{"id":4355,"date":"2026-04-14T16:44:03","date_gmt":"2026-04-14T12:44:03","guid":{"rendered":"https:\/\/cyberforensics.az\/?page_id=4355"},"modified":"2026-04-15T20:50:47","modified_gmt":"2026-04-15T16:50:47","slug":"pecb","status":"publish","type":"page","link":"https:\/\/cyberforensics.az\/ru\/pecb\/","title":{"rendered":"PECB"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4355\" class=\"elementor elementor-4355\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aef61b4 e-flex e-con-boxed e-con e-parent\" data-id=\"aef61b4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0fd3a5d elementor-widget elementor-widget-heading\" data-id=\"0fd3a5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PECB<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-430056f e-flex e-con-boxed e-con e-parent\" data-id=\"430056f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-22c5448 elementor-widget elementor-widget-html\" data-id=\"22c5448\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<style>\n.brochure-section {\n    margin-bottom:30px;\n    border-radius:12px;\n    overflow:hidden;\n    border:1px solid #2e1b2b;\n}\n\n.brochure-header {\n    padding:15px 20px;\n    background:#792C6C;\n    color:#fff;\n    cursor:pointer;\n    font-weight:600;\n    display:flex;\n    justify-content:space-between;\n    align-items:center;\n}\n\n.brochure-content {\n    display:none;\n    padding:20px;\n    background:#0b0f1a;\n}\n\n.brochure-grid {\n    display:grid;\n    grid-template-columns:repeat(auto-fill,minmax(250px,1fr));\n    gap:20px;\n}\n\n.brochure-card {\n    border:1px solid #2e3b55;\n    padding:15px;\n    border-radius:10px;\n    background:#792C6C;\n    color:#fff;\n}\n\n.brochure-btn {\n    display:inline-block;\n    margin-top:10px;\n    padding:6px 12px;\n    background:#ffffff;\n    color:#792C6C;\n    border-radius:6px;\n    text-decoration:none;\n    font-weight:600;\n}\n\n.brochure-btn:hover {\n    background:#f1f1f1;\n}\n<\/style>\n\n<div id=\"brochures\"><\/div>\n\n<script>\n\/* \ud83d\udd25 \u0412\u041e\u0422 \u0413\u041b\u0410\u0412\u041d\u041e\u0415 \u0418\u0421\u041f\u0420\u0410\u0412\u041b\u0415\u041d\u0418\u0415 *\/\nconst base = \"https:\/\/cyberforensics.az\/wp-content\/uploads\/brochures\/\";\n\nconst files = [\n\"ai-risk-manager_4p.pdf\",\"caim_4p.pdf\",\"caip-4p.pdf\",\"capt_4p.pdf\",\"ccta_4p.pdf\",\"cdef_4p.pdf\",\n\"chief-information-security-officer-4p.pdf\",\"cir_4p.pdf\",\"clf_4p.pdf\",\"cmmc-ab-certified-professional-4p.pdf\",\n\"cmmc-foundation-1p.pdf\",\"cmsa_4.pdf\",\"cmsia-4p.pdf\",\"computer-forensics-foundation_1p.pdf\",\n\"cybersecurity-foundation_1p.pdf\",\"data-protection-officer-en.pdf\",\"digital-transformation-officer_4p.pdf\",\n\"disaster-recovery-lead-manager_4p.pdf\",\"dora-foundation_1p.pdf\",\"dora-lead-manager_4p.pdf\",\n\"ebios-risk-manager_4p.pdf\",\"gdpr-foundation_1p.pdf\",\"isa-iec-62443-lead-implementer_4p1.pdf\",\n\n\"iso-13485-foundation_1p.pdf