AI Governance and Risk Management based on ISO/IEC 42001

AI Governance and Risk Management based on ISO/IEC 42001

Book a Meeting Login Competency AI Governance and Risk Management based on ISO/IEC 42001 Explore the foundational elements of AI governance and risk management based on ISO/IEC 42001. This competency covers governance principles, risk assessment, policy development, and compliance monitoring. Learn how to align AI practices with ethical, legal, and organizational goals. 5 Trainers About Course Overview: This competency introduces learners to the foundational principles of AI governance and risk management as outlined in ISO/IEC 42001. The course focuses on AI governance principles, risk assessment methodologies, policy development, compliance monitoring, and aligning AI practices with ethical and legal frameworks. Learners will explore the key considerations for ensuring AI systems are managed responsibly, securely, and in alignment with organizational goals. What You’ll Learn: The fundamentals of AI governance and ISO/IEC 42001 How to identify, assess, and manage risks in AI systems Development and implementation of AI governance policies Ethical, legal, and organizational considerations for AI Stakeholder roles and accountability in AI governance Strategies for ongoing AI risk monitoring and compliance Key frameworks and metrics for reporting AI governance and compliance   Who Should Take This Course? This course is perfect for: Professionals looking to implement AI governance frameworks in their organization Risk management professionals focusing on AI systems Legal and compliance professionals with an interest in AI IT and security professionals working with AI deployments Consultants and auditors specializing in AI governance and risk Anyone looking to build their expertise in AI governance and risk management What You’ll Get: Certification upon completion In-depth knowledge of ISO/IEC 42001 and AI governance principles Practical skills in AI risk management and policy development An understanding of how to manage AI systems in a compliant and ethical manner Experience with governance frameworks, risk assessment, and policy integration Tools for ongoing AI risk monitoring and compliance reporting Access to resources and templates for real-world AI governance and risk management Module 1 Introduction to AI Governance Standards Overview of ISO/IEC 42001 (14 mins) Foundational AI Governance Principles (15 mins) Aligning AI with Organizational Goals (15 mins) Stakeholders and Roles in AI Governance (14 mins) Take the Practice Quiz Module 2 Risk Management for AI Systems AI Risk Identification and Classification (13 mins) Risk Assessment Methodologies (15 mins) Mitigation Strategies and Controls (15 mins) Ongoing Risk Monitoring (15 mins) Take the Practice Quiz Module 3 Establishing AI Governance Policies Policy Development Lifecycle (15 mins) Integrating Ethical and Legal Considerations (14 mins) Data Governance and Quality Assurance (14 mins) Roles and Accountability Structures (15 mins) Take the Practice Quiz Module 4 Monitoring and Reporting for AI Compliance Compliance Monitoring Frameworks (14 mins) Metrics and KPIs for AI Governance (15 mins) Reporting Mechanisms and Documentation (13 mins) Incident Management and Continuous Improvement (15 mins) Take the Practice Quiz Specialization · 4 modules              Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags Artificial Intelligence ISO/IEC 42001 AI Governance Risk Management Policy AI Systems AI Compliance About the Trainer Adrian Resag Head of Internal Audit, Risk Management, and Internal Control   Adrian Resag is the Academic Director at OCEG and a global GRC leader with deep expertise in audit, risk, and compliance. He is the founder of the Risk Governance Institute and a creator of internationally recognized certifications in internal audit, information security, and AI governance. Adrian has trained professionals worldwide, including at universities, corporations, and global institutions. He has served as Global Head of Internal Audit, Risk Management, and Internal Control, leading international teams across sectors such as banking, FMCG, energy, and manufacturing. He holds certifications including CIA, CISA, GRCA, CRMA, ISO 27001, ISO 42001, GDPR, and DORA. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Information Security Management based on ISO/IEC 27001

