification Authentication and Trust Services 2.0 Trained Professional (eIDAS2.0TPro) program at $297, you can purchase:</p> <p class="text-left">a. The NIS 2 Directive Trained Professional (NIS2DTP) program at $197. You can find more about the program at: <a href="https://www.nis-2-directive.com/NIS_2_Directive_Trained_Professional_(NIS2DTP).html" target="_blank">https://www.nis-2-directive.com/NIS_2_Directive_Trained_Professional_(NIS2DTP).html</a>. </p> <p class="text-left">b. The Digital Operational Resilience Act Trained Professional (DORATPro) program at $197. You can find more about the program at: <a href="https://www.digital-operational-resilience-act.com/Digital_Operational_Resilience_Act_Trained_Professional_(DORATPro).html" target="_blank">https://www.digital-operational-resilience-act.com/Digital_Operational_Resilience_Act_Trained_Professional_(DORATPro).html</a>. </p> <p class="text-left">c. The Critical Entities Resilience Directive Trained Professional (CERDTPro) program at $197. You can find more about the program at: <a href="https://www.critical-entities-resilience-directive.com/Critical_Entities_Resilience_Directive_Trained_Professional_(CERDTPro).html" target="_blank">https://www.critical-entities-resilience-directive.com/Critical_Entities_Resilience_Directive_Trained_Professional_(CERDTPro).html</a>. </p> <p class="text-left">d. The Digital Services Act Trained Professional (DiSeActTPro) program at $197. You can find more about the program at: <a href="https://www.eu-digital-services-act.com/DiSeActTPro_Training.html" target="_blank">https://www.eu-digital-services-act.com/DiSeActTPro_Training.html</a>. </p> <p class="text-left">e. The Digital Markets Act Trained Professional (DiMaActTPro) program at $197. You can find more about the program at: <a href="https://www.eu-digital-markets-act.com/DiMaActTPro_Training.html" target="_blank">https://www.eu-digital-markets-act.com/DiMaActTPro_Training.html</a>. </p> <p class="text-left">f. The Data Governance Act Trained Professional (DatGovActTP) program at $197. You can find more about the program at: <a href="https://www.european-data-governance-act.com/DatGovActTP_Training.html" target="_blank">https://www.european-data-governance-act.com/DatGovActTP_Training.html</a>. </p> <p class="text-left">g. The European Chips Act Trained Professional (EChipsActTPro) program at $197. You can find more about the program at: <a href="https://www.european-chips-act.com/European_Chips_Act_Trained_Professional_(EChipsActTPro).html" target="_blank">https://www.european-chips-act.com/European_Chips_Act_Trained_Professional_(EChipsActTPro).html </a>. </p> <p class="text-left">h. The Data Act Trained Professional (DataActTPro) program at $197. You can find more about the program at: <a href="https://www.eu-data-act.com/Data_Act_Trained_Professional_(DataActTPro).html" target="_blank">https://www.eu-data-act.com/Data_Act_Trained_Professional_(DataActTPro).html </a>. </p> <p class="text-left">In order to receive the URL for the discounted cost for your second and each additional program, please send us an email with title: “Please send me the URL for the discounted cost.”</p> <p class="text-left">In the email, please let us know: </p> <p class="text-left">a. Which was the name and email address of the person or legal entity that had purchased the first program. </p> <p class="text-left">b. Which is the program you want to purchase now at $197 instead of $297. </p> <p class="text-left">You will receive the URL for the discounted cost for your second and each additional program in less than 48 hours (working days). Please remember to check your spam folder too. </p> <br> <br> <p class="text-left"><b>3. Are there any entry requirements or prerequisites required for enrolling in the training programs? </b></p> <p class="text-left">There are no entry requirements or prerequisites for enrollment. Our programs give the opportunity to individuals of all levels to learn, grow, and develop new skills without the need for prior qualifications or specific experience. </p> <br> <br> <p class="text-left"><b>4. I want to learn more about the exam.</b></p> <p class="text-left">You can take the exam online from your home or office, in all countries. </p> <p class="text-left">It is an open book exam. Risk and compliance management is something you must understand and learn, not memorize. You must acquire knowledge and skills, not commit something to memory.</p> <p class="text-left">You will be given <b>90 minutes</b> to complete a <b>35-question </b>exam. You must score <b>70% or higher.</b> </p> <p class="text-left">The exam contains only questions that have been clearly answered in the official presentations.</p> <p class="text-left">All exam questions are multiple-choice, composed of two parts: </p> <p class="text-left">a. A stem (a question asked, or an incomplete statement to be completed).</p> <p class="text-left">b. Four possible responses.</p> <p class="text-left">In multiple-choice questions, <b>you must not look for a correct answer, you must look for the best answer. </b>Cross out all the answers you know are incorrect, then focus on the remaining ones. Which is the best answer? With this approach, you save time, and you greatly increase the likelihood of selecting the correct answer.