\",\"iso-13485-lead-auditor_4p.pdf\",\"iso-13485-lead-implementer_4p.pdf\",\n\"iso-14001-foundation_1p.pdf\",\"iso-14001-lead-auditor_4p.pdf\",\"iso-14001-lead-implementer_4p.pdf\",\n\"iso-18788-foundation_1p.pdf\",\"iso-18788-lead-auditor_4p.pdf\",\"iso-18788-lead-implementer_4p.pdf\",\n\"iso-20400-lead-manager-4p.pdf\",\n\"iso-21001-foundation_1p.pdf\",\"iso-21001-lead-auditor_4p.pdf\",\"iso-21001-lead-implementer_4p.pdf\",\n\"iso-21502-foundation_1p.pdf\",\"iso-21502-lead-project-manager_4p.pdf\",\n\"iso-22000-foundation_1p.pdf\",\"iso-22000-lead-auditor_4p.pdf\",\"iso-22000-lead-implementer_4p.pdf\",\n\"iso-22301-foundation_1p.pdf\",\"iso-22301-lead-auditor_4p.pdf\",\"iso-22301-lead-implementer-en.pdf\",\n\"iso-26000-foundation_1p.pdf\",\"iso-26000-lead-manager_4p.pdf\",\n\"iso-28000-foundation_1p.pdf\",\"iso-28000-lead-auditor_4p.pdf\",\"iso-28000-lead-implementer_4p.pdf\",\n\"iso-31000-foundation_1p.pdf\",\"iso-31000-lead-risk-manager_4p.pdf\",\"iso-31000-risk-manager-en.pdf\",\n\"iso-37000-lead-manager.pdf\",\"iso_37000_corporate_governance_manager_4p.pdf\",\n\"iso-37001-foundation_1p.pdf\",\"iso-37001-lead-auditor-en.pdf\",\"iso-37001-lead-Implementer_4p.pdf\",\n\"iso-37301-foundation_1p.pdf\",\"iso-37301-lead-implementer_4p.pdf\",\n\"iso-45001-foundation_1p.pdf\",\"iso-45001-lead-auditor_4p.pdf\",\"iso-45001-lead-implementer_4p.pdf\",\n\"iso-50001-foundation_1p.pdf\",\"iso-50001-lead-auditor_4p.pdf\",\"iso-50001-lead-implementer_4p.pdf\",\n\"iso-55001-foundation_1p.pdf\",\"iso-55001-lead-auditor_4p.pdf\",\"iso-55001-lead-implementer_4p.pdf\",\n\"iso-9001-foundation_1p.pdf\",\"iso-9001-lead-auditor-en.pdf\",\"iso-9001-lead-implementer_4p.pdf\",\n\"iso-iec-17025-foundation_1p.pdf\",\"iso-iec-17025-lead-assessor_4p.pdf\",\"iso-iec-17025-lead-implementer_4p.pdf\",\n\"iso-iec-20000-foundation_1p.pdf\",\"iso-iec-20000-lead-auditor_4p.pdf\",\"iso-iec-20000-lead-implementer_4p.pdf\",\n\"iso-iec-27001-foundation-en.pdf\",\"iso-iec-27001-lead-auditor-en.pdf\",\"iso-iec-27001-lead-implementer-en.pdf\",\n\"iso-iec-27002-foundation_1p.pdf\",\"iso-iec-27005-foundation_1p.pdf\",\n\"iso-iec-27035-foundation_1p.pdf\",\n\"iso-iec-27701-foundation_1p.pdf\",\"iso-iec-27701-lead-implementer_4p.pdf\",\n\"iso-iec-38500-foundation_1p.pdf\",\"iso-iec-42001-foundation_1p.pdf\",\n\n\"iso-pen-test-professional_4p.pdf\",\"lead-ethical-hacker_4p.pdf\",\"lead-cybersecurity-manager_4p.pdf\",\n\"lead-cloud-security-manager_4p.pdf\",\"lead-computer-forensics-examiner_4p.pdf\",\n\"lead-crisis-manager_4p.pdf\",\"lead-operational-resilience-manager-4p.pdf\",\n\"nist-cybersecurity-lead-implementer-4p.pdf\",\n\n\"training-catalog-2026.pdf\"\n];\n\nfunction category(f){\nf=f.toLowerCase();\n\nif(f.includes(\"27001\")||f.includes(\"27002\")||f.includes(\"27005\")||f.includes(\"27035\")||f.includes(\"27400\")||f.includes(\"ciso\")||f.includes(\"ebios\"))\nreturn \"Information