Book a Meeting Login Competency Information Security Management based on ISO/IEC 27001 This competency provides an introduction to ISO/IEC 27001, starting with the fundamentals of an information security management system (ISMS) and progressing through the initial stages of planning and early implementation. 5 Trainers About Course Overview: This competency provides an introduction to ISO/IEC 27001, focusing on the creation and implementation of an information security management system (ISMS). The course will guide learners through the fundamentals of ISMS, ISO/IEC 27001 clauses, risk management, and security controls. The goal is to provide learners with a solid foundation in building and maintaining a secure and compliant information security environment. What You’ll Learn: The fundamentals of ISO/IEC 27001 and ISMS How to navigate the clauses and requirements of ISO/IEC 27001 Risk management processes within information security Key strategies for implementing security controls The importance of leadership, competence, and awareness in an ISMS Incident management processes for effective information security response How to maintain compliance and continually improve information security systems Who Should Take This Course? This course is perfect for: Professionals looking to implement ISO/IEC 27001 in their organization Information security managers and officers Risk management professionals IT and security professionals aiming to expand their knowledge of ISMS Consultants and auditors involved in ISO/IEC 27001 assessments Anyone looking to improve their skills in managing information security risks and compliance What You’ll Get: Certification upon completion In-depth knowledge of ISO/IEC 27001 and its implementation Practical skills for managing information security risks A clear understanding of the ISMS framework and its components Experience in assessing and improving an organization’s security posture A comprehensive understanding of how to manage and implement security controls Access to resources and tools for managing an ISMS in real-world scenarios Module 1 Information Security 101: Getting Started with an ISMS Introduction to Information Security Management (14 mins) Understanding Vulnerabilities, Risks and Controls (15 mins) What Is an ISMS Based on ISO/IEC 27001 ? (14 mins) Navigating an ISMS through Clauses 6-10  (14 mins) Take the Practice Quiz Module 2 ISMS Planning and Early Implementation Leadership and Project Approval (14 mins) Competence and Awareness (15 mins) Analysis of the Existing System (15 mins) Keeping Data Safe: Information Security Policy (14 mins) Take the Practice Quiz Module 3 Information Security Risk and Key Operations Information Security Risk Management (Part 1) (14 mins) Information Security Risk Management (Part 2) (14 mins) Changes, Resource Management, and Supporting Standards (15 mins) Incident Management (14 mins) Take the Practice Quiz Module 4 Implementation of Information Security Controls Organizational Controls (14 mins) People and Physical Controls (14 mins) Technological Controls (Part I) (14 mins) Technological Controls (Part II) (14 mins) Take the Practice Quiz Specialization · 4 modules              Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags Information Security Information Security Management Data Protection ISMS Information Security Implementation Risk Management About the Trainer Rinske Geerlings Risk, Business Continuity, and Information Security Expert   Rinske Geerlings, a renowned consultant, speaker, and certified trainer, excels in Business Continuity, Information Security, Crisis Management, Disaster Recovery, and Risk Management. With over 20 years of global experience, Rinske is known for innovative strategies. Completing her Master’s in Engineering in 1996, Rinske provided consultancy to Central Banks, government entities, and global corporations. As MD of Business As Usual in Australia, she drove significant growth. Proficient in ISO standards like ISO 22301, ISO 31000, and ISO/IEC 27001, Rinske has earned accolades including Risk Consultant of the Year. Advocating authenticity and impactful relationships, she collaborates with PECB to offer professional ISO certifications. Dedicated to promoting resilience and empowerment, Rinske inspires leadership in Risk Management and Business Continuity. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Techniques de cybersécurité