</p> <p class="text-left"><b>TIME LIMIT</b> - This exam has a 90-minute time limit. You must complete this exam within this time limit, otherwise the result will be marked as an unsuccessful attempt.</p> <p class="text-left"><b>BACK BUTTON</b> - When taking this exam you are NOT permitted to move backwards to review/change prior answers. Your browser back button will refresh the current page instead of moving backward. </p> <p class="text-left"><b>RESTART/RESUME </b>– You CANNOT stop and then resume the exam. If you stop taking this exam by closing your browser, your answers will be lost, and the result will be marked as an unsuccessful attempt.</p> <p class="text-left"><b>SKIP </b>- You CANNOT skip answering questions while taking this exam. You must answer all the questions in the order the questions are presented.</p> <p class="text-left">When you are ready to take the exam, you must follow the steps described at <b>"Question h. I am ready for the exam. What must I do?",</b> at: </p> <p class="text-left"><a href="https://www.european-digital-identity-regulation.com/Distance_Learning_Programs_Exam_Certificate_of_Completion.pdf" target="_blank">https://www.european-digital-identity-regulation.com/Distance_Learning_Programs_Exam_Certificate_of_Completion.pdf</a></p> <br> <br> <p class="text-left"><b>5. How comprehensive are the presentations? Are they just bullet points?</b></p> <p class="text-left">The presentations are not bullet points. They are effective and appropriate to study online or offline.</p> <br> <br> <p class="text-left"><b>6. Do I need to buy books to pass the exam?</b></p> <p class="text-left">No. If you study the presentations, you can pass the exam. All the exam questions are clearly answered in the presentations. If you fail the first time, you must study more. Print the presentations and use Post-it to attach notes, to know where to find the answer to a question.</p> <br> <br> <p class="text-left"><b>7. Is it an open book exam? Why?</b></p> <p class="text-left">Yes, it is an open book exam. Risk and compliance management is something you must understand and learn, not memorize. You must acquire knowledge and skills, not commit something to memory.</p> <br> <br> <p class="text-left"><b>8. Do I have to take the exam soon after receiving the presentations?</b></p> <p class="text-left">No. You can take the exam any time. Your account never expires. You have lifetime access to the training program. If there are any updates to the training material and you have not passed the exam, you will receive the updated program free of charge.</p> <br> <br> <p class="text-left"><b>9. Do I have to spend more money in the future to keep my certificate of completion valid?</b></p> <p class="text-left">No. Your certificate of completion will remain valid, without the need to spend money or to take another exam in the future.</p> <br> <br> <p class="text-left"><b>10. Ok, the certificate of completion never expires, but things change.</b></p> <p class="text-left">Recertification would be a great recurring revenue stream for Cyber Risk GmbH, but it would also be a recurring expense for our clients. We resisted the temptation to "introduce multiple recurring revenue streams to keep business flowing", as we were consulted. No recertification is needed for our programs.</p> <p class="text-left">Things change, and this is the reason you need to visit the "Reading Room" of Cyber Risk GmbH every month, and read the monthly newsletter with updates, alerts, and opportunities, to stay current. You may visit: <p class="text-left"><a href="https://www.cyber-risk-gmbh.com/Reading_Room.html" target="_blank">https://www.cyber-risk-gmbh.com/Reading_Room.html</a></p> <br> <br> <p class="text-left"><b>11. Which is your refund policy?</b></p> <p class="text-left">Cyber Risk GmbH has a very clear refund policy: You have the option to ask for a full refund up to 60 days after the payment. If you do not want one of our programs for any reason, all you must do is to send us an email, and we will refund the payment after one business day, no questions asked.</p> <br> <br> <p class="text-left"><b>12. I want to receive a printed certificate. Can you send me one?</b></p> <p class="text-left">Unfortunately this is not possible. You will receive your certificate via email in Adobe Acrobat format (pdf), with a scannable QR code for verification, 7 business days after you pass the exam. A business day refers to any day in which normal business operations are conducted (in our case Monday through Friday), excluding weekends and public holidays. </p> <p class="text-left">Cyber Risk GmbH will develop a dedicated web page for each professional (https://www.cyber-risk-gmbh.com/Your_Name.html). In your dedicated web page we will add your full name, all the certificates you have received from Cyber Risk GmbH, and the pictures of your certificates. </p> <p class="text-left">When third parties scan the QR code on your certificate, they will visit your dedicated web page, and they will be able to verify that you are a certified professional, and your certificates are valid and legitimate. </p> <p class="text-left">Professional certificates are some of the most frequently falsified documents. Employers and third parties need an easy, effective, and efficient way to check the authenticity of each certificate. QR code verification is a good response to this demand. </p> <p class="text-left">You can print your certificate that you will receive in Adobe Acrobat format. With the scannable QR code, all third parties can verify the authenticity of each certificate in a matter of seconds. </p> <br> <br> <p class="text-left"><b>13. Why should I choose your training programs?