Implementation of Control A 8.22 Segregation of Networks
This competency provides a comprehensive framework for effective network segregation. It covers the implementation of VLANs, firewall rules, and Access Control Lists (ACLs) to enhance security and control. Participants will learn to monitor network traffic and detect incidents in cloud environments while ensuring compliance with ISO/IEC 27001. This knowledge empowers individuals to create a robust network infrastructure that supports organizational objectives and mitigates potential threats.
5 Trainers
About
Course Overview:
This course offers a detailed approach to implementing network segregation. It explains how to design and configure network components such as VLANs, firewalls, and ACLs to enhance security. Participants will also learn to monitor network traffic and detect incidents, with a focus on cloud environments. The course includes strategies for ensuring compliance with ISO/IEC 27001, helping to secure the network infrastructure and mitigate potential risks.
What You'll Learn:
Principles of network segregation and its importance for security
Designing and implementing VLANs, firewalls, and ACLs for enhanced control
Monitoring network traffic and detecting incidents in segregated environments
Ensuring compliance with ISO/IEC 27001 standards in network management
Advanced concepts like Zero Trust Architecture and integration in network segregation
Best practices for maintaining and auditing segregated networks
Who Should Take This Course?
This course is perfect for:
Network security professionals
IT administrators and engineers
Cybersecurity consultants and auditors
Risk managers and compliance officers
Business leaders and project managers responsible for network security
What You'll Get:
A certification of completion
Practical knowledge of network segregation and security principles
Hands-on experience with VLANs, firewalls, and ACLs
Access to a global community of cybersecurity professionals
Access to course materials in multiple languages
Module 1
Introduction to the Secure System Architecture
Overview of Network Segregation (14 mins)
Business Needs and Security Boundaries (14 mins)
Types of Network Segregation (16 mins)
Tools and Technologies for Network Segregation (16 mins)
Take the Practice Quiz
Module 2
Implementing Network Segregation
Planning and Design (15 mins)
VLAN Configuration and Management (16 mins)
Firewall Rules and Policies (15 mins)
Access Control List (ACL) (14 mins)
Take the Practice Quiz
Module 3
Monitoring and Managing Segregated Networks
Monitoring Network Traffic (15 mins)
Incident Detection and Response (16 mins)
Regular Audits and Assessments (15 mins)
Updating and Maintaining Segregation (15 mins)
Take the Practice Quiz
Module 4
Advanced Concepts and ISO/IEC 27001
Segregation in Cloud Environments (15 mins)
Integration with Zero Trust Architecture (16 mins)
Implementing as per A 8.22 ISO/IEC 27001 (15 mins)
Languages Available: Spanish, English, German, French
Exam
Certificate upon completion of the course
Tags
Implementation of Control 8.22
Segregation of Networks
VLAN Configuration
Firewall Rules
Access Control Lists
Network Security
Incident Detection
ISO/IEC 27001
Zero Trust Architecture
About the Trainer
Kevin Kamanga
Cybersecurity Project Manager and ISMS Auditor
Kevin Kamanga is a Project Manager and ISMS Auditor with a strong foundation in human resources and IT. A JKUAT graduate, he is skilled in Network Administration, DNS, and Network Security. Kevin holds numerous certifications, including Fortinet FortiGate Administrator, Fortinet Certified Associate in Cybersecurity, Lead Cybersecurity Manager (PECB), PRINCE2 Practitioner, and Cisco Certified Network Professional (CCNP) Enterprise. His expertise spans cybersecurity, project management, and digital transformation, making him a valuable asset in enhancing organizational security and operational efficiency.