Book a Meeting Login Competency Techniques de Cybersécurité Dans cette compétence en cybersécurité, contrer attaques serveurs, applications et social engineering. Explorez les tests d’intrusion, sécurité des applications, serveurs, utilisateurs, méthodes d’authentification, autorisation, et chiffrement. 5 Trainers About Course Overview: This competency focuses on defending against attacks targeting servers, applications, and users. Explore penetration testing, server and application security, user authentication, and encryption to build secure environments. What You’ll Learn: Techniques to counter server and application attacks The role of social engineering in cyberattacks Penetration testing and vulnerability assessments Authentication and authorization methods Encryption techniques for securing data Who Should Take This Course? This course is perfect for: Cybersecurity professionals looking to improve their skills in server, application, and user protection IT and security teams managing organizational infrastructure Penetration testers and ethical hackers Professionals focused on secure application design Anyone interested in improving their knowledge of cybersecurity techniques What You’ll Get: Certification upon completion Practical skills in securing servers, applications, and user environments Knowledge of cybersecurity measures to protect against common attacks Hands-on experience with penetration testing and security controls Advanced understanding of encryption techniques Module 1 Mécanismes d’attaque Mécanismes d’attaque au niveau des … (16 mins) Mécanismes d’attaque au niveau des … (14 mins) Mécanismes d’attaque par le social … (13 mins) Les tests d’intrusion (13 mins) Take the Practice Quiz Module 2 Mesures de cybersécurité Mesures de sécurité au niveau des a… (17 mins) Protection des serveurs (15 mins) Mesures de sécurité au niveau des u… (17 mins) Mesures contre le social engineerin… (13 mins) Take the Practice Quiz Module 3 Contrôles d’accès L’identification (12 mins) Mécanismes d’authentification (14 mins) Modèles d’autorisation (14 mins) Mise en place des systèmes d’authen… (14 mins) Take the Practice Quiz Module 4 Chiffrement Chiffrement symétrique (13 mins) Chiffrement asymétrique (12 mins) Chiffrement hybride (17 mins) Recommandations (15 mins) Take the Practice Quiz Specialization · 4 modules              Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags Cybersécurité Techniques de cybersécurité About the Trainer Romain Hennion Expert in Cybersecurity and Data Protection Romain Hennion was a prominent figure in cybersecurity, known for his leadership at Formind, one of the first French cybersecurity companies. With over 15 years of experience, he was an expert in cybersecurity, risk management, and data protection, and a certified ISO/IEC 27001 auditor. A dedicated PECB trainer and lecturer at Centrale Supélec and Sciences Po, he trained the next generation of experts. Romain held accreditations for numerous key certifications such as CISSP, ISO/IEC 27001, ISO/IEC 27005, EBIOS, ISO 22301, DPO CNIL, CISA, CISM, and CRISC. Author of “Cybersecurity,” he significantly contributed to the field’s literature. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

SDLC and Application Security

Book a Meeting Login Competency Implementation of Controls A 8.25 and A 8.26 SDLC and Application Security This competency provides a solid foundation in implementing a Secure Development Life Cycle (SDLC) aligned with ISO/IEC 27001. Participants will learn key SDLC phases, including threat modeling, secure coding, and deployment practices, as well as application security principles, regulatory compliance, and authentication. The competency concludes with practical guidance on implementing and auditing security controls per ISO/IEC 27001, ensuring robust security throughout the software development process. 5 Trainers About Course Overview: This competency focuses on securing the software development process from the ground up. It covers all phases of the Secure Development Life Cycle (SDLC), including threat modeling, secure coding, and deployment best practices. Participants will also learn about key application security principles, regulatory requirements, and compliance with ISO/IEC 27001. The course provides practical examples to guide participants in implementing and auditing security controls throughout the software development life cycle. What You’ll Learn: The phases of SDLC and their relationship with information security How to implement secure coding standards and ensure secure deployment Regulatory compliance and legal considerations in application security How to embed security at each stage of the SDLC Techniques for threat modeling and managing security vulnerabilities How to implement and audit controls based on ISO/IEC 27001 standards Who Should Take This Course? This course is perfect for: Software developers and engineers IT security professionals and managers Application security teams Risk and compliance officers IT auditors and quality assurance specialists Business leaders responsible for securing software applications What You’ll Get: A certification of completion Practical knowledge on SDLC and application security Hands-on experience with threat modeling, secure coding, and secure deployment practices Access to a community of cybersecurity professionals Access to course materials in multiple languages Module 1 Secure Development Life Cycle (SDLC) SDLC and Information Security (15 mins) Phases of the SDLC (15 mins) Threat Modeling (15 mins) Security Best Practices in SDLC (16 mins) Take the Practice Quiz Module 2 Implementing SDLC Security Training and Awareness (15 mins) Secure Coding Standards (14 mins) Secure Deployment and Configuration (14 mins) Case Studies and Practical Solutions (14 mins) Take the Practice Quiz Module 3 Security Requirements Key Principles of Application Security (15 mins) Regulatory Compliance and Legal Considerations (14 mins) Authentication and Authorization (16 mins) Security Measures in System Implementation (15 mins) Take the Practice Quiz Module 4 ISO/IEC 27001 Implementation as per Annex A 8.25 (13 mins) Auditing as per Annex A 8.25 (13 mins) Implementation as per Annex A 8.26 (14 mins) Auditing as per Annex A 8.26 (15 mins) Take the Practice Quiz Specialization · 4 modules              Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags SDLC and Application Security Implementation of Control 8.25 Implementation of Control 8.26 ISO/IEC 27001 Secure Development Risk Management About the Trainer Mike Boutwell Information Security and Risk Management Expert Mike Boutwell is an esteemed expert in information security and risk management, with over 15 years in security and 10 years in risk management, contributing to companies such as Cisco, AT&T, IBM, Kyndryl, First Data, and Euroclear. Specializing in artificial intelligence and cybersecurity, he identifies and mitigates cyber risks while integrating AI risk management into existing security frameworks. Mike has advanced information security through innovative vendor collaborations, maintaining high compliance rates, and authoring insightful publications on AI and cybersecurity. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Threat Intelligence

