Implementation of Control A 8.18 Use of Privileged Utility Programs
This competency covers essential topics to secure and manage privileged utility programs. It includes the fundamentals of utility programs, access control implementation, logging, best practices, compliance requirements, and ISO/IEC 27001 integration.
5 Trainers
About
Course Overview:
This course provides in-depth training on how to manage privileged utility programs securely. From access control and logging to best practices and compliance with ISO/IEC 27001, participants will learn how to safeguard system utilities and prevent unauthorized access and misuse.
What You'll Learn:
Fundamentals of privileged utility programs and their role in system management
How to implement and manage access controls for these programs
Logging and monitoring usage to detect potential security breaches
Best practices for managing utility programs securely
Understanding compliance requirements and ensuring adherence to standards
How to handle unauthorized use and exceptions
Integration with ISO/IEC 27001 for continuous improvement and security audits
Who Should Take This Course?
This course is perfect for:
Cybersecurity professionals
IT administrators and system managers
Compliance officers and risk managers
Auditors and assessors focusing on security controls
Business leaders overseeing secure system management
What You'll Get:
A certification of completion
Comprehensive knowledge of privileged utility program management
Hands-on experience with tools and procedures to secure utility programs
Access to a global network of cybersecurity professionals
Access to course materials in multiple languages
Module 1
Introduction to Utility Programs
Overview of Utility Programs (15 mins)
Identifying and Assessing Utility Programs (15 mins)
Authorization and Access Control (15 mins)
Segregation and Limitation Practices (14 mins)
Take the Practice Quiz
Module 2
Implementing Access Controls and Logging
Access Control Procedures (15 mins)
Defining and Documenting Authorization Levels (15 mins)
Logging and Monitoring Use (15 mins)
Practical Examples and Tools (14 mins)
Take the Practice Quiz
Module 3
Best Practices and Compliance
Best Practices for Utility Program Management (15 mins)
Compliance Requirements and Standards (14 mins)
Handling Unauthorized Use and Exceptions (14 mins)
Case Studies and Lessons Learned (15 mins)
Take the Practice Quiz
Module 4
Integration and ISO/IEC 27001
Integrating Utility Program Management with ISO/IEC 27001 (15 mins)
Languages Available: Spanish, English, German, French
Exam
Certificate upon completion of the course
Tags
Implementation of Control A 8.18
Privileged Utility Programs
Access Control
Logging
ISO/IEC 27001
Compliance
Cybersecurity Best Practices
About the Trainer
Kevin Kamanga
Cybersecurity Project Manager and ISMS Auditor
Kevin Kamanga is a Project Manager and ISMS Auditor with a strong foundation in human resources and IT. A JKUAT graduate, he is skilled in Network Administration, DNS, and Network Security. Kevin holds numerous certifications, including Fortinet FortiGate Administrator, Fortinet Certified Associate in Cybersecurity, Lead Cybersecurity Manager (PECB), PRINCE2 Practitioner, and Cisco Certified Network Professional (CCNP) Enterprise. His expertise spans cybersecurity, project management, and digital transformation, making him a valuable asset in enhancing organizational security and operational efficiency.