</b></p> <p class="text-left"><b>I. </b>There are many new Directives and Regulations in the EU. Professionals are overwhelmed and have little time to spare. Cyber Risk GmbH has developed training programs that can assist them in understanding the new requirements, and in providing evidence that they are qualified, as they must pass an exam to receive their certificate of completion. </p> <p class="text-left"><b>II. </b>Our training programs are flexible and convenient. Learners can access the course material and take the exam at any time and from any location. This is especially important for those with busy schedules.</p> <p class="text-left"><b>III. </b>The all-inclusive cost of our programs is very low. There is no additional cost for each program, now or in the future, for any reason.</p> <p class="text-left"><b>IV. </b>If you purchase a second program, you have a $100 discount. The all-inclusive cost for your second (and each additional) program is $197.</p> <p class="text-left"><b>V. </b>There are 3 exam attempts per year that are included in the cost of each program, so you do not have to spend money again if you fail.</p> <p class="text-left"><b>VI. </b>No recertification is required. Your certificates of completion never expire.</p> <p class="text-left"><b>VII. </b>The marketplace is clearly demanding qualified professionals in risk and compliance management. Certified professionals enjoy industry recognition and have more and better job opportunities.</p> <p class="text-left"><b>VIII. </b>Firms and organizations hire and promote fit and proper professionals who can provide evidence that they are qualified. Employers need assurance that managers and employees have the knowledge and skills needed to mitigate risks and accept responsibility. Supervisors and auditors ask for <b>independent evidence </b>that the process owners are qualified, and that the controls can operate as designed, because the persons responsible for these controls have the necessary knowledge and experience.</p> <p class="text-left"><b>IX. </b>Professionals that gain more skills and qualifications often become eligible for higher-paying roles. Investing in training can have a direct positive impact on a manager's or employee's earning potential.</p> <hr> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> <h3>Cyber Risk GmbH, some of our clients</h3> <br> <div class="logos"> <div class="logos-slide"> <img src="Logos/XMA8.png" alt="" > <img src="Logos/SYGNIA5.jpg" alt="" > <img src="Logos/DELL3.jpg" alt="" > <img src="Logos/VW.jpg" alt="" > <img src="Logos/Bosch9.png" alt="" > <img src="Logos/Swisslife3.JPG" alt="" > <img src="Logos/ATLAS8.png" alt="" > <img src="Logos/INSIG8.png" alt="" > <img src="Logos/SANT8.png" alt="" > <img src="Logos/NTT38.png" alt="" > <img src="Logos/EIB15.PNG" alt="" > <img src="Logos/SC8.JPG" alt="" > <img src="Logos/schindler.jpg" alt="" > <img src="Logos/AO9.png" alt="" > <img src="Logos/GS300.JPG" alt="" > <img src="Logos/DB8.png" alt="" > <img src="Logos/TM8.png" alt="" > <img src="Logos/OK8.png" alt="" > <img src="Logos/PWC5.JPG" alt="" > <img src="Logos/Fujitsu.png" alt="" > <img src="Logos/HO5.JPG" alt="" > <img src="Logos/FIN22.png" alt="" > <img src="Logos/SAN8.png" alt="" > <img src="Logos/BAH9.png" alt="" > <img src="Logos/AT32.png" alt="" > <img src="Logos/WINS25.png" alt="" > <img src="Logos/SKY12.png" alt="" > <img src="Logos/RB78.png" alt="" > <img src="Logos/WU8.png" alt="" > <img src="Logos/TDC.JPG" alt="" > <img src="Logos/BH18.png" alt="" > <img src="Logos/DeepSec_Conference7.png" alt="" > <img src="Logos/DC12.png" alt="" > <img src="Logos/BROAD8.png" alt="" > <img src="Logos/LEMON8.PNG" alt="" > <img src="Logos/SIK8.PNG" alt="" > <img src="Logos/KUMO8.PNG" alt="" > <img src="Logos/VEST8.PNG" alt="" > <img src="Logos/MOXA8.PNG" alt="" > <img src="Logos/TIET8.PNG" alt="" > <img src="Logos/UNI8.PNG" alt="" > <img src="Logos/BCC11.PNG" alt="" > <img src="Logos/SN8.PNG" alt="" > <img src="Logos/KYN8.PNG" alt="" > <img src="Logos/PG8.PNG" alt="" > <img src="Logos/MER8.PNG" alt="" > <img src="Logos/LIB8.PNG" alt="" > <img src="Logos/ALI8.PNG" alt="" > <img src="Logos/USA8.PNG" alt="" > <img src="Logos/MAR8.PNG" alt="" > <img src="Logos/ABB8.PNG" alt="" > <img src="Logos/INSI8.PNG" alt="" > </div> </div> <script> var copy = document.querySelector(".logos-slide").cloneNode(true); document.querySelector(".logos").appendChild(copy); </script> </div> </div> </div> </div> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> </div> </div> </div> </div> <!--<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js"></script> --> <script src="js/bootstrap.js"></script> <script> $(document).ready(function() { var owl = $('.cliend-logo'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 6 }, 1000: { items: 6 } } }) }) $(document).ready(function() { var owl = $('.testimonialstext'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 1 }, 1000: { items: 1 } } }) }) </script> <script> $(window).scroll(function() { if ($(document).scrollTop() > 50) { $('nav').addClass('shrink'); $('.add').hide(); } else { $('nav').removeClass('shrink'); $('.add').show(); } }); </script> </body> </html>