Book a Meeting Login Competency Implementation of Control A 5.7 Threat Intelligence This competency equips participants with the essential knowledge and skills to effectively utilize threat intelligence in enhancing organizational security. Covering everything from fundamentals and data collection to implementation and compliance with ISO/IEC 27001, this program fosters a proactive approach to risk management and continuous improvement. Participants will emerge ready to integrate threat intelligence into their security operations seamlessly. 5 Trainers About Course Overview: This competency offers participants a deep dive into threat intelligence, teaching the processes of data collection, analysis, and integration with security operations. Participants will learn how to leverage threat intelligence for preventive and detective security measures and develop strategies for continuous improvement. Additionally, the course includes practical guidance on aligning threat intelligence with ISO/IEC 27001 compliance standards. What You’ll Learn: Understanding the fundamentals of threat intelligence, including key concepts and objectives Collecting, processing, and analyzing threat data from various sources Implementing threat intelligence into security operations for improved detection and prevention Enhancing security testing and risk management through intelligence-driven insights Developing automated threat intelligence strategies for efficiency Implementing and auditing threat intelligence practices in compliance with ISO/IEC 27001 Who Should Take This Course? This course is perfect for: Cybersecurity professionals Information security officers and analysts IT auditors and risk management professionals Incident response teams and security engineers Business leaders and decision-makers overseeing security operations What You’ll Get: A certification of completion Practical knowledge on integrating threat intelligence into security operations Hands-on experience with threat data collection and analysis Access to a community of cybersecurity professionals Access to course materials in multiple languages Module 1 Fundamentals of Threat Intelligence Overview of Threat Intelligence (15 mins) Layers of Threat Intelligence (14 mins) Characteristics of Effective Threat Intelligence (15 mins) Objectives and Sources of Threat Intelligence (15 mins) Take the Practice Quiz Module 2 Collecting and Processing Threat Information Collecting Information from Various Sources (15 mins) Processing and Preparing Information (16 mins) Analyzing Threat Information (15 mins) Communicating and Sharing Threat Intelligence (14 mins) Take the Practice Quiz Module 3 Implementing Threat Intelligence in Security Operations Integrating Threat Intelligence into Security Operations (15 mins) Enhancing Preventive and Detective Measures with Threat Intelligence (14 mins) Supporting Information Security Testing with Threat Intelligence (16 mins) Continuous Improvement Through Threat Intelligence (14 mins) Take the Practice Quiz Module 4 Advanced Strategies and ISO/IEC 27001 Developing a Threat Intelligence Program (15 mins) Leveraging Automation and Machine Learning for Threat Intelligence (15 mins) Implementation as per ISO/IEC 27001 (14 mins) Audit as per ISO/IEC 27001 (14 mins) Take the Practice Quiz Specialization · 4 modules              Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags Implementation of Control A 5.7 Threat Intelligence ISO/IEC 27001 Risk Management Information Security Controls Cybersecurity About the Trainer Grace Pfohl Information Technology Audit and Cyber Risk Consultant Grace Pfohl holds both a Bachelor’s and Master’s of Science in Computer Science from Georgia Tech in Atlanta, GA, specializing in Human-Computer Interaction. With a strong foundation in user experience and design principles, she is a member of the Audit and Implementation practice at risk3sixty in Atlanta, where she contributes to enhancing organizational security and compliance through effective auditing and implementation strategies. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Security Testing in Development and Acceptance