Security\";\n\nif(f.includes(\"nist\")||f.includes(\"cmmc\")||f.includes(\"soc2\")||f.includes(\"cloud\")||f.includes(\"pen\"))\nreturn \"Cybersecurity Management\";\n\nif(f.includes(\"hacker\")||f.includes(\"forensics\")||f.includes(\"incident\")||f.includes(\"ccta\"))\nreturn \"Technical Cybersecurity\";\n\nif(f.includes(\"22301\")||f.includes(\"disaster\")||f.includes(\"dora\")||f.includes(\"resilience\")||f.includes(\"crisis\"))\nreturn \"Continuity, Resilience, and Recovery\";\n\nif(f.includes(\"gdpr\")||f.includes(\"27701\")||f.includes(\"data-protection\"))\nreturn \"Privacy and Data Protection\";\n\nif(f.includes(\"ai\")||f.includes(\"42001\"))\nreturn \"Artificial Intelligence\";\n\nif(f.includes(\"digital\"))\nreturn \"Digital Transformation\";\n\nif(f.includes(\"31000\")||f.includes(\"370\")||f.includes(\"37301\")||f.includes(\"38500\"))\nreturn \"Governance, Risk, and Compliance\";\n\nif(f.includes(\"9001\")||f.includes(\"14001\")||f.includes(\"45001\")||f.includes(\"22000\")||f.includes(\"50001\")||f.includes(\"13485\")||f.includes(\"55001\"))\nreturn \"Quality, Health, Safety, and Sustainability\";\n\nreturn \"Other\";\n}\n\nfunction title(f){\nreturn f.replace('.pdf','').replace(\/[-_]\/g,' ').replace(\/\\b\\w\/g,l=>l.toUpperCase());\n}\n\nlet grouped={};\n\nfiles.forEach(f=>{\nlet c=category(f);\nif(!grouped[c]) grouped[c]=[];\ngrouped[c].push(f);\n});\n\nconst order = [\n\"Information Security\",\n\"Cybersecurity Management\",\n\"Technical Cybersecurity\",\n\"Continuity, Resilience, and Recovery\",\n\"Privacy and Data Protection\",\n\"Artificial Intelligence\",\n\"Digital Transformation\",\n\"Governance, Risk, and Compliance\",\n\"Quality, Health, Safety, and Sustainability\",\n\"Other\"\n];\n\nlet html=\"\";\n\norder.forEach(c=>{\nif(!grouped[c]) return;\n\nhtml+=`\n<div class=\"brochure-section\">\n<div class=\"brochure-header\" onclick=\"this.nextElementSibling.style.display = this.nextElementSibling.style.display==='block'?'none':'block'\">\n${c} <span>\u2193<\/span>\n<\/div>\n<div class=\"brochure-content\">\n<div class=\"brochure-grid\">`;\n\ngrouped[c].forEach(f=>{\nhtml+=`\n<div class=\"brochure-card\">\n<div>${title(f)}<\/div>\n<a class=\"brochure-btn\" href=\"${base+f}\" target=\"_blank\">Download<\/a>\n<\/div>`;\n});\n\nhtml+=`<\/div><\/div><\/div>`;\n});\n\ndocument.getElementById(\"brochures\").innerHTML=html;\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>PECB<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4355","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/pages\/4355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/comments?post=4355"}],"version-history":[{"count":13,"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/pages\/4355\/revisions"}],"predecessor-version":[{"id":4373,"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/pages\/4355\/revisions\/4373"}],"wp:attachment":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/media?parent=4355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}