Book a Meeting Login Competency Implementation of Control A 8.29 Security Testing in Development and Acceptance This competency provides a thorough overview of security testing processes. It covers defining test requirements, methodologies, secure coding practices, code reviews, vulnerability assessments, and integrating testing with outsourced development. Participants will also learn how to implement and audit security testing as per ISO/IEC 27001 standards, ensuring robust software security. 5 Trainers About Course Overview: This competency focuses on security testing within software development. Participants will learn the fundamentals of security testing, including secure coding practices, code reviews, vulnerability scanning, and penetration testing. The course covers both automated and manual testing methodologies, as well as testing in outsourced development environments, all while ensuring compliance with ISO/IEC 27001. What You’ll Learn: Defining security testing processes and requirements Methodologies for testing security functions and secure coding practices Conducting code reviews, vulnerability scanning, and penetration testing Implementing and auditing security testing in outsourced development environments Aligning security testing practices with ISO/IEC 27001 for robust compliance and auditing Leveraging automated testing tools and techniques for efficiency Who Should Take This Course? This course is perfect for: Cybersecurity professionals Software developers and engineers IT auditors and compliance officers Penetration testers and vulnerability assessors Risk managers and business leaders overseeing secure development processes What You’ll Get: A certification of completion Knowledge of security testing practices and methodologies Hands-on experience with testing tools and procedures Access to a community of cybersecurity and software development professionals Access to course materials in multiple languages Module 1 Defining Security Testing Processes Introduction to Security Testing (15 mins) Security Testing Requirements (16 mins) Developing Effective Test Plans (15 mins) Leveraging Automated Tools (15 mins) Take the Practice Quiz Module 2 Testing Methodologies Testing Security Functions (15 mins) Secure Coding Practices (15 mins) Secure Configurations Testing (14 mins) Automated and Manual Testing Integration (15 mins) Take the Practice Quiz Module 3 Acceptance Testing and Code Reviews Performing Code Reviews (15 mins) Vulnerability Scanning (15 mins) Penetration Testing (15 mins) Independent Acceptance Testing (14 mins) Take the Practice Quiz Module 4 Outsourced Development and Testing Environments Managing Outsourced Development (15 mins) Testing in Production-like Environments (15 mins) Implementation as per ISO/IEC 27001 (15 mins) Audit as per ISO/IEC 27001 (15 mins) Take the Practice Quiz Specialization · 4 modules              Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags Implementation of Control A 8.29 Security Testing Development and Acceptance Secure Coding Vulnerability Assessment Penetration Testing ISO/IEC 27001 Compliance About the Trainer Kevin Kamanga Cybersecurity Project Manager and ISMS Auditor Kevin Kamanga is a Project Manager and ISMS Auditor with a strong foundation in human resources and IT. A JKUAT graduate, he is skilled in Network Administration, DNS, and Network Security. Kevin holds numerous certifications, including Fortinet FortiGate Administrator, Fortinet Certified Associate in Cybersecurity, Lead Cybersecurity Manager (PECB), PRINCE2 Practitioner, and Cisco Certified Network Professional (CCNP) Enterprise. His expertise spans cybersecurity, project management, and digital transformation, making him a valuable asset in enhancing organizational security and operational efficiency. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Use of Privileged Utility Programs

Book a Meeting Login Competency Implementation of Control A 8.18 Use of Privileged Utility Programs This competency covers essential topics to secure and manage privileged utility programs. It includes the fundamentals of utility programs, access control implementation, logging, best practices, compliance requirements, and ISO/IEC 27001 integration. 5 Trainers About Course Overview: This course provides in-depth training on how to manage privileged utility programs securely. From access control and logging to best practices and compliance with ISO/IEC 27001, participants will learn how to safeguard system utilities and prevent unauthorized access and misuse. What You’ll Learn: Fundamentals of privileged utility programs and their role in system management How to implement and manage access controls for these programs Logging and monitoring usage to detect potential security breaches Best practices for managing utility programs securely Understanding compliance requirements and ensuring adherence to standards How to handle unauthorized use and exceptions Integration with ISO/IEC 27001 for continuous improvement and security audits Who Should Take This Course? This course is perfect for: Cybersecurity professionals IT administrators and system managers Compliance officers and risk managers Auditors and assessors focusing on security controls Business leaders overseeing secure system management What You’ll Get: A certification of completion Comprehensive knowledge of privileged utility program management Hands-on experience with tools and procedures to secure utility programs Access to a global network of cybersecurity professionals Access to course materials in multiple languages Module 1 Introduction to Utility Programs Overview of Utility Programs (15 mins) Identifying and Assessing Utility Programs (15 mins) Authorization and Access Control (15 mins) Segregation and Limitation Practices (14 mins) Take the Practice Quiz Module 2 Implementing Access Controls and Logging Access Control Procedures (15 mins) Defining and Documenting Authorization Levels (15 mins) Logging and Monitoring Use (15 mins) Practical Examples and Tools (14 mins) Take the Practice Quiz Module 3 Best Practices and Compliance Best Practices for Utility Program Management (15 mins) Compliance Requirements and Standards (14 mins) Handling Unauthorized Use and Exceptions (14 mins) Case Studies and Lessons Learned (15 mins) Take the Practice Quiz Module 4 Integration and ISO/IEC 27001 Integrating Utility Program Management with ISO/IEC 27001 (15 mins) Continuous Improvement and Feedback (15 mins) Implementation as per ISO/IEC 27001 (15 mins) Audit as per ISO/IEC 27001 (14 mins) Take the Practice Quiz Specialization · 4 modules Watch Now   4 Modules   100% Positive Reviews (24 reviews)   104 Lessons (4h 15m)   3,011 Students   Languages Available: Spanish, English, German, French   Exam   Certificate upon completion of the course Tags Implementation of Control A 8.18 Privileged Utility Programs Access Control Logging ISO/IEC 27001 Compliance Cybersecurity Best Practices About the Trainer Kevin Kamanga Cybersecurity Project Manager and ISMS Auditor Kevin Kamanga is a Project Manager and ISMS Auditor with a strong foundation in human resources and IT. A JKUAT graduate, he is skilled in Network Administration, DNS, and Network Security. Kevin holds numerous certifications, including Fortinet FortiGate Administrator, Fortinet Certified Associate in Cybersecurity, Lead Cybersecurity Manager (PECB), PRINCE2 Practitioner, and Cisco Certified Network Professional (CCNP) Enterprise. His expertise spans cybersecurity, project management, and digital transformation, making him a valuable asset in enhancing organizational security and operational efficiency. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Network Security

Book a Meeting Login Competency Implementation of Control A 8.20 Network Security This competency covers essential aspects of network security, including foundational concepts, securing devices, and protecting information with encryption and access controls. It also focuses on incident response, forensic analysis, and compliance with ISO/IEC 27001, helping learners gain the skills needed to safeguard networks and ensure proper security management practices. 5 Trainers About Course Overview: This course equips learners with essential skills in network security. It covers critical areas such as securing network devices, encryption methods, and implementing network access controls. The course also focuses on incident response, forensic analysis, and auditing, aligning security practices with ISO/IEC 27001 compliance. By the end, participants will be ready to manage network security effectively in any environment. What You’ll Learn: Core principles of network security and risk management Securing network devices, including routers, switches, and wireless networks Implementing encryption and VPNs to protect network communications Managing network access controls to prevent unauthorized access Incident response strategies, forensic analysis, and security improvements Compliance with ISO/IEC 27001 for network security practices Techniques for monitoring and logging network activity Who Should Take This Course? This course is perfect for: Network security professionals IT administrators and engineers Cybersecurity consultants and auditors Risk managers and compliance officers Business leaders and project managers overseeing network security What You’ll Get: A certification of completion In-depth knowledge of network security and threat management Practical experience with tools and techniques for securing networks Access to a global community of cybersecurity professionals Access to course materials in multiple languages Module 1 Fundamentals of Network Security Introduction to Network Security (17 mins) Network Security Policies and Procedures (16 mins) Network Architecture and Segmentation (17 mins) Firewalls and Network Perimeter Security (17 mins) Take the Practice Quiz Module 2 Securing Network Devices Router and Switch Security (15 mins) Wireless Network Security (13 mins) IDS and IPS Systems (14 mins) Secure Network Device Management (17 mins) Take the Practice Quiz Module 3 Protecting Information in Networks Encryption and VPNs (16 mins) Network Access Control (NAC) (13 mins) Securing Remote Access (17 mins) Monitoring and Logging Network Activity (13 mins) Take the Practice Quiz Module 4 Incident Response and ISO/IEC 27001 Compliance Incident Detection and Response (17 mins) Forensic Analysis and Improvement (15 mins) Audit as per ISO/IEC 27001 (14 mins) Implementation per ISO/IEC 27001 (15 mins) Take the Practice Quiz Specialization · 4 modules              Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags Network Security Implementation of Control A 8.20 Network Access Control (NAC) Encryption Incident Detection and Response ISO/IEC 27001 VPNs IDS/IPS Systems About the Trainer Carl Carpenter Cybersecurity Professional and Penetration Tester Carl Carpenter is a highly experienced cybersecurity professional and penetration tester with extensive expertise in regulated environments such as CMMC, HIPAA, PCI, FFIEC, CCPA, and GDPR. A certified auditor and instructor, he holds multiple certifications including ISO/IEC 27001 Senior Lead Auditor, CISA, CISM, and PCI-QSA. Carl is also a Cisco, Microsoft, CompTIA, and PECB-certified specialist. He is skilled in advanced dignitary protection, close quarter battle, and various high-risk security operations. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Implementation of Control A 5.23 Information Security for Use of Cloud Services

Book a Meeting Login Competency Implementation of Control A 8.22 Segregation of Networks This competency provides clear guidance on securing cloud services through four focused modules. Participants will learn the basics of cloud security, how to integrate security policies, and how to manage vendors. It covers essential policies and procedures, including data protection and incident response, and teaches how to handle incidents, monitor, and manage multiple cloud services. The final module addresses securely exiting cloud services, including decommissioning, data migration, and ensuring compliance with ISO/IEC 27001 standard. 5 Trainers About Course Overview: This course provides participants with the skills needed to secure cloud services effectively. It covers the fundamentals of cloud security, integration with organizational security policies, risk management, data governance, and the processes involved in securely exiting cloud services. The course aligns cloud security practices with industry standards, ensuring participants can confidently manage cloud environments and compliance. What You’ll Learn: Basics of cloud security and its importance in organizational infrastructure How to integrate security policies with cloud services Managing vendors and securing cloud contracts Protecting data and ensuring compliance in cloud environments Handling incidents and monitoring cloud services for ongoing security Securely exiting cloud services, including data migration and decommissioning Implementing and auditing cloud security practices per ISO/IEC 27001 Who Should Take This Course? This course is perfect for: IT security professionals Cloud engineers and administrators Cybersecurity consultants Risk managers and compliance officers Business leaders and project managers responsible for cloud service security What You’ll Get: A certification of completion Practical knowledge of cloud security principles and best practices Hands-on experience with cloud service management tools Access to a global community of cybersecurity professionals Access to course materials in multiple languages Module 1 Introduction to Cloud Security Overview of Cloud Services (16 mins) Importance of Information Security in Cloud Environments (16 mins) Integration with Information Security Policies (16 mins) Vendor Evaluation and Selection (16 mins) Take the Practice Quiz Module 2 Establishing Cloud Infrastructure Assessing Security Needs and Risk (16 mins) Contractual Agreements and SLAs (15 mins) Identity and Access Management (15 mins) Data Encryption and Network Security (16 mins) Take the Practice Quiz Module 3 Managing Data and Applications Data Governance and Compliance in the Cloud (15 mins) Application Security in Cloud Environments (15 mins) Threat Detection and Incident Response (15 mins) Secure Configuration and Access Control (15 mins) Take the Practice Quiz Module 4 Exit and ISO/IEC 27001 Decommissioning, Data Migration, and Contract Termination (16 mins) Sanitization, Contract Termination, and Data Disposal (15 mins) Implementation as per ISO/IEC 27001 (15 mins) Auditing as per ISO/IEC 27001 (15 mins) Take the Practice Quiz Specialization · 4 modules              Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags Implementation of Control A 5.23 Cloud Security Cloud Services Management Data Protection Incident Response ISO/IEC 27001 Vendor Management Identity and Access Management About the Trainer Kevin Kamanga Cybersecurity Project Manager and ISMS Auditor Kevin Kamanga is a Project Manager and ISMS Auditor with a strong foundation in human resources and IT. A JKUAT graduate, he is skilled in Network Administration, DNS, and Network Security. Kevin holds numerous certifications, including Fortinet FortiGate Administrator, Fortinet Certified Associate in Cybersecurity, Lead Cybersecurity Manager (PECB), PRINCE2 Practitioner, and Cisco Certified Network Professional (CCNP) Enterprise. His expertise spans cybersecurity, project management, and digital transformation, making him a valuable asset in enhancing organizational security and operational efficiency. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Implementation of Control A 8.22 Segregation of Networks

Book a Meeting Login Competency Implementation of Control A 8.22 Segregation of Networks This competency provides a comprehensive framework for effective network segregation. It covers the implementation of VLANs, firewall rules, and Access Control Lists (ACLs) to enhance security and control. Participants will learn to monitor network traffic and detect incidents in cloud environments while ensuring compliance with ISO/IEC 27001. This knowledge empowers individuals to create a robust network infrastructure that supports organizational objectives and mitigates potential threats. 5 Trainers About Course Overview: This course offers a detailed approach to implementing network segregation. It explains how to design and configure network components such as VLANs, firewalls, and ACLs to enhance security. Participants will also learn to monitor network traffic and detect incidents, with a focus on cloud environments. The course includes strategies for ensuring compliance with ISO/IEC 27001, helping to secure the network infrastructure and mitigate potential risks. What You’ll Learn: Principles of network segregation and its importance for security Designing and implementing VLANs, firewalls, and ACLs for enhanced control Monitoring network traffic and detecting incidents in segregated environments Ensuring compliance with ISO/IEC 27001 standards in network management Advanced concepts like Zero Trust Architecture and integration in network segregation Best practices for maintaining and auditing segregated networks Who Should Take This Course? This course is perfect for: Network security professionals IT administrators and engineers Cybersecurity consultants and auditors Risk managers and compliance officers Business leaders and project managers responsible for network security What You’ll Get: A certification of completion Practical knowledge of network segregation and security principles Hands-on experience with VLANs, firewalls, and ACLs Access to a global community of cybersecurity professionals Access to course materials in multiple languages Module 1 Introduction to the Secure System Architecture Overview of Network Segregation (14 mins) Business Needs and Security Boundaries (14 mins) Types of Network Segregation (16 mins) Tools and Technologies for Network Segregation (16 mins) Take the Practice Quiz Module 2 Implementing Network Segregation Planning and Design (15 mins) VLAN Configuration and Management (16 mins) Firewall Rules and Policies (15 mins) Access Control List (ACL) (14 mins) Take the Practice Quiz Module 3 Monitoring and Managing Segregated Networks Monitoring Network Traffic (15 mins) Incident Detection and Response (16 mins) Regular Audits and Assessments (15 mins) Updating and Maintaining Segregation (15 mins) Take the Practice Quiz Module 4 Advanced Concepts and ISO/IEC 27001 Segregation in Cloud Environments (15 mins) Integration with Zero Trust Architecture (16 mins) Implementing as per A 8.22 ISO/IEC 27001 (15 mins) Auditing as per A 8.22 ISO/IEC 27001 (16 mins) Take the Practice Quiz Specialization · 4 modules              Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags Implementation of Control 8.22 Segregation of Networks VLAN Configuration Firewall Rules Access Control Lists Network Security Incident Detection ISO/IEC 27001 Zero Trust Architecture About the Trainer Kevin Kamanga Cybersecurity Project Manager and ISMS Auditor Kevin Kamanga is a Project Manager and ISMS Auditor with a strong foundation in human resources and IT. A JKUAT graduate, he is skilled in Network Administration, DNS, and Network Security. Kevin holds numerous certifications, including Fortinet FortiGate Administrator, Fortinet Certified Associate in Cybersecurity, Lead Cybersecurity Manager (PECB), PRINCE2 Practitioner, and Cisco Certified Network Professional (CCNP) Enterprise. His expertise spans cybersecurity, project management, and digital transformation, making him a valuable asset in enhancing organizational security and operational efficiency. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.

Book a Meeting

Skills - Book a demo

登録ありがとうございます!

Thank you for subscribing!